TPM-backed full disk encryption (FDE) in Ubuntu leverages your system’s trusted platform module to secure the disk encryption key, automating the unlock process at boot without requiring a passphrase. This approach reduces the risk of unauthorized access if someone removes your drive and attempts to read it on another device. It also aligns Ubuntu with enterprise standards seen in technologies like BitLocker and FileVault. However, the setup process can be finicky, especially with certain BIOS/UEFI configurations and hardware quirks.

TPM-Based Full Disk Encryption Using the Ubuntu Installer

Step 1: Prepare your system for installation.

Before starting, back up all important data, as this process will erase the drive. TPM-backed FDE requires a system with a TPM 2.0 chip and UEFI firmware. Make sure your hardware supports Secure Boot and TPM features. Download the latest Ubuntu Desktop ISO (24.04 LTS or later) from the official site and create a bootable USB installer.

Step 2: Configure BIOS/UEFI settings for TPM and Secure Boot.

Boot into your system’s BIOS/UEFI setup. Enable TPM (sometimes labeled as “Security Chip” or “TPM 2.0”). If you’ve previously used the TPM (for example, with BitLocker or another OS), clear or reset it to remove old keys. This is crucial—residual keys or incorrect TPM states often cause the TPM-backed FDE installer option to be greyed out or malfunction. On some devices, you may need to “Restore Security Settings to Factory Defaults” or use the option to clear the TPM. Enable Secure Boot, ensuring that the system is set to allow Microsoft 3rd-party UEFI CA if prompted (especially on Lenovo or similar hardware). Save and exit the BIOS/UEFI settings.

Step 3: Start the Ubuntu installer and select TPM-backed encryption.

Boot from your Ubuntu USB stick. When you reach the disk setup screen, look for the option labeled “TPM-backed full disk encryption” or “hardware-backed encryption.” If it’s greyed out, double-check your BIOS/UEFI settings and ensure the TPM is enabled and cleared. Sometimes, a full reset of BIOS/UEFI settings to defaults resolves stubborn issues. Select the TPM-backed encryption option and proceed with installation. The installer will configure LUKS disk encryption and arrange for the encryption key to be sealed to the TPM, so only the authorized boot process can unlock it.

Step 4: Complete installation and record recovery keys.

During installation, you may be prompted to back up recovery keys. Use the provided command (such as snap recovery --show-keys) to display and securely store your recovery keys. This is critical: if the TPM state changes or the system firmware is updated, you may need these keys to regain access to your data. Finish the installation. On reboot, the system should unlock the encrypted disk automatically using the TPM, bringing you directly to the Ubuntu login screen.

Step 5: Test the setup and understand security implications.

After installation, power off the machine completely and boot it again to confirm that the disk unlocks automatically. If the system requests a recovery key on first boot, it indicates a mismatch or misconfiguration in the TPM or Secure Boot state. Return to the BIOS/UEFI and review the settings. Note that while TPM-backed FDE prevents disk access if the drive is removed, it does not protect against access when the system is running or if someone bypasses your login screen. For stronger protection, you can configure an additional passphrase requirement during boot.

Alternative: Adding a Passphrase to TPM-Backed Encryption

For users who require higher security—such as protection against theft of a powered-off device—combine TPM-backed FDE with a traditional passphrase. This requires entering a password at boot in addition to TPM validation. During installation or post-install, you can add a passphrase to the LUKS key slot using:

sudo cryptsetup luksAddKey /dev/your_encrypted_device

This method prevents automatic unlocking and ensures only users with the correct passphrase can decrypt the drive, even if the TPM is compromised.

Troubleshooting Common Issues

Some devices may not present the TPM-backed FDE option due to firmware bugs, unsupported hardware, or installer limitations. If the option remains unavailable:

  • Update your system BIOS/UEFI to the latest version.
  • Clear the TPM from BIOS/UEFI, not just the OS.
  • Reset Secure Boot keys or restore security settings to factory defaults.
  • Disable third-party drivers or kernel modules during installation, as these can interfere with Secure Boot and TPM validation.
  • Try an alternative installer ISO if your hardware is not recognized by the default Ubuntu installer.

Check Ubuntu’s official documentation, forums, or bug trackers for device-specific workarounds if issues persist.

Security Considerations and Limitations

TPM-backed FDE blocks attacks where an adversary removes your disk and tries to access it on another machine. However, if an attacker gains access to your running system or bypasses your login screen, your data is vulnerable. On some enterprise hardware, physical attacks against the TPM (such as desoldering or exploiting vulnerabilities) are theoretically possible but require significant resources. For most users, TPM-backed FDE offers a strong balance between convenience and security, but high-risk users should consider adding a passphrase or using tamper-evident hardware.


TPM-based full disk encryption in Ubuntu streamlines secure boot and data protection, but careful BIOS/UEFI setup and key management are essential for reliable operation. Always test your configuration and keep recovery keys safe for future access.