You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/trusted-signing/how-to-sign-ci-policy.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,8 +17,8 @@ To sign new CI policies with the service first install several prerequisites.
17
17
Prerequisites:
18
18
* A Trusted Signing account, Identity Validation, and Certificate Profile.
19
19
* Ensure there are proper individual or group role assignments for signing (“Trusted Signing Certificate Profile Signer” role).
20
-
*[Azure PowerShell on Windows](https://learn.microsoft.com/en-us/powershell/azure/install-azps-windows?view=azps-9.7.1&tabs=powershell&pivots=windows-msi) installed
5.[Get the root certificate](https://learn.microsoft.com/en-us/powershell/module/az.codesigning/get-azcodesigningrootcert?view=azps-11.4.0) to be added to the trust store
35
+
5.[Get the root certificate](https://learn.microsoft.com/en-us/powershell/module/az.codesigning/get-azcodesigningrootcert) to be added to the trust store
For steps on creating and deploying your CI policy refer to:
66
-
*[Use signed policies to protect Windows Defender Application Control against tampering](https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/deployment/use-signed-policies-to-protect-wdac-against-tampering)
67
-
*[Windows Defender Application Control design guide](https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-design-guide)
66
+
*[Use signed policies to protect Windows Defender Application Control against tampering](https://learn.microsoft.com/windows/security/application-security/application-control/windows-defender-application-control/deployment/use-signed-policies-to-protect-wdac-against-tampering)
67
+
*[Windows Defender Application Control design guide](https://learn.microsoft.com/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-design-guide)
Copy file name to clipboardExpand all lines: articles/trusted-signing/how-to-signing-integrations.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -120,6 +120,6 @@ This section explains how to set up other not [SignTool](#set-up-signtool-with-t
120
120
121
121
* PowerShell for Authenticode – To use PowerShell for Trusted Signing, visit [PowerShell Gallery | Trusted Signing 0.3.8](https://www.powershellgallery.com/packages/TrustedSigning/0.3.8) to install the PowerShell module.
122
122
123
-
* Azure PowerShell: App Control for Business CI Policy – To use Trusted Signing for CI policy signing follow the instructions at [Signing a New CI policy](./how-to-sign-ci-policy.md) and visit the [Az.CodeSigning PowerShell Module](https://learn.microsoft.com/en-us/powershell/module/az.codesigning/?view=azps-11.4.0).
123
+
* Azure PowerShell: App Control for Business CI Policy – To use Trusted Signing for CI policy signing follow the instructions at [Signing a New CI policy](./how-to-sign-ci-policy.md) and visit the [Az.CodeSigning PowerShell Module](https://learn.microsoft.com/en-us/powershell/azure/install-azps-windows).
124
124
125
125
* Trusted Signing SDK – To create your own signing integration our [Trusted Signing SDK](https://www.nuget.org/packages/Azure.CodeSigning.Sdk) is publicly available.
0 commit comments