Skip to content

Commit 32acdd1

Browse files
authored
Update wrap-issues.md
Update the error message
1 parent 1a3f90a commit 32acdd1

File tree

1 file changed

+26
-3
lines changed

1 file changed

+26
-3
lines changed

support/power-platform/power-apps/manage-apps/wrap-issues.md

Lines changed: 26 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -246,19 +246,42 @@ Error message: Missing default value: The required environment variable for sett
246246

247247
#### Resolution steps
248248

249+
- Missing environment variable - Verify whether the environment variable with the given name exists - "PA_Wrap_KV_ResourceID". If not create one
250+
249251
- Add the resource ID for the Azure key vaults you intend to use with your wrap application.
252+
250253
- Ensure that all required tags are present for the resource ID linked to the Bundle ID specified in the wrap wizard.
251254

252255
For more information, see [Step 2: Target platform](/power-apps/maker/common/wrap/wrap-how-to#step-2-target-platform).
253256

254257
### Error code 1000131
255258

256-
Error message: Missing tags for the specified Azure Key Vault resourceID.
259+
Error message: No tags or missing access permission for the specified Azure Key Vault.
257260

258261
#### Resolution steps
259262

260-
- After setting up Azure key vaults, add all required tags.
261-
- Confirm that the resource ID associated with the Bundle ID specified in the wrap wizard includes every necessary tag.
263+
- Verify that the environment variable "PA_Wrap_KV_ResourceID" exists. If it does not, create it.
264+
265+
- Set this variable to the resource ID of the Azure Key Vault you intend to use with your Wrap application.
266+
267+
- Confirm that the specified resource ID includes all required tags associated with the Bundle ID defined in the Wrap Wizard.
268+
269+
- Verify your access permission for your key vault
270+
- As a Microsoft Entra ID (formerly Azure AD) admin, add the service principal for the AppID "4e1f8dc5-5a42-45ce-a096-700fa485ba20" by running the following commands in PowerShell:
271+
272+
```powershell
273+
Connect-AzureAD -TenantId <your tenant ID>
274+
New-AzureADServicePrincipal -AppId 4e1f8dc5-5a42-45ce-a096-700fa485ba20 -DisplayName "Wrap KeyVault Access App"
275+
```
276+
- In the [Azure portal](https://portal.azure.com), under **Access Control (IAM)**, assign the **Reader** role to your service principal:
277+
1. Go to **Access control (IAM)**, and then select **Add role assignment**.
278+
:::image type="content" source="media/wrap-issues/add-role-assignment.png" alt-text="Screenshot that shows the Add role assignment option in the Access control (IAM) tab." lightbox="media/wrap-issues/add-role-assignment.png":::
279+
1. Choose **Reader** under **Job function roles** and go to the **Members** tab.
280+
:::image type="content" source="media/wrap-issues/add-members.png" alt-text="Screenshot that shows the Members tab on the top menu." lightbox="media/wrap-issues/add-members.png":::
281+
1. Search for your app name.
282+
:::image type="content" source="media/wrap-issues/select-members-to-add-role.png" alt-text="Screenshot that shows how to search for your app." lightbox="media/wrap-issues/select-members-to-add-role.png":::
283+
1. Assign the **Reader** role.
284+
:::image type="content" source="media/wrap-issues/assign-reader-role-to-wrap-keyvault-access-app.png" alt-text="Screenshot that shows how to assign a Reader role to your app." lightbox="media/wrap-issues/assign-reader-role-to-wrap-keyvault-access-app.png":::
262285
263286
For more information, see [Step 2: Target platform](/power-apps/maker/common/wrap/wrap-how-to#step-2-target-platform).
264287

0 commit comments

Comments
 (0)