diff --git a/man/loader.conf.xml b/man/loader.conf.xml
index 56026da20d..1e242c2360 100644
--- a/man/loader.conf.xml
+++ b/man/loader.conf.xml
@@ -293,8 +293,10 @@
Controls enrollment of secure boot keys found on the ESP if the system is in setup mode:
-
- No action is taken.
+
+ This is the default. Same behavior as , but will try to automatically
+ enroll the key named auto if it is considered to be safe. Currently, this is only
+ the case if the system is running inside a virtual machine.
@@ -308,10 +310,8 @@
-
- Same behavior as , but will try to automatically
- enroll the key auto if it is considered to be safe. Currently, this is only
- the case if the system is running inside a virtual machine.
+
+ No action is taken.
diff --git a/man/systemd-boot.xml b/man/systemd-boot.xml
index 0924b4ee88..65be783df7 100644
--- a/man/systemd-boot.xml
+++ b/man/systemd-boot.xml
@@ -392,8 +392,9 @@
Enrollment of Secure Boot variables can be performed manually or automatically if files are available
under /loader/keys/NAME/{db,dbx,KEK,PK}.auth, NAME
being the display name for the set of variables in the menu. If one of the sets is named auto
- then it might be enrolled automatically depending on whether secure-boot-enroll is set
- to force or not.
+ then it might be enrolled automatically depending on the execution environment and the value of the secure-boot-enroll option.
+ See
+ loader.conf5.
diff --git a/src/boot/boot.c b/src/boot/boot.c
index 5df8a6ed56..aa38ff18ee 100644
--- a/src/boot/boot.c
+++ b/src/boot/boot.c
@@ -2997,9 +2997,8 @@ static void config_load_all_entries(
config_add_system_entries(config);
- /* Find secure boot signing keys and autoload them if configured. Otherwise, create menu entries so
- * that the user can load them manually. If the secure-boot-enroll variable is set to no (the
- * default), we do not even search for keys on the ESP */
+ /* Using the rules defined by the `secure-boot-enroll` variable, find secure boot signing keys
+ * and perform operations like autoloading them or create menu entries if configured. */
(void) secure_boot_discover_keys(config, root_dir);
if (config->n_entries == 0)