Skip to content

Commit 2a5d218

Browse files
fixing FAQ comments
1 parent 6942d9d commit 2a5d218

File tree

7 files changed

+19
-19
lines changed

7 files changed

+19
-19
lines changed

articles/trusted-signing/TOC.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
- name: Trusted Signing Documentation
1+
- name: Trusted Signing documentation
22
href: ./index.yml
33
expanded: true
44
items:
@@ -8,21 +8,21 @@
88
href: overview.md
99
- name: How-To
1010
items:
11-
- name: How-To Sign with Trusted Signing
11+
- name: How-To sign with Trusted Signing
1212
href: how-to.md
1313
- name: Quickstart
1414
items:
15-
- name: Quickstart Onboarding
15+
- name: Quickstart onboarding
1616
href: quickstart.md
1717
- name: Tutorial
1818
items:
19-
- name: Trusted Signing Tutorial
19+
- name: Trusted Signing tutorial
2020
href: tutorial.md
2121
- name: FAQ
2222
items:
2323
- name: FAQ about Trusted Signing
2424
href: faq.yml
2525
- name: Concept
2626
items:
27-
- name: Signing Concepts
27+
- name: Signing concepts
2828
href: concept.md

articles/trusted-signing/concept.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Trusted Signing has the following resource types:
5353

5454
In the below example structure, you notice that an Azure Subscription has a resource group and under that resource group you can have one or many Code Signing Account resources with one or many Certificate Profiles. This ability to have multiple Code Signing Accounts and Certificate Profiles is useful as the service supports Public Trust, Private Trust, VBS Enclave, and Test signing.
5555

56-
![Diagram of Azure Code Signing resource group and cert profiles](./media/trusted-signing-resource-structure.png)
56+
![Diagram of Azure Code Signing resource group and cert profiles.](./media/trusted-signing-resource-structure.png)
5757

5858
## [Section 2 heading]
5959
<!-- add your content here -->

articles/trusted-signing/faq.yml

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -20,18 +20,18 @@ sections:
2020
- question: What Windows versions does Trusted Signing support? # Question.
2121
answer: |
2222
Refer to the [Trusted Signing Program Windows Support](https://support.microsoft.com/topic/kb5022661-windows-support-for-the-azure-code-signing-program-4b505a31-fa1e-4ea6-85dd-6630229e8ef4) page for details about Windows support for Trusted Signing.
23-
The service is supported on all currently supported versions of:
24-
*Windows 11 (Supported out of the box)
25-
*Windows 10 - RS5 (Windows 10, Version 1809/ October 2018 Update) or newer
26-
*Windows Server 2019, Windows Server 2016
23+
The service is supported on all currently supported versions of:
24+
* Windows 11 (Supported out of the box)
25+
* Windows 10 - RS5 (Windows 10, Version 1809/ October 2018 Update) or newer
26+
* Windows Server 2019, Windows Server 2016
2727
Files signed by Trusted Signing’s Public Trust certificates are trusted on:
28-
*Windows Server 2012 R2 (Command line only)
29-
*Windows 8.1
30-
*Windows 7 SP1 ESU - Must install May 2021 update rolls up
31-
*Windows 10 1507
32-
Not Supported
33-
*Windows 7 SP1 non-ESU (Not supported by Microsoft)
34-
*Windows OS version that were already end of life
28+
* Windows Server 2012 R2 (Command line only)
29+
* Windows 8.1
30+
* Windows 7 SP1 ESU - Must install May 2021 update rolls up
31+
* Windows 10 1507
32+
Not Supported
33+
* Windows 7 SP1 non-ESU (Not supported by Microsoft)
34+
* Windows OS version that were already end of life
3535
3636
General User Mode Code Integrity (UMCI) support for Trusted Signing:
3737
* Signed binaries was added in the July 2021 Certificate Trust List (CTL) update delivered by Windows. In standard scenarios, upon first sight of an end-entity cert from a chain on the machine, the system pulls down the root CA cert into the trust root store on a system.
@@ -105,7 +105,7 @@ sections:
105105
- question: How do I fix pop-up credentials in the Azure VM when running the SignTool + Dlib command?
106106
answer: |
107107
- [Create a user-assigned managed identity](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview).
108-
- Then add the user-assigned managed identity to the VM. :::image type="content" source="media\trusted-signing-user-managed-identity.png" alt-text="Screenshot of adding managed identity to the VM.":::
108+
- Then add the user-assigned managed identity to the VM by selecting the VM, going to "Identity" in the left navigation bar, clicking "User assigned" and the "Add" button to add the managed identity.
109109
- Finally, in the Resource Group (or Subscription) that has the role Trusted Signing Certificate Profile Signer, add the user-assigned managed identity to the role. Go to "Access control (IAM)" and "Role assignments" to assign the correct role.
110110
- question: How do I fix pop-up credentials when using GCP?
111111
answer: |
-21.6 KB
Loading
Binary file not shown.
Binary file not shown.

articles/trusted-signing/tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ call out those versions (for example: Visual Studio 2019 or later).
5151
-->
5252

5353
## Prerequisites
54-
[!div class="checklist"]
54+
> [!div class="checklist"]
5555
> * Azure tenant ID and subscription ID
5656
> * Azure CLI installed
5757
> * Install Signtool from Windows SDK (min version: 10.0.19041.0)

0 commit comments

Comments
 (0)