You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/power-platform/power-apps/manage-apps/wrap-issues.md
+26-3Lines changed: 26 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -246,19 +246,42 @@ Error message: Missing default value: The required environment variable for sett
246
246
247
247
#### Resolution steps
248
248
249
+
- Missing environment variable - Verify whether the environment variable with the given name exists - "PA_Wrap_KV_ResourceID". If not create one
250
+
249
251
- Add the resource ID for the Azure key vaults you intend to use with your wrap application.
252
+
250
253
- Ensure that all required tags are present for the resource ID linked to the Bundle ID specified in the wrap wizard.
251
254
252
255
For more information, see [Step 2: Target platform](/power-apps/maker/common/wrap/wrap-how-to#step-2-target-platform).
253
256
254
257
### Error code 1000131
255
258
256
-
Error message: Missing tags for the specified Azure Key Vault resourceID.
259
+
Error message: No tags or missing access permission for the specified Azure Key Vault.
257
260
258
261
#### Resolution steps
259
262
260
-
- After setting up Azure key vaults, add all required tags.
261
-
- Confirm that the resource ID associated with the Bundle ID specified in the wrap wizard includes every necessary tag.
263
+
- Verify that the environment variable "PA_Wrap_KV_ResourceID" exists. If it does not, create it.
264
+
265
+
- Set this variable to the resource ID of the Azure Key Vault you intend to use with your Wrap application.
266
+
267
+
- Confirm that the specified resource ID includes all required tags associated with the Bundle ID defined in the Wrap Wizard.
268
+
269
+
- Verify your access permission for your key vault
270
+
- As a Microsoft Entra ID (formerly Azure AD) admin, add the service principal for the AppID "4e1f8dc5-5a42-45ce-a096-700fa485ba20" by running the following commands in PowerShell:
- In the [Azure portal](https://portal.azure.com), under **Access Control (IAM)**, assign the **Reader** role to your service principal:
277
+
1. Go to **Access control (IAM)**, and then select **Add role assignment**.
278
+
:::image type="content" source="media/wrap-issues/add-role-assignment.png" alt-text="Screenshot that shows the Add role assignment option in the Access control (IAM) tab." lightbox="media/wrap-issues/add-role-assignment.png":::
279
+
1. Choose **Reader** under **Job function roles** and go to the **Members** tab.
280
+
:::image type="content" source="media/wrap-issues/add-members.png" alt-text="Screenshot that shows the Members tab on the top menu." lightbox="media/wrap-issues/add-members.png":::
281
+
1. Search for your app name.
282
+
:::image type="content" source="media/wrap-issues/select-members-to-add-role.png" alt-text="Screenshot that shows how to search for your app." lightbox="media/wrap-issues/select-members-to-add-role.png":::
283
+
1. Assign the **Reader** role.
284
+
:::image type="content" source="media/wrap-issues/assign-reader-role-to-wrap-keyvault-access-app.png" alt-text="Screenshot that shows how to assign a Reader role to your app." lightbox="media/wrap-issues/assign-reader-role-to-wrap-keyvault-access-app.png":::
262
285
263
286
For more information, see [Step 2: Target platform](/power-apps/maker/common/wrap/wrap-how-to#step-2-target-platform).
0 commit comments