You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/trusted-signing/faq.yml
+12-12Lines changed: 12 additions & 12 deletions
Original file line number
Diff line number
Diff line change
@@ -17,21 +17,21 @@ sections:
17
17
questions:
18
18
- question: What versions of Windows does Trusted Signing support?
19
19
answer: |
20
-
The Trusted Signing service supports all versions of Windows that run the general user-mode code integrity (UMCI) security policy.
20
+
The Trusted Signing service supports all versions of Windows that support the general user-mode code integrity (UMCI) security policy.
21
21
22
22
Support for signed binaries was added in the July 2021 Certificate Trust List (CTL) update for Windows. In a typical scenario, when an end-entity certificate from a chain is encountered on a computer, the system retrieves the root certificate authority (CA) certificate and adds it to the trust root store.
23
23
24
24
For more information about Windows support for Trusted Signing, see [Trusted Signing Program Windows Support](https://support.microsoft.com/topic/kb5022661-windows-support-for-the-azure-code-signing-program-4b505a31-fa1e-4ea6-85dd-6630229e8ef4).
25
-
- question: How do I grant API access to Trusted Signing in Microsoft Entra ID?
25
+
- question: How do I grant API access to Trusted Signing in Microsoft Entra?
26
26
answer: |
27
27
Ask your Microsoft Entra admin to approve your request for access. For more information about permissions, see these articles:
28
28
29
29
- [Overview of consent and permissions](https://learn.microsoft.com/entra/identity/enterprise-apps/user-admin-consent-overview)
30
30
- [Configure the admin consent workflow](https://learn.microsoft.com/entra/identity/enterprise-apps/configure-admin-consent-workflow)
31
31
- [Review permissions granted to applications](https://learn.microsoft.com/entra/identity/enterprise-apps/manage-application-permissions?pivots=portal)
32
-
- question: What if I don't see `Microsoft.CodeSigning` as a resource provider?
32
+
- question: What if I don't see Microsoft.CodeSigning as a resource provider?
33
33
answer: |
34
-
To register the `Microsoft.CodeSigning` app, go to the subscription **Resource providers** pane as shown in this example:
34
+
To register the Microsoft.CodeSigning app, go to the subscription **Resource providers** pane as shown in this example:
35
35
36
36
:::image type="content" source="media/trusted-signing-resource-provider.png" alt-text="Screenshot of registering the Microsoft.CodeSigning resource provider." lightbox="media/trusted-signing-resource-provider.png":::
37
37
@@ -42,25 +42,25 @@ sections:
42
42
- If identity validation fails, but not because of a missed email verification, the Microsoft validation team wasn't able to make a determination about your request based on the information that you provided. Even if you provide more documentation when we request it, if we can't validate the information, we can't onboard you to Trusted Signing. In this scenario, we recommend that you delete your Trusted Signing account so that you aren't billed for unused resources.
43
43
- question: What if I need assistance with identity validation?
44
44
answer: |
45
-
For questions about identity validation in Trusted Signing, contact us by using [Microsoft Q&A](https://learn.microsoft.com/answers/tags/509/trusted-signing) (use the tag `Azure Trusted Signing`) or [Stack Overflow](https://stackoverflow.com/questions/tagged/trusted-signing) (use the tag `trusted-signing`). Azure support doesn't resolve identity validation issues for Trusted Signing.
45
+
For questions about identity validation in Trusted Signing, contact us by using [Microsoft Q&A](https://learn.microsoft.com/answers/tags/509/trusted-signing) (use the tag **Azure Trusted Signing**) or [Stack Overflow](https://stackoverflow.com/questions/tagged/trusted-signing) (use the tag **trusted-signing**). Azure support doesn't resolve identity validation issues for Trusted Signing.
46
46
- question: What is the cost of using Trusted Signing?
47
47
answer: |
48
-
For pricing information, see the [Trusted Signing pricing page](https://azure.microsoft.com/pricing/details/trusted-signing/).
48
+
For pricing information, see [Trusted Signing pricing](https://azure.microsoft.com/pricing/details/trusted-signing/).
