Policy Management
Policy Management provides administrators a centralized interface to define, review, and manage FIDO authentication policies across the organization. It features a structured table (for policy management) that lists all configured policies and provides controlled administrative actions to help preserve policy integrity and ensure compliance.
Policy Management Table
The Policy Management table displays all policies defined within the organization. It includes key metrics and actionable options to help administrators monitor and manage policy usage effectively.

The following table explains each column given in the policy management table.
| Column | Description |
|---|---|
| Policy Name | The name assigned to the policy. |
| Type | Indicates whether the policy is Standard or Thales Enterprise. Refer to the Policy Types section for detailed information on the type of policies. |
| Devices | Total number of authenticators to which the policy is assigned. |
| Users | Total number of users enrolled under the policy. |
| Status | Indicates whether a policy is ACTIVE or INACTIVE. ACTIVE - Indicates that the policy is assigned to atleast one device. - Editing is restricted to prevent disruptions to active deployments. INACTIVE - Indicates that the policy is not assigned to any device. - Editing and deletion are permitted, allowing safe updates and cleanup. |
| Actions | Available actions, such as Edit and Delete policies. |
Caution
Policies can only be edited or deleted when their status is Inactive. This safeguards accidental removal or modification of policies that are actively in use by devices.
Policy Types
Policies determine how authenticators are used and managed within the system. In Thales Authenticator Lifecycle Manager, you can create the following two types of policies:
-
Standard
-
Implements standard FIDO features and behaviors.
-
Ensures cross-vendor compatibility (for example, Thales, YubiKey, and other compliant devices).
-
Offers optional field configurations compatible with a variety of devices.
-
-
Thales Enterprise
-
Provides Thales-specific enterprise capabilities that extend beyond standard FIDO features.
-
Includes advanced device management controls (for example Admin PIN enforcement and enhanced compliance settings).
-
Designed for Thales devices requiring stricter operational governance.
-
Tip
-
Use Standard policies for broad compatibility and simplified deployments.
-
Use Thales Enterprise policies when enterprise-grade controls and Thales-specific features are required beyond standard FIDO capabilities.
Manage Policies
Administrators can perform the following operations to manage policies:
Search Policies
The Search feature allows administrators to quickly locate policies. Use the search bar to filter policies and view their details based on either the policy name or type.

Create Policies
-
On the Policy Management screen, click Create Policy.

-
On the Create Authenticator Policy screen, under Select policy type, select either the Standard or Thales Enterprise policy type option as per your preferred configuration.

-
Configure the policy parameters and click Save Policy.
Basic Information
- Policy Name (mandatory): A unique name for the policy (maximum 64 characters).
- Description (optional): A brief description to explain the purpose or scope of the policy.
-
To generate a FIDO device User PIN, use either of the following two options:
-
Randomized User PIN: Enable this option for a system-generated User PIN. The PIN will be generated based on the minimum PIN length set in the policy.
-
User PIN: Enter a secure user PIN (4 to 6-digit PIN length) to be assigned to a FIDO device.

-
FIDO 2.1 configuration
This configuration is applicable only to FIDO devices that support the FIDO 2.1 standard.
-
Minimum PIN length: Minimum PIN length (allowed range: 4 to 63 characters) for user PINs to be assigned to FIDO devices.
-
Enforce PIN Change: Enable this option to enforce users to change their default or existing device PIN before using the FIDO key for authentication for the first time.
-
Enforce user verification: Enable this option to make PIN‑based user verification mandatory, instead of relying solely on a physical device touch, ensuring that authentication is performed by the authorized user.

Basic Information
- Policy Name (mandatory): A unique name for the policy (maximum 64 characters).
- Description (optional): A brief description to explain the purpose or scope of the policy.
-
To generate a FIDO device User PIN, use either of the following two options:
-
Randomized User PIN: Enable this option for a system-generated User PIN. The PIN will be generated based on the minimum PIN length set in the policy.
-
User PIN: Enter a secure user PIN (4 to 6-digit PIN length) to be assigned to a FIDO device.

-
Thales Enterprise features
This section is used to configure controlled administrative actions.
-
To generate a FIDO device Admin PIN, use either of the following two options:
-
Randomized Admin PIN: Enable this option for a system-generated Admin PIN (16-digit PIN length).
-
Admin PIN: Enter a secure Admin PIN (16-digit PIN length) to be assigned to a FIDO device.
The Admin PIN is set for unmanaged FIDO devices.
Note
The Admin PIN is used to enable advanced device management features.
-
-
Allowed Websites List (Optional): The website(s) where FIDO devices, governed by this policy, are permitted for user authentication. A maximum of eight websites can be listed, separated by commas.
-
Minimum PIN length (mandatory): Minimum PIN length (allowed range: 4 to 63 characters) for user PINs to be assigned to FIDO devices.
-
Allow device reset management: Enables administrators to control the device reset functionality. When enabled, administrators can perform a factory reset on devices.
-
Enforce PIN Change: Enable this option to enforce users to change their default or existing device PIN before using the FIDO key for authentication for the first time.
-
Enforce user verification: Enable this option to make PIN‑based user verification mandatory instead of relying solely on a physical device touch, ensuring that the authentication is performed by the authorized user.

After a policy is successfully created (for example, Standard_Policy), a success message is displayed.

The newly created policy appears in the table with the Inactive status. Once an administrator assigns the policy to a device, the status automatically updates to ACTIVE.

Edit Policies
Policy editing is permitted only for policies with an INACTIVE status, ensuring safe and non-disruptive updates.
-
On the Policy Management window, locate the target policy in the list and verify that the status is INACTIVE.

-
Click
to edit the policy. -
Review and update configuration settings as per the requirements.
Note
For field descriptions, refer to step 3 of the Create Policies section.

-
Click Update Policy to save changes.
Now, administrators can assign the updated policy to devices to make it ACTIVE.
Delete Policies
Policy deletion is permitted only for policies with an INACTIVE status, ensuring safe and non-disruptive cleanup.
-
On the Policy Management screen, locate the target policy in the list and verify that the status is INACTIVE.

-
Click
to delete the policy. -
The Delete Policy window is displayed. Click Delete to confirm the operation.

After a policy is successfully deleted, a success message is displayed.
