Skip to content

Commit 9094b12

Browse files
addetzachuribooks
andauthored
docs: add mok key download from artifact studio PEM-8594 (#8157)
* docs: add mok key download from artifact studio PEM-8594 * docs: update steps * Apply suggestions from code review Co-authored-by: Amanda Churi Filanowski <[email protected]> * docs: update numbering * docs: fix indentation --------- Co-authored-by: Amanda Churi Filanowski <[email protected]>
1 parent 9e6301b commit 9094b12

File tree

1 file changed

+35
-31
lines changed

1 file changed

+35
-31
lines changed

_partials/self-hosted/management-appliance/_installation-steps-prereqs.mdx

Lines changed: 35 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -54,46 +54,50 @@ Learn how to configure and install Secure Boot for Palette Management Appliance
5454

5555
<summary> How to install Secure Boot on Hewlett Packard Enterprise iLO 5 </summary>
5656

57-
Before you start, ensure that you have the `MOK.der` certificate file on your local computer and that you
58-
have iLO 5 access with privileges to launch the remote console and change BIOS settings.
59-
Reach out to your customer support representative if you do not have the `MOK.der` file.
60-
61-
1. Power on or reboot the server. When prompted during Power-On Self-Test (POST), press **F9** to enter **System Utilities**.
62-
2. Select **System Configuration** and press **ENTER**.
63-
3. Select **BIOS/Platform Configuration (RBSU)** > **Server Security** > **Secure Boot Settings** > **Advanced Secure Boot Options**.
64-
4. Select **DB – Allowed Signatures Database** > **Enroll Signature**. If Secure Boot is currently enabled, the **Enroll Signature** option will be unavailable. Temporarily disable Secure Boot and repeat the process.
65-
5. Drag the `MOK.der` file from your desktop onto the iLO Remote Console window. iLO mounts it as a virtual USB device automatically.
66-
6. Confirm any prompts.
67-
7. Verify that the new entry appears under **DB – Allowed Signatures Database** > **View Signatures**.
68-
8. Press **ESC** to exit the menus until the **Save and Exit** option is available.
69-
9. Save the changes. Exit the menu and confirm to reboot the server.
57+
Before you begin, ensure that you have iLO 5 access with privileges to launch the remote console and change BIOS settings.
58+
You also need the `MOK.der` certificate file on your local computer.
59+
Skip to step 4 if you have already downloaded the certificate file.
60+
61+
1. Navigate to [Artifact Studio](https://artifact-studio.spectrocloud.com/).
62+
2. Select the version corresponding to your {props.edition} installer. Then, select **Show Artifacts**. The artifact list appears.
63+
3. **Download** the **MOK Key for Secure Boot** file.
64+
4. Power on or reboot the server. When prompted during Power-On Self-Test (POST), press **F9** to enter **System Utilities**.
65+
5. Select **System Configuration** and press **ENTER**.
66+
6. Select **BIOS/Platform Configuration (RBSU)** > **Server Security** > **Secure Boot Settings** > **Advanced Secure Boot Options**.
67+
7. Select **DB – Allowed Signatures Database** > **Enroll Signature**. If Secure Boot is currently enabled, the **Enroll Signature** option will be unavailable. Temporarily disable Secure Boot and repeat the process.
68+
8. Drag the `MOK.der` file from your desktop onto the iLO Remote Console window. iLO mounts it as a virtual USB device automatically.
69+
9. Confirm any prompts.
70+
10. Verify that the new entry appears under **DB – Allowed Signatures Database** > **View Signatures**.
71+
11. Press **ESC** to exit the menus until the **Save and Exit** option is available.
72+
12. Save your changes. Exit the menu and reboot the server.
73+
7074
</details>
7175

7276
<details>
7377

7478
<summary> How to install Secure Boot on Dell servers with UEFI </summary>
7579

76-
Before you start, ensure that you have the `MOK.der` certificate file on your local computer.
77-
Reach out to your customer support representative if you do not have the `MOK.der` file.
78-
79-
1. Power on the server. Execute the following command to create a virtual CD/DVD drive containing an ISO file with the `MOK.der` certificate.
80-
80+
Before you begin, you need the `MOK.der` certificate file on your local computer.
81+
Skip to step 4 if you have already downloaded the certificate file.
82+
83+
1. Navigate to [Artifact Studio](https://artifact-studio.spectrocloud.com/).
84+
2. Select the version corresponding to your {props.edition} installer. Then, select **Show Artifacts**. The artifact list appears.
85+
3. **Download** the **MOK Key for Secure Boot** file.
86+
4. Power on the server. Execute the following command to create a virtual CD/DVD drive containing an ISO file with the `MOK.der` certificate. Alternatively, you can save the file to a FAT32-formatted USB drive.
8187
```
8288
mkisofs -output key.iso -volid cidata -joliet -rock MOK.der
8389
```
84-
Alternatively, you can save the file to a FAT32-formatted USB drive.
85-
86-
2. Reboot the server. When the Dell logo appears, press **F2**. The **System Setup** menu opens.
87-
3. Select **System BIOS** > **Boot Settings**.
88-
4. Ensure that the **Boot Mode** is set to **UEFI**.
89-
5. Press **ESC** to return to **Boot Settings**.
90-
6. Select **System Security** > **Secure Boot Settings**.
91-
7. Toggle **Secure Boot** to **Enabled** and **Secure Boot Policy** to **Custom**.
92-
8. Select **Secure Boot Custom Policy Settings** > **Authorized Signature Database (db)**.
93-
9. Select **Import New Entry**. Then, select the virtual CD/DVD drive or USB drive containing the `MOK.der` file.
94-
10. Save the changes. Press **ESC** to return to **Authorized Signature Database (db)**.
95-
11. Select **View Entries**. The `MOK.der` file shows in the database as **DRBD Module Signing**.
96-
12. Save the changes. Exit the menu and confirm to reboot the server.
90+
5. Reboot the server. When the Dell logo appears, press **F2**. The **System Setup** menu opens.
91+
6. Select **System BIOS** > **Boot Settings**.
92+
7. Ensure that the **Boot Mode** is set to **UEFI**.
93+
8. Press **ESC** to return to **Boot Settings**.
94+
9. Select **System Security** > **Secure Boot Settings**.
95+
10. Toggle **Secure Boot** to **Enabled** and **Secure Boot Policy** to **Custom**.
96+
11. Select **Secure Boot Custom Policy Settings** > **Authorized Signature Database (db)**.
97+
12. Select **Import New Entry**. Then, select the virtual CD/DVD drive or USB drive containing the `MOK.der` file.
98+
13. Save your changes. Press **ESC** to return to **Authorized Signature Database (db)**.
99+
14. Select **View Entries**. The `MOK.der` file shows in the database as **DRBD Module Signing**.
100+
15. Save your changes. Exit the menu and reboot the server.
97101

98102
</details>
99103

0 commit comments

Comments
 (0)