PowerEdge: Troubleshooting Trusted Platform Module (TPM) Secure Boot, and ESXi

Summary: This knowledge base article offers a detailed guide for troubleshooting Trusted Platform Module (TPM) 2.0, Secure Boot, and ESXi-related issues on Dell servers. It provides step-by-step instructions to address common problems, ensuring the proper functioning and security of your server. ...

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Symptoms

  • The host status in the Attestation column shows "Host Secure Boot was disabled"
  • Trusted Platform Module (TPM) 2.0 device detected but a connection cannot be established
  • The host status in the Attestation column shows "N/A"
  • When using a TPM 2.0 (Trusted Platform Module) device on an ESXi host, the host fails to pass the attestation phase
  • The error message is "Unable to provision Endorsement Key on TPM 2.0 device: Endorsement Key creation failed on the device"

Cause

Causes of Secure Boot and TPM issues include disabled Secure Boot, misconfigured BIOS, hardware compatibility, faulty TPM 2.0 module, and TPM settings.

Resolution

Troubleshooting TPM and Secure Boot Issues on Dell Servers

Table of Contents:

Introduction
Prerequisites
Troubleshooting TPM and Secure Boot Issues
Troubleshooting Attestation Issues
Enabling TPM Hierarchy


Introduction

This knowledge base article provides step-by-step instructions to troubleshoot and resolve common issues related to Trusted Platform Module (TPM) and Secure Boot on Dell servers. These issues can hinder proper attestation and system functionality. Follow the instructions outlined in this document to ensure the optimal performance of your Dell server.


Prerequisites

  • Make sure the TPM 2.0 device is detected and healthy from the iDRAC.
  • Ensure that UEFI, TPM, and Secure Boot are enabled.
  • Use TPM 2.0 algorithm "SHA256," enable Intel TXT 

For detailed information and troubleshooting guidance regarding the issue of "TPM 2.0 device detected but a connection cannot be established," see article 000193231 available here:

PowerEdge: Error on ESXi 7.0 TPM 2.0 device detected but a connection cannot be established
 


Troubleshooting TPM and Secure Boot Issues

How to Enable Secure Boot

  1. View the ESXi host alarm status and accompanying error message.
  2. Connect to vCenter Server using the vSphere Client.
  3. Select a data center and click the Monitor tab.
  4. Click Security.
  5. Review the host status in the Attestation column and read the accompanying message in the Message column.
  6. If the error message is "Host Secure Boot was disabled," follow these steps to resolve the issue:
    • Verify whether Secure Boot can be enabled. If it cannot be enabled, contact Dell Tech Support.
    • To enable Secure Boot, follow these steps:
      • From the VMware vCenter vSphere Client, move one node to Enter Maintenance Mode.
      • Log in to iDRAC to configure Secure Boot, and select the Configure tab > BIOS Settings > System Security > TPM Advanced Settings.
      • Select Secure Boot "enable" and click Apply > OK > Apply and Reboot.
      • Click Job queue. Wait for all jobs to complete 100%.
      • Log in to the VMware vCenter vSphere Client and set the node to Exit Maintenance Mode.
    • Perform Step 6 on each node until all nodes have Secure Boot enabled from iDRAC.
    • Log in to VMware vCenter vSphere Client and select the data center.
    • Click the Monitor tab > Security to verify that the latest Attestation status shows "Passed."
    • If you see an alarm with a red icon, select it and click RESET TO GREEN.

How to Enable TPM and Secure Boot

  1. View the ESXi host alarm status and accompanying error message.
  2. Connect to VMware vCenter Server using the VMware vSphere Client.
  3. Select a data center and click the Monitor tab.
  4. Click Security.
  5. Review the host status in the Attestation column and read the accompanying message in the Message column.
  6. If the error message is "N/A," you must enable TPM and Secure Boot to resolve the issue.
    • Verify whether Secure Boot can be enabled. If it cannot be enabled, contact Dell Tech Support.
    • To enable TPM and Secure Boot, follow these steps:
      • From the VMware vCenter vSphere Client, move one node to Enter Maintenance Mode.
      • Log in to iDRAC to configure Secure Boot, and select the Configure tab > BIOS Settings > System Security > TPM Security "On" > TPM Advanced Settings.
      • Select Secure Boot "enable" and click Apply > OK > Apply and Reboot.
      • Click Job queue. Wait for all jobs to complete 100%.
      • Go to Dashboard > Virtual Console to see if the console shows "successfully completed." If yes, continue.
      • Log in to VMware vCenter vSphere Client and disconnect the node.
      • Reconnect the node, and then Exit Maintenance Mode.
    • Perform Steps 6 on each node until all nodes have TPM and Secure Boot enabled from iDRAC.
    • Log in to VMware vCenter vSphere Client and go to the data center.
    • Click the Monitor tab > Security to verify the latest Attestation message as "Passed."
    • If you see an alarm with a red icon, select the specific Triggered Alarm and click RESET TO GREEN.

