Skip to content

Commit 5035648

Browse files
committed
fixing reviewer feedback in other articles
1 parent 2f0c737 commit 5035648

File tree

7 files changed

+48
-38
lines changed

7 files changed

+48
-38
lines changed

articles/trusted-signing/How-To-Certificate-Revocation.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: Revoke a certificate profile in Trusted Signing #Required; page title displayed in search results. Include the word "quickstart". Include the brand.
3-
description: how-to revoke a Trusted Signing certificate from Azure portal. #Required; article description that is displayed in search results. Include the word "quickstart".
4-
author: mehasharma #Required; your GitHub user alias, with correct capitalization.
5-
ms.author: mesharm #Required; microsoft alias of author; optional team alias.
6-
ms.service: trusted-signing #Required; service per approved list. service slug assigned to your service by ACOM.
7-
ms.topic: how-to #Required; leave this attribute/value as-is.
8-
ms.date: 03/31/2024 #Required; mm/dd/yyyy format.
2+
title: Revoke a certificate profile in Trusted Signing
3+
description: how-to revoke a Trusted Signing certificate from Azure portal.
4+
author: mehasharma
5+
ms.author: mesharm
6+
ms.service: azure-code-signing
7+
ms.topic: how-to
8+
ms.date: 03/31/2024
99
---
1010

1111

articles/trusted-signing/How-To-Signing-History.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
---
2-
title: Access signed transactions in Trusted Signing #Required; page title displayed in search results. Include the word "quickstart". Include the brand.
3-
description: How-to access signed transactions in Trusted Signing in Azure portal. #Required; article description that is displayed in search results. Include the word "quickstart".
4-
author: mehasharma #Required; your GitHub user alias, with correct capitalization.
5-
ms.author: mesharm #Required; microsoft alias of author; optional team alias.
6-
ms.service: trusted-signing #Required; service per approved list. service slug assigned to your service by ACOM.
7-
ms.topic: how-to #Required; leave this attribute/value as-is.
8-
ms.date: 04/01/2024 #Required; mm/dd/yyyy format.
2+
title: Access signed transactions in Trusted Signing
3+
description: How-to access signed transactions in Trusted Signing in Azure portal.
4+
author: mehasharma
5+
ms.author: mesharm
6+
ms.service: azure-code-signing
7+
ms.topic: how-to
8+
ms.date: 04/01/2024
99
---
1010

1111
# Access signed transactions in Trusted Signing
1212

13-
Review the details of the signing requests executed by Trusted Signing in Azure Portal.
13+
Review the details of the signing requests executed by Trusted Signing in Azure portal.
1414
Currently there are four different options enabled: 
1515
- Log Analytics workspace 
1616
- Storage Account 

articles/trusted-signing/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,10 @@
1212
href: how-to-signing-integrations.md
1313
- name: Sign CI Policies with Trusted Signing
1414
href: how-to-sign-ci-policy.md
15+
- name: Access signed transactions in Trusted Signing
16+
href: how-to-signing-history.md
17+
- name: Revoke a certificate profile in Trusted Signing
18+
href: how-to-certificate-revocation.md
1519
- name: Quickstart
1620
items:
1721
- name: Quickstart onboarding

articles/trusted-signing/how-to-sign-ci-policy.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Signing CI Policies #Required; page title is displayed in search results. Include the brand.
3-
description: Learn how to sign new CI policies with Trusted Signing. #Required; article description that is displayed in search results.
4-
author: microsoftshawarma #Required; your GitHub user alias, with correct capitalization.
5-
ms.author: rakiasegev #Required; microsoft alias of author; optional team alias.
6-
ms.service: azure-code-signing #Required; service per approved list. slug assigned by ACOM.
7-
ms.topic: how-to #Required; leave this attribute/value as-is.
8-
ms.date: 04/04/2024 #Required; mm/dd/yyyy format.
9-
ms.custom: template-how-to-pattern #Required; leave this attribute/value as-is.
2+
title: Signing CI Policies
3+
description: Learn how to sign new CI policies with Trusted Signing.
4+
author: microsoftshawarma
5+
ms.author: rakiasegev
6+
ms.service: azure-code-signing
7+
ms.topic: how-to
8+
ms.date: 04/04/2024
9+
ms.custom: template-how-to-pattern
1010
---
1111

