Skip to content

Commit ca2b0c5

Browse files
authored
Update create-key-vault-for-code-signing.md
1 parent be0295a commit ca2b0c5

File tree

1 file changed

+8
-5
lines changed

1 file changed

+8
-5
lines changed

powerapps-docs/maker/common/wrap/create-key-vault-for-code-signing.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -41,13 +41,13 @@ Follow these steps to create **Azure key vault** for wrap for Power Apps and con
4141
> [!div class="mx-imgBorder"]
4242
> ![Select the Members tab.](media/how-to-v2/Add_members.png "Select the Members tab.")
4343
44-
4. Search for **Wrap KeyVault Access App** on **Members** tab.
44+
4. on **Members** tab, select **Select member** and in the text box on the right enter **Wrap KeyVault Access App**.
4545

4646
> [!div class="mx-imgBorder"]
4747
> ![Search for Wrap KeyVault Access App.](media/how-to-v2/Add_role_assignment.png "Search for Wrap KeyVault Access App.")
4848
49-
5. Select **Wrap KeyVault Access App** > **Review + assign** to assign **Reader** role to it.
50-
49+
5. Select **Wrap KeyVault Access App** and then select **Review + assign** to assign the **Reader** role.
50+
5151
> [!div class="mx-imgBorder"]
5252
> ![Assign Reader role to Wrap KeyVault Access App.](media/how-to-v2/Add_role_for_wrap_signing.png "Assign Reader role to Wrap KeyVault Access App.")
5353
@@ -57,7 +57,8 @@ Follow these steps to create **Azure key vault** for wrap for Power Apps and con
5757
4. Add access policies for the key vault.
5858

5959

60-
5. Follow one of the these options, depending on your device:
60+
5. Depending on your device follow one of the these options:
61+
6162
- For Android, create the .pfx file upload it to the keyvault certificate section. More information: [Generate keys](code-sign-android.md#generate-keys)
6263

6364
:::image type="content" source="media/wrap-canvas-app/wrap-1.png" alt-text="Create a cert for Android.":::
@@ -66,9 +67,11 @@ Follow these steps to create **Azure key vault** for wrap for Power Apps and con
6667
> The name of the certificate must be present in the tag step. The password also needs match the password you entered during the store pass parameter used to create the .pfx file in step 2.
6768
6869
- For iOS:
69-
1. Install the .cer into Keychain Access app by double clicking it. More information: [Create the distribution certificate](code-sign-ios.md#create-the-distribution-certificate) </br> Then export the file as a .p12 file by right clicking your certificate file and the select **Export** and select the file format .p12.
70+
1. Install the .cer into Keychain Access app by selecting it. More information: [Create the distribution certificate](code-sign-ios.md#create-the-distribution-certificate) </br> Then export the file as a .p12 file by right clicking your certificate file and the select **Export** and select the file format .p12.
71+
7072
> [!NOTE]
7173
> The .p12 password that you set in step 4 is required when uploading it to the keyvault in the next step.
74+
7275
2. [Create the provisioning profile](code-sign-ios.md#create-an-ios-provisioning-profile) and run the following command to encode it to base64:
7376
- Mac: base64 `-i example.mobileprovision`
7477
- Windows: `certutil -encode data.txt tmp.b64`

0 commit comments

Comments
 (0)