If you cannot successfully boot with Secure Boot FIRST then don’t don’t bother trying to configure the host for TPM 2.0. TPM 2.0’s function on an ESXi host to attest that Secure Boot has done its job. Please see my other blog on “ Prepping an ESXi 6.7 host for Secure Boot“. Now, I have only a limited number of hardware systems in my lab from which to do this, but the steps should be familiar, regardless of the server model. In this blog article I’m going to go over some of steps necessary to configure the ESXi host to use TPM 2.0 chip. In a previous blog post I went over the details on how ESXi uses a TPM 2.0 chip to provide assurance that Secure Boot did its job and how that “attestation” rolls up to vCenter to be reported on.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |