Skip to content

Commit 83a6bdc

Browse files
authored
Update wrap-how-to.md
1 parent 38fdb5b commit 83a6bdc

File tree

1 file changed

+0
-67
lines changed

1 file changed

+0
-67
lines changed

powerapps-docs/maker/common/wrap/wrap-how-to.md

Lines changed: 0 additions & 67 deletions
Original file line numberDiff line numberDiff line change
@@ -162,74 +162,7 @@ After a successful build, you'll see your mobile app in the **app center locatio
162162

163163
For testing and distribution, see [App center test](/appcenter/test-cloud/) and [Distribute](/appcenter/distribution/).
164164

165-
## Set up Azure Key Vault for automated code signing
166165

167-
You need to have [Azure Key Vault](/azure/key-vault/general/basic-concepts) set up to automatically sign your Android or iOS mobile app package in **Step 2** of wrap wizard.
168-
169-
**Prerequisites**
170-
171-
- You need to have a [Apple account](https://developer.apple.com) enrolled in Apple developer Program or Apple enterprise developer program.
172-
- Create a [distribution certificate](code-sign-ios.md#create-the-distribution-certificate) or [ad-hoc Provisioning Profile](code-sign-ios.md#create-an-ios-provisioning-profile) or enterprise provisioning profile.
173-
- Azure Active Directory subscription to [create Key Vault](/azure/key-vault/general/quick-create-portal).
174-
- Admin access for your tenant.
175-
176-
Follow these steps to create Azure Key Vault and configure KeyVault URI:
177-
178-
1. Sign in to your tenent as an admin and create a new Azure service principal for 1P AAD application: 4e1f8dc5-5a42-45ce-a096-700fa485ba20 (WrapKeyVaultAccessApp) by running the following script: <br>
179-
`Connect-AzureAD -TenantId <your tenant ID>` <br>
180-
`New-AzureADServicePrincipal -AppId 4e1f8dc5-5a42-45ce-a096-700fa485ba20 -DisplayName "Wrap KeyVault Access App"`
181-
182-
2. In your default subscription's **Access Control (IAM)**, add a **Reader** role assignment to the **Service Principal** representing your app, e.g. **Wrap KeyVault Access App**. Make sure it is present in the **Subscription's IAM**, and the **Keyvault's IAM**.
183-
184-
Go to **Access control (IAM)** tab and select **Add role assignment** option under **Add** menu button.
185-
186-
> [!div class="mx-imgBorder"]
187-
> ![Add role assignment on Access control tab.](media/how-to-v2/Access_control_tab.png "Add role assignment on Access control tab.")
188-
189-
Select **Job fucntion roles** tab and make sure **Reader** role is selcetdd. Then click on **Members** tab in the top menu.
190-
191-
> [!div class="mx-imgBorder"]
192-
> ![Click on Members tab.](media/how-to-v2/Add_members.png "Click on Members tab.")
193-
194-
Search for **Wrap KeyVault Access App** on **Members** tab.
195-
196-
> [!div class="mx-imgBorder"]
197-
> ![Search for Wrap KeyVault Access App.](media/how-to-v2/Add_role_assignment.png "Search for Wrap KeyVault Access App.")
198-
199-
Select **Wrap KeyVault Access App** and click on **Review + assign** button on the bottom of the tab to assign **Reader** role to it.
200-
201-
> [!div class="mx-imgBorder"]
202-
> ![Assign Reader role to Wrap KeyVault Access App.](media/how-to-v2/Add_role_for_wrap_signing.png "Assign Reader role to Wrap KeyVault Access App.")
203-
204-
4. Create or access existing key vault. Please ensure this key vault is located in the default subscription for your tenant. More information: [Create a key vault using the Azure portal](/azure/key-vault/general/quick-create-portal).
205-
206-
5. Add access policies for the key vault.
207-
208-
:::image type="content" source="media/wrap-canvas-app/wrap-keyvault.gif" alt-text="Add access policies for the key vault.":::
209-
210-
6. Follow one of the these options, depending on your device:
211-
- For Android, create the .pfx file upload it to the keyvault certificate section. More information: [Generate keys](code-sign-android.md#generate-keys)
212-
213-
:::image type="content" source="media/wrap-canvas-app/wrap-1.png" alt-text="Create a cert for Android.":::
214-
> [!NOTE]
215-
> The name of the certificate must be present in the tag step. The password also needs match the password you entered during the store pass parameter used to create the .pfx file in step 2.
216-
217-
- For iOS:
218-
1. Install the .cer into Keychain Access app by double clicking it. More information: [Create the distribution certificate](code-sign-ios.md#create-the-distribution-certificate) </br> Then export the file as a .p12 file by right clicking your certificate file and the select **Export** and select the file format .p12.
219-
> [!NOTE]
220-
> The .p12 password that you set in step 4 is required when uploading it to the keyvault in the next step.
221-
2. [Create the provisioning profile](code-sign-ios.md#create-an-ios-provisioning-profile) and run the following command to encode it to base64:
222-
- Mac: base64 `-i example.mobileprovision`
223-
- Windows: `certutil -encode data.txt tmp.b64`
224-
225-
3. Get the outputted `base64` string from previous step and upload to Keyvault secret. Then, get the .p12 file and upload it to Keyvault Certificate.
226-
227-
:::image type="content" source="media/wrap-canvas-app/wrap-2.png" alt-text="Create a cert for iOS.":::
228-
229-
7. Once iOS or Android certificates are created and uploaded, add three tags with the name as the bundle id, and the value corresponding to the name of the uploaded certificate(s).
230-
231-
:::image type="content" source="media/wrap-canvas-app/wrap-3.png" alt-text="Add tags.":::
232-
233166

234167
## Register your app on Azure portal manually (optional)
235168
You can automatically create your app registration in the wrap wizard as mentioned in [step 4](wrap-how-to.md#step-4-register-app). Or, you can manually create a new registration for your app on Azure portal. More information: [Quickstart: Register an application with the Microsoft identity platform](/azure/active-directory/develop/quickstart-register-app).

0 commit comments

Comments
 (0)