49
49
- question: What are my support options when I set up Trusted Signing?
50
50
answer: |
51
51
You can create a support ticket in the Azure portal to get Azure support. Also, you can post a question or search for related questions on [Microsoft Q&A](https://learn.microsoft.com/answers/tags/509/trusted-signing) (use the tag `Azure Trusted Signing`) or [Stack Overflow](https://stackoverflow.com/questions/tagged/trusted-signing) (use the tag `trusted-signing`).
52
52
- name: Certificate profiles and identity validation
53
53
questions:
54
54
- question: What if my Trusted Signing subject name is different from the name in my certificate and my MSIX package name is different now?
55
55
answer: |
56
-
Follow the persistent identity guidance in [MSIX persistent identity](/windows/msix/package/persistent-identity).
56
+
For Windows app MSIX packages, follow the guidance in [MSIX persistent identity](/windows/msix/package/persistent-identity).
57
57
- question: Does deleting a certificate profile revoke the certificates?
58
58
answer: |
59
59
No. If you delete a certificate profile, any certificates that were previously issued or used under that profile remain valid. The certificates aren't revoked.
60
60
- question: Can I use a custom CN or a custom O with Trusted Signing?
61
61
answer: |
62
62
No, you can't use use a custom Common Name (CN) or a custom Organization (O) with Trusted Signing. Currently, the Trusted Signing service doesn't support customization. Also, keep in mind that per Code Signing Baseline Requirements (CSBRs) for publicly trusted code signing certificates, CN values must always be the legal entity's validated name (for example, `Microsoft Corporation`).
63
-
- question: What if the **New identity validation** button in the Azure portal is inactive?
63
+
- question: What if the "New identity validation" button in the Azure portal is inactive?
64
64
answer: |
65
65
If the **New identity validation** button in the Azure portal is inactive and you can't select it, you don't have the Trusted Signing Identity Verifier role assigned to your account. To assign yourself the role, complete the steps in [Assign roles in Trusted Signing](https://learn.microsoft.com/azure/trusted-signing/tutorial-assign-roles).
66
66
- question: What if my identity validation expires?
@@ -77,7 +77,7 @@ sections:
77
77
FIPS 140-2 Level 3 (mHSMs).
78
78
- question: How do I include the appropriate EKU for our certificates in the ELAM driver resources?
79
79
answer: |
80
-
For information about the Early Launch Antimalware (ELAM) driver configuration for protecting anti-malware user-mode services, see the following guidance: "Beginning in 2022, all user mode anti-malware service binaries must be signed by Microsoft's Trusted Signing signing service. The Trusted Signing issued Authenticode certificate for signing anti-malware binaries is updated every 30 days for security. To prevent the need to update the ELAM driver every time the certificate is updated, we recommend that anti-malware vendors include the Trusted Signing PCA certificate TBS hash in the CertHash portion of the ELAM driver resource file info. Additionally, the anti-malware vendor must include their unique Trusted Signing EKU identity in the EKU field of the resource file info. The EKU identity will begin with the prefix `1.3.6.1.4.1.311.97.*`."
80
+
For information about the Early Launch Antimalware (ELAM) driver configuration for protecting anti-malware user-mode services, see the following guidance: "Beginning in 2022, all user mode anti-malware service binaries must be signed by Microsoft's Trusted Signing signing service. The Trusted Signing issued Authenticode certificate for signing anti-malware binaries is updated every 30 days for security. To prevent the need to update the ELAM driver every time the certificate is updated, we recommend that anti-malware vendors include the Trusted Signing PCA certificate TBS hash in the CertHash portion of the ELAM driver resource file info. Additionally, the anti-malware vendor must include their unique Trusted Signing EKU identity in the EKU field of the resource file info. The EKU identity will begin with the prefix `1.3.6.1.4.1.311.97.`."
81
81
82
82
For the Microsoft ID Verified Code Signing PCA 2021 certificate, see the [Microsoft PKI Services repository](https://www.microsoft.com/pkiops/docs/repository.htm).
