2.2.3.2 Removing Keys for Secure Boot Using mokutil
On bare metal database servers and KVM hosts, you can remove keys associated with Secure Boot using the Machine Owner Keys (MOK) utility (mokutil).
You must run the mokutil
command as the root
user.
You can run mokutil --help
to view additional details about the mokutil
command.
WARNING:
Ensure that you do not alter or remove the Oracle-supplied keys and certificates included with the system. To identify an Oracle-supplied key, examine the corresponding certificate and look for Oracle (O=Oracle America Inc.
) in the subject information. For example:
# mokutil --list-enrolled
[key 1]
SHA1 Fingerprint: 5f:f4:35:5a:49:ec:8d:f1:56:d1:ee:9b:ac:f6:19:54:08:77:d3:59
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
21:b3:c1:01:19:dc:af:44:43:15:8b:0f:33:6b:18:be
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, O=Symantec Corporation, OU=Symantec Trust Network,
CN=Symantec Class 3 Extended Validation Code Signing CA - G2
Validity
Not Before: Jun 30 00:00:00 2020 GMT
Not After : Jul 1 23:59:59 2021 GMT
Subject: jurisdictionC=US/jurisdictionST=Delaware/businessCategory=Private Organization/serialNumber=2101822,
C=US/postalCode=94065, ST=California, L=Redwood City/street=500 Oracle Parkway,
O=Oracle America Inc., OU=Winqual, CN=Oracle America Inc.
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
...
Parent topic: Managing Keys and Certificates Used with Secure Boot