Host Attestation Issues

When using a TPM 2.0 device on an ESXi host, it may fail attestation without detailed vSphere Client information. To troubleshoot this issue, follow these steps:

  1. Navigate to a data center and click the Monitor tab.
  2. Click Security.
  3. Review the host’s status in the Attestation column and read the accompanying message in the Message column.

Now, depending on the error message you encounter, you can identify a solution:

  • If the error message is Host Secure Boot was disabled, see the How to Enable Secure Boot section to resolve this issue. Ensure Secure Boot is functioning first.
  • If the attestation status of the host is failed, check the vCenter Server log for the following message: "No cached identity key, loading from DB." This message indicates that you are adding a TPM 2.0 chip to an ESXi host that vCenter Server already manages. You must first disconnect the host, then reconnect it.

How to Enable Hierarchy

If the error message is "Unable to provision Endorsement Key on TPM 2.0 device: Endorsement Key creation failed on the device," you must enable TPM Hierarchy to resolve the issue. Follow these steps to enable TPM Hierarchy:

  1. View the ESXi host alarm status and accompanying error message.
  2. Connect to VMware vCenter Server using the VMware vSphere Client.
  3. Select a data center and click the Monitor tab.
  4. Click Security.
  5. Review the host’s status in the Attestation column and read the accompanying message in the Message column.
  6. If the error message is "Unable to provision Endorsement Key on TPM 2.0 device: Endorsement Key creation failed on the device," you must enable TPM Hierarchy to resolve the issue.
  7. If you see an alarm with a red icon, select the specific Triggered Alarm and click RESET TO GREEN.
  8. To enable TPM Hierarchy, follow these steps:
    • From the VMware vCenter vSphere Client, move one node to Enter Maintenance Mode.
    • Log in to iDRAC to configure Secure Boot, and select the Configure tab > BIOS Settings > System Security > TPM.
    • Select TPM Hierarchy "Enable" and click Apply > OK > Apply and Reboot.
    • Click Job queue. Wait for all jobs to complete 100%.
    • Go to Dashboard > Virtual Console to see if the console shows "successfully completed." If yes, continue.
    • Log in to the VMware vCenter vSphere Client and select Exit Maintenance Mode.
  9. Perform Steps 7 and 8 on each node until all nodes have TPM Hierarchy enabled from iDRAC.
  10. Log in to VMware vCenter vSphere Client and select a data center.
  11. Click the Monitor tab > Security to verify the latest Attestation message as "Passed."
Note: VMware QuickBoot is not supported when Secure Boot is enabled.

Contact us if the troubleshooting steps did not resolve the issue. 