1212
# Sign CI Policies with Trusted Signing

articles/trusted-signing/how-to-signing-integrations.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Implement signing integrations with Trusted Signing #Required; page title is displayed in search results. Include the brand.
3-
description: Learn how to set up signing integrations with Trusted Signing. #Required; article description that is displayed in search results.
4-
author: microsoftshawarma #Required; your GitHub user alias, with correct capitalization.
5-
ms.author: rakiasegev #Required; microsoft alias of author; optional team alias.
6-
ms.service: azure-code-signing #Required; service per approved list. slug assigned by ACOM.
7-
ms.topic: how-to #Required; leave this attribute/value as-is.
8-
ms.date: 04/04/2024 #Required; mm/dd/yyyy format.
9-
ms.custom: template-how-to-pattern #Required; leave this attribute/value as-is.
2+
title: Implement signing integrations with Trusted Signing
3+
description: Learn how to set up signing integrations with Trusted Signing.
4+
author: microsoftshawarma
5+
ms.author: rakiasegev
6+
ms.service: azure-code-signing
7+
ms.topic: how-to
8+
ms.date: 04/04/2024
9+
ms.custom: template-how-to-pattern
1010
---
1111

1212
# Implement Signing Integrations with Trusted Signing
@@ -46,15 +46,15 @@ To download and install SignTool:
4646
1. Download the latest version of SignTool + Windows Build Tools NuGet at: [Microsft.Windows.SDK.BuildTools](https://www.nuget.org/packages/Microsoft.Windows.SDK.BuildTools/)
4747
2. Install SignTool from Windows SDK (min version: 10.0.2261.755)
4848

49-
Another option is to use the latest nuget.exe to download and extract the latest SDK Build Tools NuGet package by completing the following steps (PowerShell):
49+
Another option is to use the latest `nuget.exe` to download and extract the latest SDK Build Tools NuGet package by completing the following steps (PowerShell):
5050

51-
1. Download nuget.exe by running the following download command:
51+
1. Download `nuget.exe` by running the following download command:
5252

5353
```
5454
Invoke-WebRequest -Uri https://dist.nuget.org/win-x86-commandline/latest/nuget.exe -OutFile .\nuget.exe
5555
```
5656

57-
2. Install nuget.exe by running the following install command:
57+
2. Install `nuget.exe` by running the following install command:
5858
```
5959
.\nuget.exe install Microsoft.Windows.SDK.BuildTools -Version 10.0.20348.19
6060
```

articles/trusted-signing/index.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,12 @@ landingContent:
3030
links:
3131
- text: Sign CI Policies with Trusted Signing
3232
url: how-to-sign-ci-policy.md
33+
- text: Signing Integrations with Trusted Signing
34+
url: how-to-signing-integrations.md
35+
- text: Access signed transactions in Trusted Signing
36+
url: how-to-sign-history.md
37+
- text: Revoke a certificate profile in Trusted Signing
38+
url: how-to-certificate-revocation.md
3339
- title: Overview
3440
linkLists:
3541
- linkListType: overview

articles/trusted-signing/quickstart.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ The resources must be created in Azure regions where Trusted Signing is currentl
6161
- Globally unique.
6262
- Case insensitive (“Abc” is the same as “abc”).
6363

64-
# [Az CLI](#tab/account-cli)
64+
# [Azure CLI](#tab/account-cli)
6565

6666
The resources must be created in Azure regions where Trusted Signing is currently available. Refer to the table below for the current Azure regions with Trusted Signing resources:
6767

@@ -91,7 +91,7 @@ az upgrade [--all {false, true}]
9191
[--allow-preview {false, true}]
9292
[--yes]
9393
```
94-
5. To set your default subscription id, use the `az account set -s <subscriptionId>` command.
94+
5. To set your default subscription ID, use the `az account set -s <subscriptionId>` command.
9595

9696
6. Create a resource group using the following command:
9797
```
@@ -130,7 +130,7 @@ You can complete your own Identity Validation by filing out the request form wit
130130
Here are the steps to create an Identity Validation request:
131131
1. Navigate to your new Trusted Signing account in the Azure portal.
132132
2. Confirm you have the **Trusted Signing Identity Verifier role**.
133-
• For role Based Access management (RBAC) access management, see link to RBAC and role assignment.
133+
• For Role Based Access management (RBAC) access management, see link to RBAC and role assignment.
134134
3. From either the Trusted Signing account overview page or from Objects, select **Identity Validation**.
135135
4. Select **New Identity Validation** > Public or Private.
136136
- Public identity validation is applicable to certificate profile types: Public Trust, Public Trust Test, VBS Enclave (this isn't supported yet).
@@ -224,7 +224,7 @@ trustedsigning certificate-profile show -g myRG --account-name MyAccount -n MyP
224224
- Begin with a letter, end with a letter or digit, and not contain consecutive hyphens.
225225
- Unique within the account.
226226
- Inherits region from the account.
227-
- Case insensitive (“Abc” is the same as “abc”) .
227+
- Case insensitive (“Abc” is the same as “abc”).
228228

229229
**Helpful commands**:
230230
- Show help for sample commands and detailed parameter descriptions: `trustedsigning certificate-profile create -–help`

0 commit comments

Comments
 (0)