You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[1000128](#error-code-1000128)| Missing access key used while accessing Azure Blob storage location. |
99
99
|[1000130](#error-code-1000130)| Missing default value: The required environment variable for setting up Azure Key Vault in the wrap wizard isn't set. |
100
-
|[1000131](#error-code-1000131)|Missing tags for the specified Azure Key Vault resourceID. |
100
+
|[1000131](#error-code-1000131)|No tags or missing access permission for the specified Azure Key Vault. |
101
101
102
102
### Error code 1000118
103
103
@@ -246,11 +246,11 @@ Error message: Missing default value: The required environment variable for sett
246
246
247
247
#### Resolution steps
248
248
249
-
- Missing environment variable - Verify whether the environment variable with the given name exists - "PA_Wrap_KV_ResourceID". If not create one
249
+
1.Verify if the `PA_Wrap_KV_ResourceID`environment variable exists. If it doesn't, create it.
250
250
251
-
- Add the resource ID for the Azure key vaults you intend to use with your wrap application.
251
+
2. Assign the resource ID of the Azure key vault you intend to use with your wrap application to the variable.
252
252
253
-
- Ensure that all required tags are present for the resource ID linked to the Bundle ID specified in the wrap wizard.
253
+
3. Confirm that the specified resource ID includes all required tags associated with the Bundle ID defined in the wrap wizard.
254
254
255
255
For more information, see [Step 2: Target platform](/power-apps/maker/common/wrap/wrap-how-to#step-2-target-platform).
256
256
@@ -260,28 +260,38 @@ Error message: No tags or missing access permission for the specified Azure Key
260
260
261
261
#### Resolution steps
262
262
263
-
- Verify that the environment variable "PA_Wrap_KV_ResourceID" exists. If it does not, create it.
263
+
1. Verify if the `PA_Wrap_KV_ResourceID`environment variable exists. If it doesn't, create it.
264
264
265
-
- Set this variable to the resource ID of the Azure Key Vault you intend to use with your Wrap application.
265
+
2. Assign the resource ID of the Azure key vault you intend to use with your wrap application to the variable.
266
266
267
-
- Confirm that the specified resource ID includes all required tags associated with the Bundle ID defined in the Wrap Wizard.
267
+
3. Confirm that the specified resource ID includes all required tags associated with the Bundle ID defined in the wrap wizard.
268
268
269
-
- Verify your access permission for your key vault
270
-
- As a Microsoft Entra ID (formerly Azure AD) admin, add the service principal for the AppID "4e1f8dc5-5a42-45ce-a096-700fa485ba20" by running the following commands in PowerShell:
269
+
4. Ensure you have permissions to access your key vault:
- In the [Azure portal](https://portal.azure.com), under **Access Control (IAM)**, assign the **Reader** role to your service principal:
277
-
1. Go to **Access control (IAM)**, and then select **Add role assignment**.
278
-
:::image type="content" source="media/wrap-issues/add-role-assignment.png" alt-text="Screenshot that shows the Add role assignment option in the Access control (IAM) tab." lightbox="media/wrap-issues/add-role-assignment.png":::
279
-
1. Choose **Reader** under **Job function roles** and go to the **Members** tab.
280
-
:::image type="content" source="media/wrap-issues/add-members.png" alt-text="Screenshot that shows the Members tab on the top menu." lightbox="media/wrap-issues/add-members.png":::
281
-
1. Search for your app name.
282
-
:::image type="content" source="media/wrap-issues/select-members-to-add-role.png" alt-text="Screenshot that shows how to search for your app." lightbox="media/wrap-issues/select-members-to-add-role.png":::
283
-
1. Assign the **Reader** role.
284
-
:::image type="content" source="media/wrap-issues/assign-reader-role-to-wrap-keyvault-access-app.png" alt-text="Screenshot that shows how to assign a Reader role to your app." lightbox="media/wrap-issues/assign-reader-role-to-wrap-keyvault-access-app.png":::
271
+
1. As a Microsoft Entra ID (formerly Azure AD) admin, add the service principal for the AppID "4e1f8dc5-5a42-45ce-a096-700fa485ba20" by running the following commands in PowerShell:
1. In the [Azure portal](https://portal.azure.com), under **Access Control (IAM)**, assign the **Reader** role to your service principal:
279
+
280
+
1. Go to **Access control (IAM)**, and then select **Add role assignment**.
281
+
282
+
:::image type="content" source="media/wrap-issues/add-role-assignment.png" alt-text="Screenshot that shows the Add role assignment option in the Access control (IAM) tab." lightbox="media/wrap-issues/add-role-assignment.png":::
283
+
284
+
1. Choose **Reader** under **Job function roles** and go to the **Members** tab.
285
+
286
+
:::image type="content" source="media/wrap-issues/add-members.png" alt-text="Screenshot that shows the Members tab on the top menu." lightbox="media/wrap-issues/add-members.png":::
287
+
288
+
1. Search for your app name.
289
+
290
+
:::image type="content" source="media/wrap-issues/select-members-to-add-role.png" alt-text="Screenshot that shows how to search for your app." lightbox="media/wrap-issues/select-members-to-add-role.png":::
291
+
292
+
1. Assign the **Reader** role.
293
+
294
+
:::image type="content" source="media/wrap-issues/assign-reader-role-to-wrap-keyvault-access-app.png" alt-text="Screenshot that shows how to assign a Reader role to your app." lightbox="media/wrap-issues/assign-reader-role-to-wrap-keyvault-access-app.png":::
285
295
286
296
For more information, see [Step 2: Target platform](/power-apps/maker/common/wrap/wrap-how-to#step-2-target-platform).
0 commit comments