This section of the Policy is optional. If you don’t want MDS to be checked, do not specify it in the policy.
This API allows Relying Parties to retrieve current information about FIDO authenticators. The type of information that can be retrieved includes the following:
In the MDS object, locate authenticatorStatusReport; it is a list of statuses and how SKFS will handle them.
This is a list all expected status reports and how SKFS should handle them. The status reports are retieved from the MDS and checked whenever a new registration occurs. During registration the authenticator returns an aaguid that uniquely identities the exact make and model of the authenticator. SKFS then checks the MDS for the status report on that model of authenticator. The status can be any of the following:
"NOT_FIDO_CERTIFIED",
"FIDO_CERTIFIED",
"USER_VERIFICATION_BYPASS",
"ATTESTATION_KEY_COMPROMISE",
"USER_KEY_REMOTE_COMPROMISE",
"USER_KEY_PHYSICAL_COMPROMISE",
"UPDATE_AVAILABLE",
"REVOKED",
"SELF_ASSERTION_SUBMITTED",
"FIDO_CERTIFIED_L1",
"FIDO_CERTIFIED_L2",
"FIDO_CERTIFIED_L3",
"FIDO_CERTIFIED_L4",
"FIDO_CERTIFIED_L5"
NOTE: If MDS is enabled in properties then UPDATE_AVAILABLE and REVOKED must be present as Status values of authenticatorStatusReport entries.
There are three parts to authenticatorStatusReport: