Asus PRIME Z590-P WIFI Intel 500 series Channel BIOS UM English - Page 54
KEK Management, Save To File, Set New Key, Append Key, Delete key
View all Asus PRIME Z590-P WIFI manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 54 highlights
KEK Management The Key Exchange Keys (KEK) manages the Signature database (db) and Forbidden Signature database (dbx). Key Exchange Keys (KEK) refers to Microsoft Secure Boot Key-Enrollment Key (KEK). Save To File Allows you to save the KEK to a target file system device. Set New Key A popup window will appear if you press . Select [Yes] if you wish to load factory default KEK, or [No] to load KEK from a target file system device. Append Key A popup window will appear if you press . Select [Yes] if you wish to load factory default KEK, or [No] to load additional KEK from a target file system device for an additional db and dbx loaded management. Delete key This item allows you to delete the KEK from NVRAM. Select [Yes] if you wish to delect the variable, or [No] to choose a certificate to be delected from the key database. The KEK file must be formatted as a UEFI variable structure with time-based authenticated variable. DB Management The Authorized Signatures (db) lists the signers or images of UEFI applications, operating system loaders, and UEFI drivers that you can load on the single computer. Save To File Allows you to save the db to a target file system device. Set New Key A popup window will appear if you press . Select [Yes] if you wish to load factory default db, or [No] to load db from a target file system device. Append Key A popup window will appear if you press . Select [Yes] if you wish to load factory default db, or [No] to load additional db from a target file system device for an additional db and dbx loaded management. Delete key Allows you to delete the db from NVRAM. Select [Yes] if you wish to delect the variable, or [No] to choose a certificate to be delected from the key database. The db file must be formatted as a UEFI variable structure with time-based authenticated variable. DBX Management The Forbidden Signature database (dbx) lists the forbidden images of db items that are no longer trusted and cannot be loaded. 54 PRIME / TUF GAMING Intel® 500 Series BIOS Manual