You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: powerapps-docs/maker/common/wrap/create-key-vault-for-code-signing.md
+11-13Lines changed: 11 additions & 13 deletions
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ contributors:
14
14
- mkaur-msft
15
15
---
16
16
# Create Azure key valut for wrap for Power Apps
17
-
You need to have [Azure Key Vault](/azure/key-vault/general/basic-concepts) set up to automatically sign your Android or iOS mobile app package in [Step 2](wrap-how-to.mdstep-2-target-platform) of wrap wizard. Azure key vault is a cloud service that provides a secure store for secrets. You can securely store keys, passwords, certificates, and other secrets. More information:[Intoduction to Azure key vault](/azure/key-vault/general/overview).
17
+
You need to have [Azure Key Vault](/azure/key-vault/general/basic-concepts) set up to automatically sign your Android or iOS mobile app package in [Step 2](wrap-how-to.mdstep-2-target-platform) of the wrap wizard. Azure key vault is a cloud service that provides a secure store for secrets. You can securely store keys, passwords, certificates, and other secrets. For more information, see[Intoduction to Azure key vault](/azure/key-vault/general/overview).
18
18
19
19
You can use an exsiting Azure key vault or create a new one one [Azure portal](https://portal.azure.com) using the instructions below.
20
20
@@ -24,31 +24,29 @@ You can use an exsiting Azure key vault or create a new one one [Azure portal](h
24
24
- Admin access for your tenant.
25
25
- You need to have a [Apple account](https://developer.apple.com) enrolled in Apple developer Program or Apple enterprise developer program.
26
26
- Create a [distribution certificate](code-sign-ios.md#create-the-distribution-certificate) or [ad-hoc Provisioning Profile](code-sign-ios.md#create-an-ios-provisioning-profile) or enterprise provisioning profile.
27
+
27
28
28
29
Follow these steps to create **Azure key vault** for wrap for Power Apps and configure **KeyVault URI**:
29
30
30
31
1. Sign in to your tenant as an admin and create a new Azure service principal for 1P AAD application: **4e1f8dc5-5a42-45ce-a096-700fa485ba20 (WrapKeyVaultAccessApp)** by running the following script: <br>
31
32
`Connect-AzureAD -TenantId <your tenant ID>` in Power Shell <br>
2. In your default subscription's **Access Control (IAM)**, add a **Reader** role assignment to the **Service Principal** representing your app, e.g. **Wrap KeyVault Access App**. Make sure it is present in the **Subscription's IAM**, and the **Keyvault's IAM**.
35
-
36
-
1. Go to **Access control (IAM)** tab and select **Add role assignment** option under **Add** menu button.
37
-
38
-
> [!div class="mx-imgBorder"]
39
-
> 
35
+
2. In your default subscription's **Access Control (IAM)**, add a **Reader** role assignment to the **Service Principal** representing your app such as **Wrap KeyVault Access App**. Make sure it's present in the **Subscription's IAM**, and the **Keyvault's IAM**.
40
36
41
-
2. Select **Job fucntion roles** tab and make sure **Reader** role is selcetdd. Then click on **Members** tab in the top menu.
37
+
1. On the left select **Access control (IAM)** tab and then select **Add** > **Add role assignment**.
38
+
39
+
2. Select the **Members** tab and then select **Job fucntion roles**. Make sure the **Reader** role is selected.
42
40
43
41
> [!div class="mx-imgBorder"]
44
-

42
+
>
45
43
46
-
3. Search for **Wrap KeyVault Access App** on **Members** tab.
44
+
4. Search for **Wrap KeyVault Access App** on **Members** tab.
47
45
48
46
> [!div class="mx-imgBorder"]
49
47
> 
50
48
51
-
4. Select **Wrap KeyVault Access App**and click on **Review + assign** button on the bottom of the tab to assign **Reader** role to it.
49
+
5. Select **Wrap KeyVault Access App**> **Review + assign** to assign **Reader** role to it.
52
50
53
51
> [!div class="mx-imgBorder"]
54
52
> 
@@ -58,14 +56,14 @@ Follow these steps to create **Azure key vault** for wrap for Power Apps and con
58
56
59
57
4. Add access policies for the key vault.
60
58
61
-
:::image type="content" source="media/wrap-canvas-app/wrap-keyvault.gif" alt-text="Add access policies for the key vault.":::
62
59
63
60
5. Follow one of the these options, depending on your device:
64
61
- For Android, create the .pfx file upload it to the keyvault certificate section. More information: [Generate keys](code-sign-android.md#generate-keys)
65
62
66
63
:::image type="content" source="media/wrap-canvas-app/wrap-1.png" alt-text="Create a cert for Android.":::
64
+
67
65
> [!NOTE]
68
-
> The name of the certificate must be present in the tag step. The password also needs match the password you entered during the store pass parameter used to create the .pfx file in step 2.
66
+
> The name of the certificate must be present in the tag step. The password also needs match the password you entered during the store pass parameter used to create the .pfx file in step 2.
69
67
70
68
- For iOS:
71
69
1. Install the .cer into Keychain Access app by double clicking it. More information: [Create the distribution certificate](code-sign-ios.md#create-the-distribution-certificate) </br> Then export the file as a .p12 file by right clicking your certificate file and the select **Export** and select the file format .p12.
0 commit comments