Skip to content

Commit 5b30ddd

Browse files
added support in dgss
1 parent cbcce6c commit 5b30ddd

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

articles/trusted-signing/faq.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -151,6 +151,7 @@ sections:
151151
| No certificates were found that met all the given criteria. | Check the dlib path, dlib version, dlib name, filename, and SignTool version. This error indicates that SignTool is attempting to pull certificates from your local computer instead of using Trusted Signing certificates. |
152152
| Error: "SignerSign() failed." (-2147024846/0x80070032) | Ensure that you're using the latest version of SignTool. |
153153
| Error code (-2147024885/0x8007000b) | For MSIX signing, this error indicates that the publisher in the manifest file doesn't match the certificate subject. Check the publisher that's listed in the manifest file. |
154+
| Error code (-2147467259/0x80004005) | If you use Service Principal + certificate based authentication, check your Environment Variables listed under the table for ["Service principal with certificate"](https://learn.microsoft.com/dotnet/api/azure.identity.environmentcredential?view=azure-dotnet).|
154155
| No error codes, SignTool silently fails | Ensure that the relevant .NET runtime version is installed. |
155156
| `Azure.Identity.CredentialUnavailableException` | You might see this error in [environments outside Azure](https://github.com/Azure/azure-sdk-for-net/issues/29471). If you are working outside of Azure, we recommend that you add "exclude ManagedIdentity" to your manifest file. |
156157
| 403 | - Check your Trusted Signing role. <br> - Check the Trusted Signing account name and the Trusted Signing certificate profile name in your *metadata.json* file. <br> - Check the dlib and dlib path. <br> - Install C++ Redistributables from https://docs.microsoft.com/en-us/cpp/windows/latest-supported-vc-redist?view=msvc-170. <br> - Check your .NET version, dlib version, and Windows SDK version. <br> - Check if the Trusted Signing role is assigned to the identity that's trying to sign the file. <br> - Check if the corresponding identity validation has a status of **Completed**.<br> - Verify whether you access the Trusted Signing endpoint from this virtual machine or computer. Try executing the action on a different virtual machine or computer. The error might indicate a network issue. <br> - For Private Trust scenarios 403: The user object ID that does the signing is different from the user object ID that calls `Get-azCodeSigningRootCert`. The appropriate object ID must have the role Trusted Signing Certificate Profile Signer.|

0 commit comments

Comments
 (0)