Skip to content

Commit 26983a8

Browse files
authored
Merge pull request #271471 from microsoftshawarma/main
fixing sample commands and TOC
2 parents 9b6380d + a83d351 commit 26983a8

File tree

5 files changed

+13
-14
lines changed

5 files changed

+13
-14
lines changed

articles/trusted-signing/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,6 @@
1010
items:
1111
- name: Signing Integrations with Trusted Signing
1212
href: how-to-signing-integrations.md
13-
- name: How-To
14-
items:
1513
- name: Sign CI Policies with Trusted Signing
1614
href: how-to-sign-ci-policy.md
1715
- name: Quickstart

articles/trusted-signing/faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ sections:
7171
FIPS 140-2 level 3 (mHSMs)
7272
- question: How to include the appropriate EKU for our certificates into the ELAM driver resources?
7373
answer: |
74-
- For information regarding ELAM driver config for Protected Anti-Malware Services, refer to the following guidance: "Beginning in 2022, all user mode anti-malware service binaries must be signed by Microsoft's Azure Code Sign signing service. The Trusted Signing issued Authenticode certificate for signing anti-malware binaries is updated every 30 days for security. To prevent the need to update the ELAM driver every time the certificate is updated, we recommend that anti-malware vendors include the Azure Code Sign PCA certificate TBS hash in the CertHash portion of the ELAM driver resource file info. Additionally, the anti-malware vendor must include their unique Trusted Signing EKU identity in the EKU field of the resource file info. The EKU identity will begin with the prefix *1.3.6.1.4.1.311.97.*."
74+
- For information regarding ELAM driver config for Protected Anti-Malware Services, refer to the following guidance: "Beginning in 2022, all user mode anti-malware service binaries must be signed by Microsoft's Trusted Signing signing service. The Trusted Signing issued Authenticode certificate for signing anti-malware binaries is updated every 30 days for security. To prevent the need to update the ELAM driver every time the certificate is updated, we recommend that anti-malware vendors include the Trusted Signing PCA certificate TBS hash in the CertHash portion of the ELAM driver resource file info. Additionally, the anti-malware vendor must include their unique Trusted Signing EKU identity in the EKU field of the resource file info. The EKU identity will begin with the prefix *1.3.6.1.4.1.311.97.*."
7575
- See the [PKI Repository](https://www.microsoft.com/pkiops/docs/repository.htm) page for the Microsoft ID Verified Code Signing PCA 2021 cert.
7676
- question: What happens if we run Trusted Signing binaries on a signed on machine that doesn't have the Trusted Signing update (especially binaries that are INTEGRITYCHECK-ed)?
7777
answer: |

articles/trusted-signing/how-to-sign-ci-policy.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -29,36 +29,37 @@ Import-Module .\Az.CodeSigning.psd1
2929
```
3030
4. Optionally you can create a `metadata.json` file:
3131
```
32-
Endpoint "https://scus.codesigning.azure.net/"
33-
CodeSigningAccountName "youracsaccount"
34-
CertificateProfileName "youracscertprofile"
32+
"Endpoint": "https://xxx.codesigning.azure.net/"
33+
"TrustedSigningAccountName": "<Trusted Signing Account Name>",
34+
"CertificateProfileName": "<Certificate Profile Name>",
3535
```
36+
3637
5. [Get the root certificate](https://learn.microsoft.com/powershell/module/az.codesigning/get-azcodesigningrootcert) to be added to the trust store
3738
```
3839
Get-AzCodeSigningRootCert -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/ -Destination c:\temp\root.cer
3940
```
4041
Or using a metadata.json
4142
```
42-
Get-AzCodeSigningRootCert -MetadataFilePath C:\temp\metadata.sample.scus.privateci.json https://xxx.codesigning.azure.net/ -Destination c:\temp\root.cer
43+
Get-AzCodeSigningRootCert -MetadataFilePath C:\temp\metadata.json https://xxx.codesigning.azure.net/ -Destination c:\temp\root.cer
4344
```
4445
6. To get the EKU (Extended Key Usage) to insert into your policy:
4546
```
46-
Get-AzCodeSigningCustomerEku -AccountName acstestcanary -ProfileName acstestcanaryCert1 -EndpointUrl https://xxx.codesigning.azure.net/
47+
Get-AzCodeSigningCustomerEku -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/
4748
```
4849
Or
4950

5051
```
51-
Get-AzCodeSigningCustomerEku -MetadataFilePath C:\temp\metadata.sample.scus.privateci.json
52+
Get-AzCodeSigningCustomerEku -MetadataFilePath C:\temp\metadata.json
5253
```
5354
7. To sign your policy, you run the invoke command:
5455
```
55-
Invoke-AzCodeSigningCIPolicySigning -accountName acstestcanary -profileName acstestcanaryCert1 -endpointurl "https://xxx.codesigning.azure.net/" -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
56+
Invoke-AzCodeSigningCIPolicySigning -accountName TestAccount -profileName TestCertProfile -endpointurl "https://xxx.codesigning.azure.net/" -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
5657
```
5758

5859
Or use a `metadata.json` file and the following command:
5960

6061
```
61-
Invoke-AzCodeSigningCIPolicySigning -MetadataFilePath C:\temp\metadata.sample.scus.privateci.json -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
62+
Invoke-AzCodeSigningCIPolicySigning -MetadataFilePath C:\temp\metadata.json -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
6263
```
6364

6465
## Creating and Deploying a CI Policy

articles/trusted-signing/how-to-signing-integrations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ To sign using Trusted Signing, you need to provide the details of your Trusted S
7878
```
7979
{
8080
  "Endpoint": "<Code Signing Account Endpoint>",
81-
  "CodeSigningAccountName": "<Code Signing Account Name>",
81+
  "TrustedSigningAccountName": "<Trusted Signing Account Name>",
8282
  "CertificateProfileName": "<Certificate Profile Name>",
8383
  "CorrelationId": "<Optional CorrelationId*>"
8484
}

articles/trusted-signing/tutorial-assign-roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,8 +36,8 @@ Complete the following steps to assign roles in Trusted Signing.
3636
4. For more granular access control on the certificate profile level, you can use the Azure CLI to assign roles. The following commands can be used to assign the _Code Signing Certificate Profile Signer_ role to users/service principles to sign files.
3737
```
3838
az role assignment create --assignee <objectId of user/service principle>
39-
--role "Code Signing Certificate Profile Signer"
40-
--scope "/subscriptions/<subscriptionId>/resourceGroups/<resource-group-name>/providers/Microsoft.CodeSigning/codeSigningAccounts/<codesigning-account-name>/certificateProfiles/<profileName>"
39+
--role "Trusted Signing Certificate Profile Signer"
40+
--scope "/subscriptions/<subscriptionId>/resourceGroups/<resource-group-name>/providers/Microsoft.CodeSigning/trustedSigningAccounts/<trustedsigning-account-name>/certificateProfiles/<profileName>"
4141
```
4242

4343
## Related content

0 commit comments

Comments
 (0)