Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1154485 - [RFE][ironic]: Support for UEFI secure boot
[RFE][ironic]: Support for UEFI secure boot
Status: CLOSED ERRATA
Product: Red Hat OpenStack
Classification: Red Hat
Component: openstack-ironic (Show other bugs)
unspecified
Unspecified Unspecified
high Severity low
: ga
: 7.0 (Kilo)
Assigned To: Lucas Alvares Gomes
Toure Dunnon
https://blueprints.launchpad.net/iron...
upstream_milestone_kilo-rc1 upstream_...
: FutureFeature
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2014-10-20 00:02 EDT by RHOS Integration
Modified: 2015-08-05 09:15 EDT (History)
4 users (show)

See Also:
Fixed In Version: openstack-ironic-2015.1.0-2.el7ost
Doc Type: Enhancement
Doc Text:
The Bare Metal service can now deploy nodes using the Secure Boot feature of the UEFI (http://www.uefi.org). Secure Boot helps ensure that nodes boot only trusted software. With this, the whole boot chain can be verified at boot time. You can then configure nodes to only boot authorized images, thereby enhancing security.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-08-05 09:15:07 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHEA-2015:1548 normal SHIPPED_LIVE Red Hat Enterprise Linux OpenStack Platform Enhancement Advisory 2015-08-05 13:07:06 EDT

  None (edit)
Description RHOS Integration 2014-10-20 00:02:59 EDT
Cloned from launchpad blueprint https://blueprints.launchpad.net/ironic/+spec/uefi-secure-boot.

Description:

Some of the Ironic drivers supports UEFI deploy. It would be useful to the security sensitive customers to deploy baremetal using 'Secure Boot' supported by the UEFI.

Specification URL (additional information):

None
Comment 6 errata-xmlrpc 2015-08-05 09:15:07 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2015:1548

Note You need to log in before you can comment on or make changes to this bug.