You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: powerapps-docs/maker/common/wrap/create-key-vault-for-code-signing.md
+6-4Lines changed: 6 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,9 @@ contributors:
16
16
# Create Azure key valut to automically sign your mobile app in wrap for Power Apps
17
17
You need to have [Azure Key Vault](/azure/key-vault/general/basic-concepts) set up to automatically sign your Android or iOS mobile app package in **Step 2** of wrap wizard. Azure key vault is a cloud service that provides a secure store for secrets. You can securely store keys, passwords, certificates, and other secrets. More information: [Intoduction to Azure key vault](https://learn.microsoft.com/en-us/azure/key-vault/general/overview).
18
18
19
-
You can use an exsiting Azure key vault or create a new one one on Azure portal at [https://portal.azure.com](https://portal.azure.com).
19
+
You can use an exsiting Azure key vault or create a new one one using the isnructions below.
20
+
21
+
//on Azure portal at [https://portal.azure.com](https://portal.azure.com).
20
22
21
23
**Prerequisites**
22
24
@@ -25,10 +27,10 @@ You can use an exsiting Azure key vault or create a new one one on Azure portal
25
27
- You need to have a [Apple account](https://developer.apple.com) enrolled in Apple developer Program or Apple enterprise developer program.
26
28
- Create a [distribution certificate](code-sign-ios.md#create-the-distribution-certificate) or [ad-hoc Provisioning Profile](code-sign-ios.md#create-an-ios-provisioning-profile) or enterprise provisioning profile.
27
29
28
-
Follow these steps to create Azure Key Vault and configure KeyVault URI:
30
+
Follow these steps to create **Azure key vault** for wrap for Power Apps and configure **KeyVault URI**:
29
31
30
-
1. Sign in to your tenent as an admin and create a new Azure service principal for 1P AAD application: 4e1f8dc5-5a42-45ce-a096-700fa485ba20 (WrapKeyVaultAccessApp) by running the following script: <br>
31
-
`Connect-AzureAD -TenantId <your tenant ID>` <br>
32
+
1. Sign in to your tenent as an admin and create a new Azure service principal for 1P AAD application: **4e1f8dc5-5a42-45ce-a096-700fa485ba20 (WrapKeyVaultAccessApp)** by running the following script: <br>
33
+
`Connect-AzureAD -TenantId <your tenant ID>`in Power Shell <br>
2. In your default subscription's **Access Control (IAM)**, add a **Reader** role assignment to the **Service Principal** representing your app, e.g. **Wrap KeyVault Access App**. Make sure it is present in the **Subscription's IAM**, and the **Keyvault's IAM**.
0 commit comments