3.2 KiB
Example Workflow
This is an example workflow for enrolling custom secure boot keys on a ASUS Z170-A motherboard. These instructions can be applied to any other firmware, but the exact steps to be taken in the firmware setup menus may differ.
-
Enter UEFI setup menu by press either of F2/Del/Esc/F10/F11/F12 depending on your firmware or by using
systemctl --firmware-setup reboot -
Do not change
OS TypetoCustomas this will not enableSetup Mode! Instead open the sub-menuKey Management:
-
If your firmware does not provide this, you will have to manually delete the keys. Open
PK Managementto do so and repeat this step for KEK, DB and DBX:

-
And secure boot should now be disabled. The platform key will remain loaded until the system is rebooted.

-
Exit the firmware with the save and reset option (even if it says no changes have been performed). You may optionally enter the firmware setup again to confirm:

-
Confirm that setup mode is enabled:
# sbctl status Installed: ✘ Sbctl is not installed Setup Mode: ✘ Enabled Secure Boot: ✘ Disabled -
Create custom secure boot keys:
# sbctl create-keys Created Owner UUID a9fbbdb7-a05f-48d5-b63a-08c5df45ee70 Creating secure boot keys...✔ Secure boot keys created! -
Enroll custom secure boot keys:
# sbctl enroll-keys Enrolling keys to EFI variables...✔ Enrolled keys to the EFI variables! -
Confirm that setup mode is disabled now. At this point, the device is in secure boot mode (this may only be reflected after a reboot):
# sbctl status Installed: ✔ Sbctl is installed Owner GUID: a9fbbdb7-a05f-48d5-b63a-08c5df45ee70 Setup Mode: ✔ Disabled Secure Boot: ✘ Disabled -
Sign your bootloader and kernels with
sbctlbefore rebooting! -
Optionally, observe the secure boot state in the firmware menu after rebooting:

-
Confirm secure boot state after reboot:
# sbctl status Installed: ✔ Sbctl is installed Owner GUID: a9fbbdb7-a05f-48d5-b63a-08c5df45ee70 Setup Mode: ✔ Disabled Secure Boot: ✔ Enabled


