diff --git a/PolicyDefinitions/YubiKey.admx b/PolicyDefinitions/YubiKey.admx
index 1f7cabd..80621a6 100644
--- a/PolicyDefinitions/YubiKey.admx
+++ b/PolicyDefinitions/YubiKey.admx
@@ -10,38 +10,70 @@
-
+
- true
- false
+
+
+
+
+ true
+
+
+
+
+
+
-
+
-
-
+
+
+
- RSA1024
+
-
+
- RSA2048
+ default
-
+
- ECC256
+ never
-
+
- ECC384
+ once
+
+
+
+
+ always
+
+
+ true
+
+
+ false
+
+
+
+
+
+ true
+
+
+ false
+
+
@@ -51,73 +83,47 @@
-
-
-
-
-
-
-
-
-
-
- true
- false
-
-
-
-
- true
- false
-
-
-
-
- true
- false
-
-
+
-
-
-
-
-
-
-
-
-
+
+
- default
+
-
+
- never
+ RSA1024
-
+
- once
+ RSA2048
-
+
- always
+ ECC256
+
+
+
+
+ ECC384
+
+
-
-
+
+
-
-
-
-
+ false
+ true
+
@@ -132,19 +138,5 @@
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\ No newline at end of file
diff --git a/PolicyDefinitions/en-US/YubiKey.adml b/PolicyDefinitions/en-US/YubiKey.adml
index e513f7e..ccc4fe8 100644
--- a/PolicyDefinitions/en-US/YubiKey.adml
+++ b/PolicyDefinitions/en-US/YubiKey.adml
@@ -6,89 +6,111 @@
YubiKey PIV Manager
- Enforce Touch Policy
- When enabled, the YubiKey will require its button to be touched to perform any action with the private key of a slot.
- Algorithm
- Which algorithm to use for key pair generation.
+ Configure Touch Policy
+ This policy setting configures the list of certificate slots to show the Touch Policy setting for.
+
+If you enable this policy setting, the option to choose the touch policy will be shown for the selected slots. These values are supported:
+9a - Authentication
+9c - Digital Signature
+9d - Key Management
+9e - Card Authentication
+
+If you also select the "Always require touch on the slots above" option, the YubiKey will always require its button to be touched to perform any action with the private keys of the slots specified.
+
+If you disable or do not configure this policy setting, the options will be hidden in the UI and the default slot-specific touch policies will be used.
+ User-definedRSA-1024RSA-2048ECC P-256ECC P-384
- Card Reader
- String to match against when looking for compatible YubiKey devices.
- Certreq Template
- Value to use in CertificateTemplate parameter when calling certreq.exe.
- Complex PIN/PUKs
- True to require complex PINs and PUKs.
- Enable Certificate Import
- When False, hide the "import from fileā¦" button for certificates.
- PIN as Management Key
- When true, the Management Key is based off of the PIN.
- PIN Expiration
- When non-zero causes a timestamp to be written when the PIN is changed, and to force a PIN change after the specified number of days.
- PIN Requirement Policy
- When set to a value other than "default", override the PIV standard for when the PIN is required for using a particular slot.
- Default
+ Set card reader name filter
+ This policy setting configures the string to match against when looking for compatible YubiKey devices.
+
+If you enable this policy setting, only YubiKeys from matching card readers will be shown in the UI.
+
+If you disable or do not configure this policy setting, all YubiKey devices will be shown in the UI.
+ Set certificate request properties
+ This policy setting configures the properties of generated certificates and certificate signing requests.
+
+If you enable this policy setting, the specified values will be used by the YubiKey PIV Manager.
+
+If you disable or do not configure this policy setting, application defaults will be used.
+ Disable certificate import
+ This policy setting controls the ability to import certificates.
+
+If you enable this policy setting, the "Import from file..." button will be hidden in the UI.
+
+If you disable or do not configure this policy setting, the "Import from file..." button will be shown in the UI.
+ Configure PIN Policy
+ This policy setting configures the requirements for PIN usage.
+
+If you enable this policy setting, the default application behavior will be overriden.
+
+The PIN Requirement Policy setting will only be shown for the certificate slots listed. These certificate slot identifiers are supported:
+9a - Authentication
+9c - Digital Signature
+9d - Key Management
+9e - Card Authentication
+
+When the PIN Requirement Policy is set to a value other than "Slot defaults", the PIV standard for when the PIN is required for using a particular slot will be overridden.
+
+Non-zero PIN expiration interval causes a timestamp to be written when the PIN is changed, and to force a PIN change after the specified number of days.
+
+If you disable or do not configure this policy setting, slot-specific PIN policy will not be configurable through the UI.
+ User-defined
+ Slot defaultsNeverOnceAlways
- PIN Policy Slots
- Which certificate slots to show the PIN Requirement Policy setting for.
-Possible values are 9a, 9c, 9d and 9e.
-Default is none.
- Displayed Output Formats
- Output formats available when generating a key.
-Possible values are pk, ssc, csr and ca.
-Default values are ssc, csr and ca.
- Displayed Certificate Slots
- A list of which certificate slots to show in the UI.
-Possible values are 9a, 9c, 9d and 9e.
-All slots are shown by default.
- Subject DN
- Subject to use when generating a CSR or self-signed certificate.
- Touch Policy Slots
- Which certificate slots to show the Touch Policy setting for.
-Possible values are 9a, 9c, 9d and 9e.
-Default value is none.
+ Only display the specified output formats
+ This policy setting determines the output formats that are available when generating a key.
+
+If you enable this policy setting, only the specified output formats will be shown. Supported formats are "pk", "ssc", "csr" and "ca".
+
+If you disable or do not configure this policy setting, the "ssc", "csr" and "ca" formats will be available.
+ Only display the specified certificate slots
+ This policy setting determines the certificate slots that are shown in the UI.
+
+If you enable this policy setting, only the specified certificate slots will be shown in the UI. These values are supported:
+9a - Authentication
+9c - Digital Signature
+9d - Key Management
+9e - Card Authentication
+
+If you disable or do not configure this policy setting, all four certificate slots will be shown.
-
- Cryptographic algorithm
+
+ Allow the default touch policy to be overriden on these slots:
+ Always require touch on the slots above
-
-
+
-
+
+ Cryptographic algorithm to use for key pair generation:
+
+
+ /CN=%USERNAME%
+
-
+
-
- Pin expiration in days
-
- Policy
-
-
- Slots
+ Enable PIN Requirement Policy selection for these slots:
+ PIN Requirement Policy:
+ Enforce complex PINs and PUKs
+ PIN expiration interval (days):
+ Derive the Management Key from PIN
- Formats
+ Formats to show:
- Slots
-
-
-
-
- /CN=%USERNAME%
-
-
-
- Slots
+ Slots to show in the UI:
diff --git a/Schema/PolicyDefinitions.xsd b/Schema/PolicyDefinitions.xsd
index cbaf2e9..419f52d 100644
--- a/Schema/PolicyDefinitions.xsd
+++ b/Schema/PolicyDefinitions.xsd
@@ -121,6 +121,16 @@
+
+
+ Describes a multi line text element in a policy
+
+
+
+
+
+
+