Secure Boot Menu
The following information is displayed:
-
System Mode
-
Secure Boot
Note: For detailed instructions on configuring Security Boot settings, refer to the Security Boot Configuration User's Guide at https://www.supermicro.com/support/manuals.
Secure Boot
Select Enabled to configure Secure Boot settings. The options are Disabled and Enabled.
Secure Boot Mode
Use this feature to select the desired secure boot mode for the system. The options are Standard and Custom.
Select Ok to enter the Audit Mode workflow. It will result in erasing the Platform Key (PK) variables and resetting the system to the Setup/Audit Mode.
Note: This submenu is available when "Secure Boot Mode" is set to Custom.
Select Ok to reset system to the User Mode or to the Deployed Mode.
Note: This submenu is available when "Secure Boot Mode" is set to Custom.
The following information is displayed:
-
Vendor Keys
Note: This submenu is available when "Secure Boot Mode" is set to Custom.
Provision Factory Defaults
Select Enabled to install provision factory default settings after a platform reset while the system is in the Setup Mode. The options are Disabled and Enabled.
Select Yes to restore manufacturer default keys to ensure system security. The options are Yes and No. Selecting Yes will reset system to the User Mode.
Note: This submenu is available when any secure keys have been installed.
This feature resets the system to the Setup Mode. The options are Yes and No.
Note: This submenu is available when any secure keys have been installed.
This feature allows the Efi image to run in the secure boot mode, which will enroll the SHA256 Hash certificate of a PE image into the Authorized Signature Database (DB).
This feature exports the NVRAM contents of secure boot variables to a storage device. The options are Yes and No.
Note: This submenu is available when any secure keys have been installed.
Secure Boot variable / Size / Keys / Key Source
Use this feature to enter and configure a set of values to be used as platform firmware keys for the system. These values also indicate the sizes, key numbers, and the sources of the authorized signatures. Select Update to update the platform key.
Use this feature to enter and configure a set of values to be used as Key Exchange Keys for the system. These values also indicate the sizes, key numbers, and the sources of the authorized signatures. Select Update to update the Key Exchange Keys. Select Append to append the Key Exchange Keys.
Use this feature to enter and configure a set of values to be used as Authorized Signatures for the system. These values also indicate the sizes, key numbers, and sources of the authorized signatures. Select Update to update the Authorized Signatures. Select Append to append the new Authorized Signatures.
Use this feature to enter and configure a set of values to be used as Forbidden Signatures for the system. These values also indicate sizes, key numbers, and key sources of the forbidden signatures. Select Update to update the Forbidden Signatures. Select Append to append the Forbidden Signature.
Use this feature to set and save the timestamps for the Authorized Signatures, which will indicate the time when these signatures are entered into the system. These values also indicate sizes, keys, and key sources of the authorized timestamps. Select Update to update the Authorized TimeStamps. Select Append to append the Authorized TimeStamps.
Use this feature to set and save the Authorized Signatures used for OS recovery. Select Update to update the OsRecovery Signatures. These values also indicate sizes, keys, and key sources of the OsRecovery Signatures. Select Append to append the OsRecovery Signatures.