83
83
- question: What happens if we run binaries that are signed by using Trusted Signing on a computer that doesn't have the Trusted Signing update (especially binaries that are flagged for /INTEGRITYCHECK?
@@ -106,13 +106,13 @@ sections:
106
106
- question: I get errors when I do Private Trust signing. What should I do?
107
107
answer: |
108
108
If you get an internal error, check that the CN name that you used matches the certificate name. Verify the package name, and copy the complete value for the subject from the Azure portal to the manifest file during signing.
109
-
- question: I'm see the status **Command succeeded** for SignTool, but the file doesn't appear to be signed when I check the digital signature. What should I do?
109
+
- question: I see the status "Command succeeded" for SignTool, but the file doesn't appear to be signed when I check the digital signature. What should I do?
110
110
answer: |
111
111
If the signature doesn't appear in the digital signature property, run this command: `.\signtool.exe verify /v /debug /pa fileName`. Not all file types have the **Signature** tab in **Properties**.
112
-
- question: How do I fix popup credentials in an Azure virtual machine when I run the SignTool + dlib command?
112
+
- question: How do I fix pop-up credentials in an Azure virtual machine when I run the SignTool + dlib command?
113
113
answer: |
114
114
1. Create a [user-assigned managed identity](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview).
115
-
1. Add the user-assigned managed identity to the virtual machine (VM):
115
+
1. Add the user-assigned managed identity to the VM:
116
116
1. Select the VM.
117
117
1. On the left menu, select **Identity**, and then select **User assigned**.
Copy file name to clipboardExpand all lines: articles/trusted-signing/how-to-change-sku.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,11 +9,11 @@ ms.date: 05/30/2024
9
9
---
10
10
11
11
12
-
# Select or change Trusted Signing SKU (pricing tier)
12
+
# Change a Trusted Signing account SKU (pricing tier)
13
13
14
14
Trusted Signing gives you a choice between two pricing tiers: Basic and Premium. Both tiers are tailored to offer the service at an optimal cost and to be suitable for any signing scenario.
15
15
16
-
For more information about pricing, see the Trusted Signing [Pricing](https://azure.microsoft.com/pricing/details/trusted-signing/) article.
16
+
For more information, see [Trusted Signing pricing](https://azure.microsoft.com/pricing/details/trusted-signing/).
17
17
18
18
## SKU (pricing tier) overview
19
19
@@ -40,15 +40,15 @@ Things to keep in mind:
40
40
- SKU updates are effective beginning in the next billing cycle.
41
41
- SKU limitations for an updated SKU are enforced after the update is successful.
42
42
- After you change the SKU, you must manually refresh the account overview to see the updated SKU under **SKU (Pricing tier)**. (We are actively working to resolve this known limitation.)
43
+
- To upgrade to Premium:
44
+
45
+
- No limitations are applied when you upgrade from the Basic SKU to the Premium SKU.
43
46
- To downgrade to Basic:
44
47
45
-
- The Basic SKU allows only one certificate profile of each type. For example, if you have two certificate profiles of the Public Trust type, you need to delete any single profile to be eligible to downgrade. The same limitation applies for other certificate profile types.
48
+
- The Basic SKU allows only one certificate profile of each type. For example, if you have two certificate profiles of the Public Trust type, you must delete any single profile to be eligible to downgrade. The same limitation applies for other certificate profile types.
46
49
- In the Azure portal, on the **Certificate Profiles** pane, make sure that you select **Status: All** to view all certificate profiles. Viewing all certificate profiles can help you delete all relevant certificate profiles to meet the criteria to downgrade.
47
50
48
51
:::image type="content" source="media/trusted-signing-certificate-profile-deletion-changesku.png" alt-text="Screenshot that shows selecting all certificate profile statuses to view all certificate profiles." lightbox="media/trusted-signing-certificate-profile-deletion-changesku.png":::
49
-
- To upgrade to Premium:
50
-
51
-
- No limitations are applied when you upgrade from the Basic SKU to the Premium SKU.
0 commit comments