Skip to content

Commit 3690dea

Browse files
authored
minor changes
1 parent 32acdd1 commit 3690dea

File tree

1 file changed

+33
-23
lines changed

1 file changed

+33
-23
lines changed

support/power-platform/power-apps/manage-apps/wrap-issues.md

Lines changed: 33 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Provides solutions to common issues when using the wrap feature in
44
ms.reviewer: sitaramp, koagarwa
55
ms.author: arijitba
66
author: arijitba
7-
ms.date: 06/17/2025
7+
ms.date: 06/19/2025
88
ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done, sap:App Management\Wrap an app
99
---
1010
# Troubleshoot wrap feature issues in Power Apps
@@ -97,7 +97,7 @@ You might encounter these error codes in the wrap wizard:
9797
| [1000123](#error-code-1000123) | iOS profile isn't valid. |
9898
| [1000128](#error-code-1000128) | Missing access key used while accessing Azure Blob storage location. |
9999
| [1000130](#error-code-1000130) | Missing default value: The required environment variable for setting up Azure Key Vault in the wrap wizard isn't set. |
100-
| [1000131](#error-code-1000131) | Missing tags for the specified Azure Key Vault resourceID. |
100+
| [1000131](#error-code-1000131) | No tags or missing access permission for the specified Azure Key Vault. |
101101

102102
### Error code 1000118
103103

@@ -246,11 +246,11 @@ Error message: Missing default value: The required environment variable for sett
246246

247247
#### Resolution steps
248248

249-
- Missing environment variable - Verify whether the environment variable with the given name exists - "PA_Wrap_KV_ResourceID". If not create one
249+
1. Verify if the `PA_Wrap_KV_ResourceID` environment variable exists. If it doesn't, create it.
250250

251-
- Add the resource ID for the Azure key vaults you intend to use with your wrap application.
251+
2. Assign the resource ID of the Azure key vault you intend to use with your wrap application to the variable.
252252

253-
- Ensure that all required tags are present for the resource ID linked to the Bundle ID specified in the wrap wizard.
253+
3. Confirm that the specified resource ID includes all required tags associated with the Bundle ID defined in the wrap wizard.
254254

255255
For more information, see [Step 2: Target platform](/power-apps/maker/common/wrap/wrap-how-to#step-2-target-platform).
256256

@@ -260,28 +260,38 @@ Error message: No tags or missing access permission for the specified Azure Key
260260

261261
#### Resolution steps
262262

263-
- Verify that the environment variable "PA_Wrap_KV_ResourceID" exists. If it does not, create it.
263+
1. Verify if the `PA_Wrap_KV_ResourceID` environment variable exists. If it doesn't, create it.
264264

265-
- Set this variable to the resource ID of the Azure Key Vault you intend to use with your Wrap application.
265+
2. Assign the resource ID of the Azure key vault you intend to use with your wrap application to the variable.
266266

267-
- Confirm that the specified resource ID includes all required tags associated with the Bundle ID defined in the Wrap Wizard.
267+
3. Confirm that the specified resource ID includes all required tags associated with the Bundle ID defined in the wrap wizard.
268268

269-
- Verify your access permission for your key vault
270-
- As a Microsoft Entra ID (formerly Azure AD) admin, add the service principal for the AppID "4e1f8dc5-5a42-45ce-a096-700fa485ba20" by running the following commands in PowerShell:
269+
4. Ensure you have permissions to access your key vault:
271270

272-
```powershell
273-
Connect-AzureAD -TenantId <your tenant ID>
274-
New-AzureADServicePrincipal -AppId 4e1f8dc5-5a42-45ce-a096-700fa485ba20 -DisplayName "Wrap KeyVault Access App"
275-
```
276-
- In the [Azure portal](https://portal.azure.com), under **Access Control (IAM)**, assign the **Reader** role to your service principal:
277-
1. Go to **Access control (IAM)**, and then select **Add role assignment**.
278-
:::image type="content" source="media/wrap-issues/add-role-assignment.png" alt-text="Screenshot that shows the Add role assignment option in the Access control (IAM) tab." lightbox="media/wrap-issues/add-role-assignment.png":::
279-
1. Choose **Reader** under **Job function roles** and go to the **Members** tab.
280-
:::image type="content" source="media/wrap-issues/add-members.png" alt-text="Screenshot that shows the Members tab on the top menu." lightbox="media/wrap-issues/add-members.png":::
281-
1. Search for your app name.
282-
:::image type="content" source="media/wrap-issues/select-members-to-add-role.png" alt-text="Screenshot that shows how to search for your app." lightbox="media/wrap-issues/select-members-to-add-role.png":::
283-
1. Assign the **Reader** role.
284-
:::image type="content" source="media/wrap-issues/assign-reader-role-to-wrap-keyvault-access-app.png" alt-text="Screenshot that shows how to assign a Reader role to your app." lightbox="media/wrap-issues/assign-reader-role-to-wrap-keyvault-access-app.png":::
271+
1. As a Microsoft Entra ID (formerly Azure AD) admin, add the service principal for the AppID "4e1f8dc5-5a42-45ce-a096-700fa485ba20" by running the following commands in PowerShell:
272+
273+
```powershell
274+
Connect-AzureAD -TenantId <your tenant ID>
275+
New-AzureADServicePrincipal -AppId 4e1f8dc5-5a42-45ce-a096-700fa485ba20 -DisplayName "Wrap KeyVault Access App"
276+
```
277+
278+
1. In the [Azure portal](https://portal.azure.com), under **Access Control (IAM)**, assign the **Reader** role to your service principal:
279+
280+
1. Go to **Access control (IAM)**, and then select **Add role assignment**.
281+
282+
:::image type="content" source="media/wrap-issues/add-role-assignment.png" alt-text="Screenshot that shows the Add role assignment option in the Access control (IAM) tab." lightbox="media/wrap-issues/add-role-assignment.png":::
283+
284+
1. Choose **Reader** under **Job function roles** and go to the **Members** tab.
285+
286+
:::image type="content" source="media/wrap-issues/add-members.png" alt-text="Screenshot that shows the Members tab on the top menu." lightbox="media/wrap-issues/add-members.png":::
287+
288+
1. Search for your app name.
289+
290+
:::image type="content" source="media/wrap-issues/select-members-to-add-role.png" alt-text="Screenshot that shows how to search for your app." lightbox="media/wrap-issues/select-members-to-add-role.png":::
291+
292+
1. Assign the **Reader** role.
293+
294+
:::image type="content" source="media/wrap-issues/assign-reader-role-to-wrap-keyvault-access-app.png" alt-text="Screenshot that shows how to assign a Reader role to your app." lightbox="media/wrap-issues/assign-reader-role-to-wrap-keyvault-access-app.png":::
285295
286296
For more information, see [Step 2: Target platform](/power-apps/maker/common/wrap/wrap-how-to#step-2-target-platform).
287297

0 commit comments

Comments
 (0)