Skip to content

Commit 800e1a2

Browse files
Merge pull request #286166 from mehasharma/faq
added exclude credential
2 parents b4d8a0f + 38b6b0f commit 800e1a2

File tree

3 files changed

+25
-5
lines changed

3 files changed

+25
-5
lines changed

articles/trusted-signing/faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ sections:
146146
answer: |
147147
| Error | Details |
148148
| :------------------- | :------------------- |
149-
| 400 | An Azure authentication error. This error is due to caching of certificates. Add `"ExcludeCredentials": ["SharedTokenCacheCredential"]` to your JSON file. For more information, see [DefaultAzureCredential Class (Azure.Identity)](/dotnet/api/azure.identity.defaultazurecredential?view=azure-dotnet). |
149+
| 400 | An Azure authentication error. This error is due to caching of certificates. Add `"ExcludeCredentials": ["<include list of credentials to be excluded>"]` to your JSON file. For more information, see [DefaultAzureCredential Class (Azure.Identity)](/dotnet/api/azure.identity.defaultazurecredential?view=azure-dotnet). |
150150
| 401 | You aren't authenticated. Sign out and sign back in. |
151151
| 404 | Ensure that no changes were made to your configuration or firewalls rules. |
152152
| "MsalUiRequiredException" | Typically occurs due to the local cache. The error resolves after the cache is refreshed from Azure. |

articles/trusted-signing/how-to-device-guard-signing-service-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Device Guard Signing Service migration to Trusted Signing
33
description: Learn how to migrate from Device Guard Signing Service (DGSSv2) to Trusted Signing for code integrity policy
4-
author: mehasharma
4+
author: meha
55
ms.author: mesharm
66
ms.service: trusted-signing
77
ms.topic: how-to

articles/trusted-signing/how-to-signing-integrations.md

Lines changed: 23 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ To complete the steps in this article, you need:
4141
1. [Download and install the .NET 8 Runtime](#download-and-install-net-80-runtime).
4242
1. [Download and install the Trusted Signing dlib package](#download-and-install-the-trusted-signing-dlib-package).
4343
1. [Create a JSON file to provide your Trusted Signing account and a certificate profile](#create-a-json-file).
44-
1. [Invoke SignTool to sign a file](#use-signtool-to-sign-a-file).
44+
1. [To Sign a file, Invoke SignTool](#use-signtool-to-sign-a-file).
4545

4646
### Download and install SignTool
4747

@@ -51,7 +51,7 @@ To download and install SignTool:
5151

5252
1. Download the latest version of SignTool and Windows Build Tools NuGet at [Microsoft.Windows.SDK.BuildTools](https://www.nuget.org/packages/Microsoft.Windows.SDK.BuildTools/).
5353

54-
1. Install SignTool from the Windows SDK (minimum version: 10.0.2261.755, 20348 Windows SDK version is not supported with our dlib).
54+
1. Install SignTool from the Windows SDK (minimum version: 10.0.2261.755, 20348 Windows SDK version isn't supported with our dlib).
5555

5656
Another option is to use the latest *nuget.exe* file to download and extract the latest Windows SDK Build Tools NuGet package by using PowerShell:
5757

@@ -82,7 +82,7 @@ To download and install the Trusted Signing dlib package (a .zip file):
8282

8383
1. Download the [Trusted Signing dlib package](https://www.nuget.org/packages/Microsoft.Trusted.Signing.Client).
8484

85-
1. Extract the Trusted Signing dlib zipped content and install it on your signing node in your choice of directory. The node must be the node where you'll use SignTool to sign files.
85+
1. Extract the Trusted Signing dlib zipped content and install it on your signing node in your choice of directory. The node must be the node where you use SignTool to sign files.
8686

8787
Another option is to download the [Trusted Signing dlib package](https://www.nuget.org/packages/Microsoft.Trusted.Signing.Client) via NuGet similar like the Windows SDK Build Tools NuGet package:
8888

@@ -119,6 +119,26 @@ To sign by using Trusted Signing, you need to provide the details of your Truste
119119

120120
<sup>1</sup> The optional `"CorrelationId"` field is an opaque string value that you can provide to correlate sign requests with your own workflows, such as build identifiers or machine names.
121121

122+
### Authentication
123+
124+
This Task performs authentication using [DefaultAzureCredential](https://learn.microsoft.com/dotnet/api/azure.identity.defaultazurecredential?view=azure-dotnet), which attempts a series of authentication methods in order. If one method fails, it attempts the next one until authentication is successful.
125+
126+
Each authentication method can be disabled individually to avoid unnecessary attempts.
127+
128+
For example, when authenticating with [EnvironmentCredential](https://learn.microsoft.com/dotnet/api/azure.identity.environmentcredential?view=azure-dotnet) specifically, disable the other credentials with the following inputs:
129+
130+
ExcludeEnvironmentCredential: false
131+
ExcludeManagedIdentityCredential: true
132+
ExcludeSharedTokenCacheCredential: true
133+
ExcludeVisualStudioCredential: true
134+
ExcludeVisualStudioCodeCredential: true
135+
ExcludeAzureCliCredential: true
136+
ExcludeAzurePowershellCredential: true
137+
ExcludeInteractiveBrowserCredential: true
138+
139+
Similarly, if using for example an [AzureCliCredential](https://learn.microsoft.com/dotnet/api/azure.identity.azureclicredential?view=azure-dotnet) , then we want to skip over attempting to authenticate with the several methods that come before it in order.
140+
141+
122142
### Use SignTool to sign a file
123143

124144
To invoke SignTool to sign a file:

0 commit comments

Comments
 (0)