Affected Products

OEMR R240, OEMR R250, OEMR XE R250, OEMR R260, OEMR XE R260, OEMR R340, OEMR R350, OEMR XE R350, OEMR R360, OEMR XE R360, OEMR R440, PowerEdge XR2, OEMR R450, OEMR R540, OEMR R550, OEMR R640, OEMR XL R640, OEMR R6415, OEMR R650, OEMR R650xs , OEMR R6515, OEMR R6525, OEMR R660, OEMR XL R660, OEMR R660xs, OEMR R6615, OEMR R6625, OEMR R740, OEMR XL R740, OEMR R740xd, OEMR XL R740xd, OEMR R740xd2, OEMR R7415, OEMR R7425, OEMR R750, OEMR R750xa, OEMR R750xs, OEMR R7515, OEMR R7525, OEMR R760, OEMR R760xa, OEMR R760XD2, OEMR XL R760, OEMR R760xs, OEMR R7615, OEMR R7625, OEMR R840, OEMR R860, OEMR R940, OEMR R940xa, OEMR R960, OEMR T140, OEMR T150, OEMR T340, OEMR T350, OEMR T360, OEMR T440, OEMR T550, OEMR T560, OEMR T640, OEMR XL T640, OEMR XL R240, OEMR XL R340, OEMR XL R660xs, OEMR XL R6615, OEMR XL R6625, OEMR XL R6715, OEMR XL R6725, OEMR XL R760xs, OEMR XL R7615, OEMR XL R7625, OEMR XL R7715, OEMR XL R7725, OEMR XR11, OEMR XR12, OEMR XR4510c, OEMR XR4520c, OEMR XR5610, OEMR XR7620, OEMR XR8610t, OEMR XR8620t, Poweredge C4140, PowerEdge C6420, PowerEdge C6520, PowerEdge C6525, PowerEdge C6615, PowerEdge C6620, PowerEdge FC640, PowerEdge HS5610, PowerEdge HS5620, PowerEdge M640, PowerEdge M640 (for PE VRTX), PowerEdge MX740C, PowerEdge MX750c, PowerEdge MX760c, PowerEdge MX840C, PowerEdge R240, PowerEdge R250, PowerEdge R260, PowerEdge R340, PowerEdge R350, PowerEdge R360, PowerEdge R440, PowerEdge R450, PowerEdge R470, PowerEdge R540, PowerEdge R550, PowerEdge R640, PowerEdge R6415, PowerEdge R650, PowerEdge R650xs, PowerEdge R6515, PowerEdge R6525, PowerEdge R660, PowerEdge R660xs, PowerEdge R6615, PowerEdge R6625, PowerEdge R670, PowerEdge R740, PowerEdge R740XD, PowerEdge R740XD2, PowerEdge R7415, PowerEdge R7425, PowerEdge R750, PowerEdge R750XA, PowerEdge R750xs, PowerEdge R7515, PowerEdge R7525, PowerEdge R760, PowerEdge R760XA, PowerEdge R760xd2, PowerEdge R760xs, PowerEdge R7615, PowerEdge R7625, PowerEdge R770, PowerEdge R7715, PowerEdge R7725, PowerEdge R840, PowerEdge R860, PowerEdge R940, PowerEdge R940xa, PowerEdge R960, PowerEdge T140, PowerEdge T150, PowerEdge T160, PowerEdge T340, PowerEdge T350, PowerEdge T360, PowerEdge T40, PowerEdge T440, PowerEdge T550, PowerEdge T560, PowerEdge T640, PowerEdge XE2420, PowerEdge XE7420, PowerEdge XE7440, PowerEdge XE8545, PowerEdge XE8640, PowerEdge XE9640, PowerEdge XE9680, PowerEdge XR11, PowerEdge XR12, PowerEdge XR4510c, PowerEdge XR4520c, PowerEdge XR5610, PowerEdge XR7620, PowerEdge XR8610t, PowerEdge XR8620t, PowerFlex appliance R650, PowerFlex appliance R6525, PowerFlex appliance R660, PowerFlex appliance R6625, Powerflex appliance R750, PowerFlex appliance R760, PowerFlex appliance R7625, PowerFlex custom node R650, PowerFlex custom node R6525, PowerFlex custom node R660, PowerFlex custom node R6625, PowerFlex custom node R750, PowerFlex custom node R760, PowerFlex custom node R7625, PowerFlex custom node R860, VxFlex Ready Node, VxFlex Ready Node R640, VxFlex Ready Node R740xd, VMware ESXi 7.x, VMware ESXi 8.x, Dell EMC vSAN C6420 Ready Node, Dell EMC vSAN MX740c Ready Node, Dell EMC vSAN MX750c Ready Node, Dell vSAN Ready Node MX760c, Dell EMC vSAN R440 Ready Node, Dell EMC vSAN R640 Ready Node, Dell EMC vSAN R6415 Ready Node, Dell EMC vSAN R650 Ready Node, Dell EMC vSAN R6515 Ready Node, vSAN Ready Node R660, Dell vSAN R6615 Ready Node, Dell EMC vSAN R740 Ready Node, Dell EMC vSAN R740xd Ready Node, Dell EMC vSAN R750 Ready Node, Dell EMC vSAN R7515 Ready Node, Dell EMC vSAN R760 Ready Node, Dell vSAN R7615 Ready Node, Dell vSAN Ready Node R7625, Dell EMC vSAN R840 Ready Node, Dell EMC vSAN T350 Ready Node, PowerFlex appliance R640, PowerFlex appliance R740XD, PowerFlex appliance R7525, PowerFlex appliance R840, VxFlex Ready Node R840 ...
Article Properties
Article Number: 000218542
Article Type: Solution
Last Modified: 12 Feb 2025
Version:  3
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.