Skip to content

Commit d0f12de

Browse files
fixing sample commands
1 parent 6db6c24 commit d0f12de

File tree

3 files changed

+10
-11
lines changed

3 files changed

+10
-11
lines changed

articles/trusted-signing/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,6 @@
1010
items:
1111
- name: Signing Integrations with Trusted Signing
1212
href: how-to-signing-integrations.md
13-
- name: How-To
14-
items:
1513
- name: Sign CI Policies with Trusted Signing
1614
href: how-to-sign-ci-policy.md
1715
- name: Quickstart

articles/trusted-signing/how-to-sign-ci-policy.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -29,36 +29,37 @@ Import-Module .\Az.CodeSigning.psd1
2929
```
3030
4. Optionally you can create a `metadata.json` file:
3131
```
32-
Endpoint "https://scus.codesigning.azure.net/"
33-
CodeSigningAccountName "youracsaccount"
34-
CertificateProfileName "youracscertprofile"
32+
"Endpoint": "https://xxx.codesigning.azure.net/"
33+
"TrustedSigningAccountName": "<Trusted Signing Account Name>",
34+
"CertificateProfileName": "<Certificate Profile Name>",
3535
```
36+
3637
5. [Get the root certificate](https://learn.microsoft.com/powershell/module/az.codesigning/get-azcodesigningrootcert) to be added to the trust store
3738
```
3839
Get-AzCodeSigningRootCert -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/ -Destination c:\temp\root.cer
3940
```
4041
Or using a metadata.json
4142
```
42-
Get-AzCodeSigningRootCert -MetadataFilePath C:\temp\metadata.sample.scus.privateci.json https://xxx.codesigning.azure.net/ -Destination c:\temp\root.cer
43+
Get-AzCodeSigningRootCert -MetadataFilePath C:\temp\metadata.json https://xxx.codesigning.azure.net/ -Destination c:\temp\root.cer
4344
```
4445
6. To get the EKU (Extended Key Usage) to insert into your policy:
4546
```
46-
Get-AzCodeSigningCustomerEku -AccountName acstestcanary -ProfileName acstestcanaryCert1 -EndpointUrl https://xxx.codesigning.azure.net/
47+
Get-AzCodeSigningCustomerEku -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/
4748
```
4849
Or
4950

5051
```
51-
Get-AzCodeSigningCustomerEku -MetadataFilePath C:\temp\metadata.sample.scus.privateci.json
52+
Get-AzCodeSigningCustomerEku -MetadataFilePath C:\temp\metadata.json
5253
```
5354
7. To sign your policy, you run the invoke command:
5455
```
55-
Invoke-AzCodeSigningCIPolicySigning -accountName acstestcanary -profileName acstestcanaryCert1 -endpointurl "https://xxx.codesigning.azure.net/" -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
56+
Invoke-AzCodeSigningCIPolicySigning -accountName TestAccount -profileName TestCertProfile -endpointurl "https://xxx.codesigning.azure.net/" -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
5657
```
5758

5859
Or use a `metadata.json` file and the following command:
5960

6061
```
61-
Invoke-AzCodeSigningCIPolicySigning -MetadataFilePath C:\temp\metadata.sample.scus.privateci.json -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
62+
Invoke-AzCodeSigningCIPolicySigning -MetadataFilePath C:\temp\metadata.json -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
6263
```
6364

6465
## Creating and Deploying a CI Policy

articles/trusted-signing/how-to-signing-integrations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ To sign using Trusted Signing, you need to provide the details of your Trusted S
7878
```
7979
{
8080
  "Endpoint": "<Code Signing Account Endpoint>",
81-
  "CodeSigningAccountName": "<Code Signing Account Name>",
81+
  "TrustedSigningAccountName": "<Trusted Signing Account Name>",
8282
  "CertificateProfileName": "<Certificate Profile Name>",
8383
  "CorrelationId": "<Optional CorrelationId*>"
8484
}

0 commit comments

Comments
 (0)