TPM-backed FDE: Take 2 minutes to help widen Ubuntu compatibility with your TPM configuration!

Guys, on all my testing device models (corporate HP and DELL), the Ubuntu 26.04 Snapshot 3 has been successfully installed in TPM FDE mode.

  1. You need to disable Absolute:
    On DELL, it is Easy, just navigate to the firmware’s security settings and set Absolute to Disable, don’t select permanent disable, or to enable back, you will need to visit the service center :smiley: .
    On HP, it is harder; you need to install Windows or get WindowsPE, since PowerShell commands are based on WMIC.
    There is no single solution; you must read available firmware parameters and call the best one. On some models, you can use disable Absolute, on others, only permanent disable is available.
  2. Don’t forget to initiate TPM cleanup on next boot, or Ubuntu installer will suggest to initiate the same option, otherwise it will not beable to enable TPM FDE.
    That’s all, good luck!

The Ubuntu 26.04 Snapshot 3 has been successfully installed in TPM FDE mode, on VirtualBox 7.2.6.

1 Like

Dear, @didrocks Absolute starts Linux initial support early 2026, is there a chance, that Ubuntu will participate?

It will be enough to bypass the necessity to disable Absolute in firmware for TPM FDE.

Absolute Secure Endpoint Product Update - October 2025 https://community.absolute.com/s/article/Absolute-Secure-Endpoint-Product-Update-October-2025

Why isn’t it enough to just have the Absolute module in the “Inactive” state? In this state, he shouldn’t do anything, right? TPM FDE on Ubuntu worked like this before, so why not now?

I also wouldn’t want to permanently lose the ability to use it at some point in the future.

Because, if you try to install Ubuntu in TPM FDE mode it will warn that you must disable Absolute, even if it is in inactive state, and if you ignore the warning and finish the installation successfully, after reboot you will get the TPM lock, since even in inactive state, Absolute is trying to inject it’s rootkit into OS Bootloader, Secure Boot reports that something changed in PCR7 and you will get a lockout, this is how Absolute works, the inactive state means that it’s working but not configured.

Please distinguish, Absolute have two states, Disabled, which means you can enable it back, and Permanently Disabled, which means, only service center expert can enable it back.

Active and Inactive is about subscription and configuration.

Experimental TPM-backed FDE already worked in 24.04.3 LTS and Absolute module in “Inactive” state did not interfere with it. After reboot, the disk automatically unlocked normally and the laptop booted without any problems. Therefore, I would expect that inactive Absolute module (even if enabled) has no reason to try to inject something somewhere. But I don’t see deeper into this topic, I just tried what I could.

Please try Ubuntu 26.04 Snapshot 3, there are too many fixes for TPM.

@didrocks , Owner of https://www.acer.com/ua-uk/support/product-support/AN17-41/NH.QL1EU.003/ here, did the things to add my two answers to the form.
I was monkey-testing the Racoon Daily 2026-03-12 iso, to get TPM FDE variant, and got stuck with
PCR_UNUSABLE
error with secure boot policy (PCR7) measurements: generating secure boot profiles for systems with timestamp revocation (dbt) support is currently not supported
Anything I could do to help with this config?
I also showed up here: WithSecureBootPolicyProfile should accommodate systems that support timestamp revocation · Issue #306 · canonical/secboot · GitHub

What solved the issue for me (autoinstall, non interactive installation process):

  1. First I got the problem “Subiquity/apply_autoinstall_config: hybrid layout (with encryption) is not available: tpm-hierarchies-owned” - Solved by clearing TPM in BIOS.
  2. Then I got the issue: “Error: shim protocols not found” after the installation went through - Solved by removing fast boot.
  3. After that the computer boots up completely fine, with full disk encryption, working perfectly.

Only issue I am having now, is to somehow save the recovery key for the encryption, so that I can send it to AD through ldap.

Since snapd –show-key is no longer supported on Ubuntu 25.10+, I can’t pull the recovery key that way. Manually retrieving it through Security Center is not an option for large‑scale deployments.

I’m currently exploring whether it’s possible to generate a new recovery key and extract it through the snapd REST API instead.

No success grabbing the recovery key through CLI so far.

Thanks a lot for everyone’s participation!

WIth latest beta image for resolute being out, with some manual update, you are able to test the latest state of our TPM/FDE detection. We would be really interested to get your feedback and remaining configurations where some adjustements are needed.

All the instructions are available in this new poll. Thanks a lot in advance for your participation!

1 Like

TPM FDE works perfectly on corporate HP and Dell laptops, expect two cases:

  1. In case of any HP EliteBook, ProBook and ZBook (all models are Ubuntu certified) the Absolute software was in Inactive state, and it crushing the installation, to disable it we need to use an WMI based commans in PowerShell. But the painful point is that in the last two generations, the “disable” option is gone, we can use only “permanently disable” option.
  2. Because of Snap Kernel (I tested Beta image with Linux 7 kernel) I faced a “dummy output” for audio devices on latest two generations of laptops, older ones aren’t affected.
1 Like