You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Acronym / Glossary
Some items to start:
TPer = Trusted Peripheral (and explain what that is)
ACE = Access Control Element (and explain what that is)
SID, MSID, PSID
Difference between SID and Admin1
Actually explain the revised provisioning process (what's accomplished at each step) after integrating CVE/AddUserToLockingACEs
Explain how to enable the User1 account and use it for non-admin unlocking of drive(s).
The text was updated successfully, but these errors were encountered:
Also list any drives that are known/thought/expected to possibly require a PSID revert to use (Micron, Samsung) and the issues with Windows taking crypto ownership for BitLocker/eDrive (and ways to work around that, and the fact that it will show up on clean UEFI+GPT installs if the last install to same hardware was MBR+Legacy Boot)
Also document "oolies" like issue Drive-Trust-Alliance#164 with how UEFI boot paths get managed/deleted both by OS and by BIOS, and may cause things to not work following a GRUB update (which is really a re-install) and the workarounds.
Acronym / Glossary
Some items to start:
TPer = Trusted Peripheral (and explain what that is)
ACE = Access Control Element (and explain what that is)
SID, MSID, PSID
Difference between SID and Admin1
Actually explain the revised provisioning process (what's accomplished at each step) after integrating CVE/AddUserToLockingACEs
Explain how to enable the User1 account and use it for non-admin unlocking of drive(s).
The text was updated successfully, but these errors were encountered: