First of all, avoid whenever you can, as this is a scam, only secure in its name (see CVE-2016-332, CVE-2016-3287, CVE-2020-14372, CVE-2020-20233, CVE-2020-25632, CVE-2020-25647, CVE-2020-27779, CVE-2020-27749, CVE-2021-3418, CVE-2021-20233, CVE-2021-20225, CVE-2022-21894, CVE-2022-34301, CVE-2022-34302, CVE-2022-34303, etc).
If you can't avoid it for whatever reason, here are the steps.
shimx64.efi
and mmx64.efi
files from the RPM.EFI\BOOT\BOOTX64.EFI
to EFI\BOOT\GRUBX64.EFI
on the ESP partition.shimx64.efi
to the ESP as EFI\BOOT\BOOTX64.EFI
.mmx64.efi
to the ESP as EFI\BOOT\MMX64.EFI
.EFI\BOOT\BOOTX64.EFI
, add it if it's missing.Enroll hash from disk
.EFI\BOOT\GRUBX64.EFI
and add it to the MokList.Continue boot
.After this (and on every subsequent reboots) Easyboot should start in Secure Boot mode.