Supermicro X13DEG-M User Manual page 155

Table of Contents

Advertisement

Chapter 4: UEFI BIOS
Key Exchange Keys (KEK)
Use this feature to enter and configure a set of values to be used as Key-Exchange-Keys
for the system. These values also indicate the sizes, keys numbers, and the sources of
the authorized signatures. Select Update to update your "Key Exchange Keys". Select
Append to append your "Key Exchange Keys".
Authorized Signatures (db)
Use this feature to enter and configure a set of values to be used as Authorized Signatures
for the system. These values also indicate the sizes, keys numbers, and the sources of
the authorized signatures. Select Update to update your "Authorized Signatures". Select
Append to append your "Authorized Signatures".
Forbidden Signatures (dbx)
Use this feature to enter and configure a set of values to be used as Forbidden Signa-
tures for the system. These values also indicate sizes, key numbers, and key sources of
the forbidden signatures. Select Update to update your "Forbidden Signatures". Select
Append to append your "Forbidden Signatures".
Authorized TimeStamps (dbt)
This feature allows you to set and save the timestamps for the authorized signatures
which will indicate the time when these signatures are entered into the system. These
values also indicate sizes, keys, and key sources of the authorized timestamps. Select
Update to update your "Authorized TimeStamps". Select Append to append your "Au-
thorized TimeStamps".
OsRecovery Signature (dbr)
This feature allows you to set and save the authorized signatures used for OS recovery.
Select Update to update your "OS Recovery Signatures". These values also indicate
sizes, keys, and key sources of the OsRecovery signatures. Select Append to append
your "OS Recovery Signatures".
TCG Storage Security Configuration:
155

Advertisement

Table of Contents
loading

Table of Contents