You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: WALKTHROUGH.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,6 +10,7 @@ A lightweight guide on how to use this tool in context.
10
10
* Upload your certificate into the KeyVault, giving it a name.
11
11
* Within your Azure AD, register an application with a name (no need to worry about the redirect URL).
12
12
* In the overview screen for the application, note the Application ID -- this will be the client ID input into the `-kvi` parameter later.
13
+
* Also note the Directory ID -- this will be the tenant ID input into the `-kvt` parameter later.
13
14
* Create a client secret for the application and give it a description (e.g. "Access to KeyVault certificate for signing"). Be sure to copy the secret somewhere temporarily, as you won't be able to see it after initially creating it. This secret will be passed into the `-kvs` parameter later.
14
15
* Return to your KeyVault's settings, and go to the `Access Policies` section.
15
16
* Create an access policy that applies to your registered application, e.g. if the app you registered in AD was called `MyApp`, this policy should apply to the `MyApp` user.
@@ -38,7 +39,7 @@ A lightweight guide on how to use this tool in context.
38
39
- task: CmdLine@2
39
40
displayName: 'Sign outputted .exe with global AzureSignTool'
0 commit comments