Documentation Index
Fetch the complete documentation index at: https://docs.xloud.tech/llms.txt
Use this file to discover all available pages before exploring further.
Overview
When you launch an instance, you can attach a Virtual TPM (vTPM) device and enforce UEFI Secure Boot directly from the launch wizard. These options harden the guest against bootloader tampering, unlock BitLocker / LUKS disk encryption, and satisfy the hardware requirements for modern guest operating systems such as Windows 11.Prerequisites
- An active image in the Xloud Image Service (UEFI-capable for Secure Boot)
- A flavor appropriate for your workload
- Xloud KMS enabled on the cluster
- For Secure Boot: a guest image that ships signed bootloaders and kernel modules
Video Walkthrough
Where to Find These Options
Both settings live in the Create Instance wizard at: Compute → Instances → Create Instance → Step 3 (System Config) → Advanced OptionsComplete Base Config and Network Config
Pick the image or boot source, flavor, and networks in the first two wizard steps.
If Xloud KMS is disabled, both the Virtual TPM and Secure Boot checkboxes are
grayed out. Contact your administrator and point them at the Key Manager service
setup.
Virtual TPM (vTPM)
A Virtual TPM emulates a hardware Trusted Platform Module inside the instance. It enables measured boot, stores disk-encryption keys securely (BitLocker, LUKS with TPM unsealing), and satisfies TPM-based attestation requirements. The per-instance TPM state is protected by a key managed by Xloud KMS.Enabling vTPM
Tick Virtual TPM
In the Advanced Options panel, select the Virtual TPM checkbox
(“Attach a virtual TPM device to this instance”). Two new fields appear.
Choose a vTPM Version
Pick the TPM specification version from the dropdown:
| Option | When to use |
|---|---|
| TPM 2.0 | Recommended default. Required for Windows 11, modern Linux distributions |
| TPM 1.2 | Legacy compatibility only — older operating systems |
Choose a vTPM Model
Pick the virtual TPM hardware interface:
| Option | When to use |
|---|---|
| Auto | Default. The platform picks the best interface for the chosen version |
| tpm-crb | TPM 2.0 guests (Windows 11, RHEL 9+, Ubuntu 22.04+). Recommended for modern workloads |
| tpm-tis | Legacy TPM 1.2 interface for older operating systems |
After the instance boots, verify the vTPM is present inside the guest:
- Linux:
ls /dev/tpm0andtpm2_getcap properties-fixed - Windows: open tpm.msc — the management console should show a TPM manufactured
by
swtpmwith spec version 2.0
What vTPM Enables
BitLocker on Windows
Windows 10 / 11 can use the vTPM to seal BitLocker keys, so the disk only decrypts on
the same virtual machine.
LUKS on Linux
Linux guests can store LUKS unlock keys in the vTPM with tools like
clevis tpm2 bind — no boot-time passphrase prompt.Measured Boot
The vTPM records a cryptographic measurement of the boot chain, enabling remote
attestation of the guest’s boot integrity.
Windows 11 Hardware Requirements
Windows 11 installation requires TPM 2.0 — vTPM satisfies this without any physical
hardware.
UEFI Secure Boot
Secure Boot is a UEFI firmware feature that prevents unsigned bootloaders, kernels, and drivers from loading — shutting down rootkits and bootkits at the earliest stage of the boot process. Xloud stores the per-instance Secure Boot variables in Xloud KMS so they persist across reboots and live migrations.Enabling Secure Boot
Tick Secure Boot
In the Advanced Options panel, select the Secure Boot checkbox
(“Require Secure Boot for this instance (UEFI + q35)”). A Secure Boot Mode
dropdown appears.
Selecting Secure Boot automatically configures the instance to use UEFI firmware
and the q35 machine type — you do not need to set these manually.
Choose a Secure Boot Mode
Pick how strict the enforcement should be:
| Mode | Behavior |
|---|---|
| Required | The instance will not start if Secure Boot cannot be activated — for example, if the image is not UEFI-capable |
| Optional | Secure Boot is used when available but falls back gracefully if the image or hypervisor cannot support it |
After boot, confirm Secure Boot is active inside the guest:
- Linux:
mokutil --sb-statereturnsSecureBoot enabled - Windows: open msinfo32 — under System Summary, Secure Boot State reads
On
Image Requirements
For Secure Boot to succeed, the guest image must:- Be UEFI-compatible (not BIOS-only)
- Ship with bootloaders and kernels signed by a Certificate Authority recognized by the UEFI firmware (Microsoft UEFI CA for most Windows and Linux distributions)
- Use a recent kernel and
shim/grubversion with Secure Boot enforcement enabled
Using vTPM and Secure Boot Together
You can enable both features on the same instance — this is the recommended configuration for Windows 11, hardened Linux workloads, and any guest that uses TPM-backed disk encryption with measured boot.Windows 11 hardened VM
vTPM 2.0 (tpm-crb) + Secure Boot (Required). BitLocker auto-seals keys to the vTPM
and Secure Boot blocks unsigned drivers.
Hardened Linux VM
vTPM 2.0 (tpm-crb) + Secure Boot (Required) + LUKS with
clevis tpm2 bind.
Full-disk encryption unlocks automatically on the correct hypervisor only.Live Migration Compatibility
Both vTPM state and Secure Boot variables are protected by a key managed by Xloud KMS and are transferred between hypervisors during live migration with no operator intervention. You can move a vTPM-enabled Windows 11 or hardened Linux VM between compute hosts without shutting it down and without re-registering the TPM inside the guest.Xloud-Developed — Live migration of vTPM-enabled instances with automatic key transfer is developed by Xloud and ships with XAVS / XPCI.
Confirm Config Summary
When you reach Step 4 — Confirm Config, the review pane shows the vTPM and Secure Boot settings you selected:| Field | Example value |
|---|---|
| Virtual TPM | Enabled — TPM 2.0 (auto) — or (tpm-crb) / (tpm-tis) if you picked a specific model |
| Secure Boot | Enabled (required, UEFI + q35) — or (optional, UEFI + q35) |
Troubleshooting
The vTPM or Secure Boot checkbox is grayed out
The vTPM or Secure Boot checkbox is grayed out
Xloud KMS is not enabled on the cluster. Ask your administrator to enable the Key
Manager service in XDeploy, then refresh the wizard.
Instance fails to start with Secure Boot = Required
Instance fails to start with Secure Boot = Required
The image is not UEFI-capable or does not ship signed bootloaders. Either switch the
mode to Optional, or rebuild the image with a UEFI-compatible distribution.
Windows 11 installer does not detect a TPM
Windows 11 installer does not detect a TPM
The vTPM was not enabled at launch. You cannot add vTPM to an existing instance —
create a new instance with vTPM ticked, or migrate the workload.
BitLocker or LUKS cannot unseal the key after migration
BitLocker or LUKS cannot unseal the key after migration
Xloud transfers the encrypted vTPM state with the instance. If unsealing fails,
verify Xloud KMS is healthy on both source and destination hosts and that the
instance’s TPM secret still exists in the key manager.
Next Steps
Create Instance
Full 4-step wizard walkthrough for launching instances
Security Hardening
Additional hypervisor-level hardening for sensitive workloads
Key Manager
Xloud KMS setup and secret lifecycle