Skip to content

Commit be0295a

Browse files
authored
Update create-key-vault-for-code-signing.md
1 parent 0e10ac1 commit be0295a

File tree

1 file changed

+11
-13
lines changed

1 file changed

+11
-13
lines changed

powerapps-docs/maker/common/wrap/create-key-vault-for-code-signing.md

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ contributors:
1414
- mkaur-msft
1515
---
1616
# Create Azure key valut for wrap for Power Apps
17-
You need to have [Azure Key Vault](/azure/key-vault/general/basic-concepts) set up to automatically sign your Android or iOS mobile app package in [Step 2](wrap-how-to.mdstep-2-target-platform) of wrap wizard. Azure key vault is a cloud service that provides a secure store for secrets. You can securely store keys, passwords, certificates, and other secrets. More information: [Intoduction to Azure key vault](/azure/key-vault/general/overview).
17+
You need to have [Azure Key Vault](/azure/key-vault/general/basic-concepts) set up to automatically sign your Android or iOS mobile app package in [Step 2](wrap-how-to.mdstep-2-target-platform) of the wrap wizard. Azure key vault is a cloud service that provides a secure store for secrets. You can securely store keys, passwords, certificates, and other secrets. For more information, see [Intoduction to Azure key vault](/azure/key-vault/general/overview).
1818

1919
You can use an exsiting Azure key vault or create a new one one [Azure portal](https://portal.azure.com) using the instructions below.
2020

@@ -24,31 +24,29 @@ You can use an exsiting Azure key vault or create a new one one [Azure portal](h
2424
- Admin access for your tenant.
2525
- You need to have a [Apple account](https://developer.apple.com) enrolled in Apple developer Program or Apple enterprise developer program.
2626
- Create a [distribution certificate](code-sign-ios.md#create-the-distribution-certificate) or [ad-hoc Provisioning Profile](code-sign-ios.md#create-an-ios-provisioning-profile) or enterprise provisioning profile.
27+
2728

2829
Follow these steps to create **Azure key vault** for wrap for Power Apps and configure **KeyVault URI**:
2930

3031
1. Sign in to your tenant as an admin and create a new Azure service principal for 1P AAD application: **4e1f8dc5-5a42-45ce-a096-700fa485ba20 (WrapKeyVaultAccessApp)** by running the following script: <br>
3132
`Connect-AzureAD -TenantId <your tenant ID>` in Power Shell <br>
3233
`New-AzureADServicePrincipal -AppId 4e1f8dc5-5a42-45ce-a096-700fa485ba20 -DisplayName "Wrap KeyVault Access App"`
3334

34-
2. In your default subscription's **Access Control (IAM)**, add a **Reader** role assignment to the **Service Principal** representing your app, e.g. **Wrap KeyVault Access App**. Make sure it is present in the **Subscription's IAM**, and the **Keyvault's IAM**.
35-
36-
1. Go to **Access control (IAM)** tab and select **Add role assignment** option under **Add** menu button.
37-
38-
> [!div class="mx-imgBorder"]
39-
> ![Add role assignment on Access control tab.](media/how-to-v2/Access_control_tab.png "Add role assignment on Access control tab.")
35+
2. In your default subscription's **Access Control (IAM)**, add a **Reader** role assignment to the **Service Principal** representing your app such as **Wrap KeyVault Access App**. Make sure it's present in the **Subscription's IAM**, and the **Keyvault's IAM**.
4036

41-
2. Select **Job fucntion roles** tab and make sure **Reader** role is selcetdd. Then click on **Members** tab in the top menu.
37+
1. On the left select **Access control (IAM)** tab and then select **Add** > **Add role assignment**.
38+
39+
2. Select the **Members** tab and then select **Job fucntion roles**. Make sure the **Reader** role is selected.
4240

4341
> [!div class="mx-imgBorder"]
44-
![Select the Members tab.](media/how-to-v2/Add_members.png "Selet the Members tab.")
42+
> ![Select the Members tab.](media/how-to-v2/Add_members.png "Select the Members tab.")
4543
46-
3. Search for **Wrap KeyVault Access App** on **Members** tab.
44+
4. Search for **Wrap KeyVault Access App** on **Members** tab.
4745

4846
> [!div class="mx-imgBorder"]
4947
> ![Search for Wrap KeyVault Access App.](media/how-to-v2/Add_role_assignment.png "Search for Wrap KeyVault Access App.")
5048
51-
4. Select **Wrap KeyVault Access App** and click on **Review + assign** button on the bottom of the tab to assign **Reader** role to it.
49+
5. Select **Wrap KeyVault Access App** > **Review + assign** to assign **Reader** role to it.
5250

5351
> [!div class="mx-imgBorder"]
5452
> ![Assign Reader role to Wrap KeyVault Access App.](media/how-to-v2/Add_role_for_wrap_signing.png "Assign Reader role to Wrap KeyVault Access App.")
@@ -58,14 +56,14 @@ Follow these steps to create **Azure key vault** for wrap for Power Apps and con
5856

5957
4. Add access policies for the key vault.
6058

61-
:::image type="content" source="media/wrap-canvas-app/wrap-keyvault.gif" alt-text="Add access policies for the key vault.":::
6259

6360
5. Follow one of the these options, depending on your device:
6461
- For Android, create the .pfx file upload it to the keyvault certificate section. More information: [Generate keys](code-sign-android.md#generate-keys)
6562

6663
:::image type="content" source="media/wrap-canvas-app/wrap-1.png" alt-text="Create a cert for Android.":::
64+
6765
> [!NOTE]
68-
> The name of the certificate must be present in the tag step. The password also needs match the password you entered during the store pass parameter used to create the .pfx file in step 2.
66+
> The name of the certificate must be present in the tag step. The password also needs match the password you entered during the store pass parameter used to create the .pfx file in step 2.
6967
7068
- For iOS:
7169
1. Install the .cer into Keychain Access app by double clicking it. More information: [Create the distribution certificate](code-sign-ios.md#create-the-distribution-certificate) </br> Then export the file as a .p12 file by right clicking your certificate file and the select **Export** and select the file format .p12.

0 commit comments

Comments
 (0)