You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: powerapps-docs/maker/common/wrap/wrap-how-to.md
-67Lines changed: 0 additions & 67 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -162,74 +162,7 @@ After a successful build, you'll see your mobile app in the **app center locatio
162
162
163
163
For testing and distribution, see [App center test](/appcenter/test-cloud/) and [Distribute](/appcenter/distribution/).
164
164
165
-
## Set up Azure Key Vault for automated code signing
166
165
167
-
You need to have [Azure Key Vault](/azure/key-vault/general/basic-concepts) set up to automatically sign your Android or iOS mobile app package in **Step 2** of wrap wizard.
168
-
169
-
**Prerequisites**
170
-
171
-
- You need to have a [Apple account](https://developer.apple.com) enrolled in Apple developer Program or Apple enterprise developer program.
172
-
- Create a [distribution certificate](code-sign-ios.md#create-the-distribution-certificate) or [ad-hoc Provisioning Profile](code-sign-ios.md#create-an-ios-provisioning-profile) or enterprise provisioning profile.
173
-
- Azure Active Directory subscription to [create Key Vault](/azure/key-vault/general/quick-create-portal).
174
-
- Admin access for your tenant.
175
-
176
-
Follow these steps to create Azure Key Vault and configure KeyVault URI:
177
-
178
-
1. Sign in to your tenent as an admin and create a new Azure service principal for 1P AAD application: 4e1f8dc5-5a42-45ce-a096-700fa485ba20 (WrapKeyVaultAccessApp) by running the following script: <br>
2. In your default subscription's **Access Control (IAM)**, add a **Reader** role assignment to the **Service Principal** representing your app, e.g. **Wrap KeyVault Access App**. Make sure it is present in the **Subscription's IAM**, and the **Keyvault's IAM**.
183
-
184
-
Go to **Access control (IAM)** tab and select **Add role assignment** option under **Add** menu button.
185
-
186
-
> [!div class="mx-imgBorder"]
187
-
> 
188
-
189
-
Select **Job fucntion roles** tab and make sure **Reader** role is selcetdd. Then click on **Members** tab in the top menu.
190
-
191
-
> [!div class="mx-imgBorder"]
192
-
> 
193
-
194
-
Search for **Wrap KeyVault Access App** on **Members** tab.
195
-
196
-
> [!div class="mx-imgBorder"]
197
-
> 
198
-
199
-
Select **Wrap KeyVault Access App** and click on **Review + assign** button on the bottom of the tab to assign **Reader** role to it.
200
-
201
-
> [!div class="mx-imgBorder"]
202
-
> 
203
-
204
-
4. Create or access existing key vault. Please ensure this key vault is located in the default subscription for your tenant. More information: [Create a key vault using the Azure portal](/azure/key-vault/general/quick-create-portal).
205
-
206
-
5. Add access policies for the key vault.
207
-
208
-
:::image type="content" source="media/wrap-canvas-app/wrap-keyvault.gif" alt-text="Add access policies for the key vault.":::
209
-
210
-
6. Follow one of the these options, depending on your device:
211
-
- For Android, create the .pfx file upload it to the keyvault certificate section. More information: [Generate keys](code-sign-android.md#generate-keys)
212
-
213
-
:::image type="content" source="media/wrap-canvas-app/wrap-1.png" alt-text="Create a cert for Android.":::
214
-
> [!NOTE]
215
-
> The name of the certificate must be present in the tag step. The password also needs match the password you entered during the store pass parameter used to create the .pfx file in step 2.
216
-
217
-
- For iOS:
218
-
1. Install the .cer into Keychain Access app by double clicking it. More information: [Create the distribution certificate](code-sign-ios.md#create-the-distribution-certificate) </br> Then export the file as a .p12 file by right clicking your certificate file and the select **Export** and select the file format .p12.
219
-
> [!NOTE]
220
-
> The .p12 password that you set in step 4 is required when uploading it to the keyvault in the next step.
221
-
2.[Create the provisioning profile](code-sign-ios.md#create-an-ios-provisioning-profile) and run the following command to encode it to base64:
222
-
- Mac: base64 `-i example.mobileprovision`
223
-
- Windows: `certutil -encode data.txt tmp.b64`
224
-
225
-
3. Get the outputted `base64` string from previous step and upload to Keyvault secret. Then, get the .p12 file and upload it to Keyvault Certificate.
226
-
227
-
:::image type="content" source="media/wrap-canvas-app/wrap-2.png" alt-text="Create a cert for iOS.":::
228
-
229
-
7. Once iOS or Android certificates are created and uploaded, add three tags with the name as the bundle id, and the value corresponding to the name of the uploaded certificate(s).
## Register your app on Azure portal manually (optional)
235
168
You can automatically create your app registration in the wrap wizard as mentioned in [step 4](wrap-how-to.md#step-4-register-app). Or, you can manually create a new registration for your app on Azure portal. More information: [Quickstart: Register an application with the Microsoft identity platform](/azure/active-directory/develop/quickstart-register-app).
0 commit comments