<para>Controls enrollment of secure boot keys found on the ESP if the system is in setup mode:
<variablelist>
<varlistentry>
- <term><option>off</option></term>
- <listitem><para>No action is taken.</para>
+ <term><option>if-safe</option></term>
+ <listitem><para>This is the default. Same behavior as <option>manual</option>, but will try to automatically
+ enroll the key named <literal>auto</literal> if it is considered to be safe. Currently, this is only
+ the case if the system is running inside a virtual machine.</para>
<xi:include href="version-info.xml" xpointer="v253"/></listitem>
</varlistentry>
</varlistentry>
<varlistentry>
- <term><option>if-safe</option></term>
- <listitem><para>Same behavior as <option>manual</option>, but will try to automatically
- enroll the key <literal>auto</literal> if it is considered to be safe. Currently, this is only
- the case if the system is running inside a virtual machine.</para>
+ <term><option>off</option></term>
+ <listitem><para>No action is taken.</para>
<xi:include href="version-info.xml" xpointer="v253"/></listitem>
</varlistentry>
<para>Enrollment of Secure Boot variables can be performed manually or automatically if files are available
under <filename>/loader/keys/<replaceable>NAME</replaceable>/{db,dbx,KEK,PK}.auth</filename>, <replaceable>NAME</replaceable>
being the display name for the set of variables in the menu. If one of the sets is named <filename>auto</filename>
- then it might be enrolled automatically depending on whether <literal>secure-boot-enroll</literal> is set
- to force or not.</para>
+ then it might be enrolled automatically depending on the execution environment and the value of the <literal>secure-boot-enroll</literal> option.
+ See
+ <citerefentry><refentrytitle>loader.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>.</para>
</refsect1>
<refsect1>
config_add_system_entries(config);
- /* Find secure boot signing keys and autoload them if configured. Otherwise, create menu entries so
- * that the user can load them manually. If the secure-boot-enroll variable is set to no (the
- * default), we do not even search for keys on the ESP */
+ /* Using the rules defined by the `secure-boot-enroll` variable, find secure boot signing keys
+ * and perform operations like autoloading them or create menu entries if configured. */
(void) secure_boot_discover_keys(config, root_dir);
if (config->n_entries == 0)