Skip to content

Pico HSM Initialization

This page documents the security initialization options available for Pico HSM when using PicoKey App.

These settings control PIN policies, key protection mechanisms, and recovery options.

Pico HSM initialization


PIN configuration

User PIN

Defines the primary user PIN.

  • Required for cryptographic operations
  • Protects private keys and stored objects

Tip

The default PIN is 648219.


SO PIN

Defines the Security Officer PIN.

  • Used for administrative operations
  • Required for certain reset and recovery commands

Note

The SO PIN should be stored separately from the user PIN.


PIN retries

Configures the number of allowed incorrect PIN attempts.

  • Applies to both user PIN and SO PIN
  • Exceeding the limit blocks access

Danger

Exceeding retry limits may permanently lock the device.


Advanced protection options

DKEK shares

Enables Distributed Key Encryption Key (DKEK) shares.

  • Splits the encryption key into multiple shares
  • Requires a threshold number of shares for recovery

Note

This option is only useful when no key domains are configured. Otherwise, each key domain can be configured independently with different DKEK shares.


PUK authentications

Defines the total number of public keys supported for authentication.

  • Used when PKA is enabled
  • Adds an additional authentication mechanism without PIN

PUK minimum authentications

Defines the number of minimum of public keys for authentication.

  • Used when PKA is enabled

Key domains

Enables key domain separation.

  • Keys are grouped into isolated domains
  • Access policies can differ per domain

Additional options

Reset retry counter command

Allows resetting the retry counter via command in case PIN is locked. It also allows PIN resetting.

  • Useful for controlled recovery scenarios

Danger

If this option is disabled, Pico HSM will not be recoverable if PIN locked. In this case, a Factory Reset will be necessary and all keys and data will be lost permanently.


Transport PIN

Allows setting a temporary PIN during transport or provisioning.

Warning

Transport PINs should be changed immediately after deployment.


PKA replaceable

Allows replacement of public key authentication data.


Combined PIN & PKA authentication

Requires both PIN and public key authentication.

  • Provides multi-factor protection

Reset Retry Counter only resets error counter

Reset Retry command only resets retry counter, not the PIN.

Note

This option is usable only when Reset Retry Counter command is enabled.


Force Device Certificate

Downloads and resigns the attestation certificate. Do not use unless you experiment issues with 3rd party apps.


Initialization process

After configuring all parameters:

  • Click Initialize
  • The device is provisioned with the selected security configuration

Danger

Some options cannot be changed without reinitializing the device.