Otherwise, the Secure Boot setup fails during the setup process.
2. At the encryption select step, I can’t select HW FDE because of Intel BootGuard configuration, but it is hardware-enforced, and I can’t configure it in the HP UEFI/BIOS settings menu.
In this case, it will also reset TPM, Fingerprint, and Absolute Persistence Module.
For the HP EliteBook 850 G8,
This action is enough, but not in this case.
Are there any suggestions?
Hi @didrocks! I just tested out 25.10 beta along with previous daily builds and I am still having issues on amd/intel devices (from lenovo and asus respectively )which seems to be a regressions compared to 25.04
The launchpad bug has links attached for your reference regarding my previous discussion of this issue. If you need more info let me know
I tried to install Ubuntu 25.10 Beta to Framework 13 Ryzen 300 and I see error about TPM:
not encrypting device storage as checking TPM gave: error with system security: unsupported platform: checking host security is not yet implemented for AMD
What would be super cool is if the security centre could escrow the recovery key away to somewhere like Landscape. Then admins would have a centralised way to pull recovery keys like Bitlocker does.
Since many companies managing Windows and macOS via Intune and save recovery keys in Entra ID, I think this is must have functionality.
It can be realized via CLI command or via synchronization between Landscape and Entra ID via Intune portal.
Couldn’t agree more. The lack of an escrow the recovery key is why we can’t implement Ubuntu on a laptops at my company. I’ve been testing a couple of ways to save keys to various Vaults or Active Directory attributes by running scripts manually but it isn’t suitable for corporate environments. I’m looking forward to this feature in 26.04 LTS
Would you be able to expand a little on our solution? I’m having the same issue - managing a fleet of ~100 clients and need to start of rollout of FDE. So the intune/landscape integrations is crucial but my guess Is that it will take some time… Until then I need to integrate something custom in my PXE-based provisioning flow…
Use early-commands section to generate a LUKS passphrase. We use a function built into our python script, but you could just as easily do a one-liner like openssl rand -base64 16 > /tmp/luks_passphrase
Configure Ubuntu with autoinstall but use a custom storage layout. I couldn’t see any way to use the premade storage layouts with a specified LUKS passphrase file. You can only specify a single LUKS passphrase here, so if you need more that needs to be done in late-commands section.
During late-commands section we run our python scripts to add an additional LUKS passphrase to the volume.
We also use another script which will POST both the LUKS passphrases back to our Foreman orchestration server as host parameters.
I can’t share the raw scripts, but if you’re interested I can try to redact some stuff.
Thanks, this is really helpful. In terms of provisioning I’m doing something similar (except FDE) but based on PXE instead of USB. Being a FDE/luks/exncryption noob … is the /tmp/luks_admin_passphrase they key do (stored in TPM?) for decryption. What about the recovery key? I see luks_recovery.py - is that your own code or something shipped with luks? Any scripts, redacted, is highly appreciated - I’m not looking for a complete solution but rather good archtictual ideas end examples to build upon.
Above example is just bog-standard LUKS encryption for the entire root partition (effectively FDE) with 2 passphrases. No TPM involved in this setup, just a separate disk encryption passphrase at startup.
TPM-FDE is still experimental and the autoinstall process is very hands-off. I think you can only configure it with one of the automatic storage layouts.
I never found a good way to extract the recovery key at deployment time for escrow.
I can send a PM with the script content, but I probably it’s not entirely relevant for your use-case.
Tested in on final release of Ubuntu 25.10. During install the option was greyed out, could not use TPM. Having dual-boot with windows, so TPM is enabled. Computer: asus zephyrus g16
fwupdmgr shows Linux kernel tainted Is that normal on a new install?
Is there a option to retry to use the TPM after installation?
Thanks for your confirmation. But do you see a reason from this why TPM was not supported during install? Do you know if I can try to activate TPM key store once Ubuntu is installed?