Skip to content

Commit 0638457

Browse files
mrhpearsonjwrdegoede
authored andcommitted
Documentation: syfs-class-firmware-attributes: Lenovo Certificate support
Certificate based authentication is available as an alternative to password based authentication. The WMI commands are cryptographically signed using a separate signing server and will be verified by the BIOS before being accepted. This commit details the fields that are needed to support that implementation. At present the changes are intended for Lenovo platforms, but have been designed to keep them as flexible as possible for future implementations from other vendors. Signed-off-by: Mark Pearson <[email protected]> Link: https://lore.kernel.org/r/[email protected] Reviewed-by: Hans de Goede <[email protected]> Signed-off-by: Hans de Goede <[email protected]>
1 parent 0c2c21a commit 0638457

File tree

1 file changed

+45
-0
lines changed

1 file changed

+45
-0
lines changed

Documentation/ABI/testing/sysfs-class-firmware-attributes

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -246,6 +246,51 @@ Description:
246246
that is being referenced (e.g hdd0, hdd1 etc)
247247
This attribute defaults to device 0.
248248

249+
certificate:
250+
signature:
251+
save_signature:
252+
These attributes are used for certificate based authentication. This is
253+
used in conjunction with a signing server as an alternative to password
254+
based authentication.
255+
The user writes to the attribute(s) with a BASE64 encoded string obtained
256+
from the signing server.
257+
The attributes can be displayed to check the stored value.
258+
259+
Some usage examples:
260+
Installing a certificate to enable feature:
261+
echo <supervisor password > authentication/Admin/current_password
262+
echo <signed certificate> > authentication/Admin/certificate
263+
264+
Updating the installed certificate:
265+
echo <signature> > authentication/Admin/signature
266+
echo <signed certificate> > authentication/Admin/certificate
267+
268+
Removing the installed certificate:
269+
echo <signature> > authentication/Admin/signature
270+
echo '' > authentication/Admin/certificate
271+
272+
Changing a BIOS setting:
273+
echo <signature> > authentication/Admin/signature
274+
echo <save signature> > authentication/Admin/save_signature
275+
echo Enable > attribute/PasswordBeep/current_value
276+
277+
You cannot enable certificate authentication if a supervisor password
278+
has not been set.
279+
Clearing the certificate results in no bios-admin authentication method
280+
being configured allowing anyone to make changes.
281+
After any of these operations the system must reboot for the changes to
282+
take effect.
283+
284+
certificate_thumbprint:
285+
Read only attribute used to display the MD5, SHA1 and SHA256 thumbprints
286+
for the certificate installed in the BIOS.
287+
288+
certificate_to_password:
289+
Write only attribute used to switch from certificate based authentication
290+
back to password based.
291+
Usage:
292+
echo <signature> > authentication/Admin/signature
293+
echo <password> > authentication/Admin/certificate_to_password
249294

250295

251296
What: /sys/class/firmware-attributes/*/attributes/pending_reboot

0 commit comments

Comments
 (0)