Skip to content

Commit df64890

Browse files
add changes to faq
1 parent a6570d9 commit df64890

File tree

2 files changed

+14
-22
lines changed

2 files changed

+14
-22
lines changed

articles/trusted-signing/faq.yml

Lines changed: 13 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ sections:
4242
We recommend you delete your Trusted Signing account so you don't get billed for unused resources.
4343
- question: What is the cost of using Trusted Signing?
4444
answer: |
45-
In Public Preview Trusted Signing is free for now. You're prompted to select a Basic or Premium SKU when you create your account.
45+
Trusted Signing is free for now in Public Preview. You're prompted to select a Basic or Premium SKU when you create your account.
4646
- question: What are my support options when onboarding to Trusted Signing?
4747
answer: |
4848
You can create a support ticket with the service on the Azure portal and are Azure customer support. Otherwise, we recommend you go to Microsoft Q&A or StackOverflow under the tag Trusted-Signing to ask questions.
@@ -70,7 +70,7 @@ sections:
7070
- question: What types of files can be signed with Trusted Signing?
7171
answer: |
7272
You can sign file types supported by SignTool. [Find the list here.](https://learn.microsoft.com/windows/win32/seccrypto/cryptography-tools)
73-
- question: What is Trusted Signing’s HSM compliance level?
73+
- question: What is HSM compliance level for Trusted Signing?
7474
answer: |
7575
FIPS 140-2 level 3 (mHSMs)
7676
- question: How to include the appropriate EKU for our certificates into the ELAM driver resources?
@@ -125,7 +125,7 @@ sections:
125125
Trusted Signing will suspend accounts and or revoke signing certificates if the certificate is found to be misused or abused per our service's Terms of Use. We engage with you directly in such cases following the Code Signing Baseline Requirements (CSBRs) guidelines.
126126
- question: What if I change the Subscription ID or Tenant ID?
127127
answer: |
128-
At the moment, Trusted Signing resources can't be migrated across Subscriptions or Tenants. Hence, any change to Tenant ID or Subscription ID need for you to create all the Trusted Signing resources again.
128+
At the moment, Trusted Signing resources can't be migrated across Subscriptions or Tenants. Hence, any change to Tenant ID or Subscription ID needs for you to create all the Trusted Signing resources again.
129129
- question: Does Trusted Signing issue EV certificates?
130130
answer: |
131131
No, Trusted Signing doesn't issue EV certificates and there are no plans to issue in the future.
@@ -135,28 +135,20 @@ sections:
135135
- question: Why does sign tool keep looping while signing MSIX packages?
136136
answer: |
137137
Looping multi times is expected behavior for MSIX signing, since MSIX signing signs each appx and manifest inside the package.
138-
- question: Errors and the corresponding details to fix the issue.
138+
- question: Common Error codes and mitigations.
139139
answer: |
140140
| Error | Details |
141141
| :------------------- | :------------------- |
142-
| 400 | This is an Azure authentication error. This error is due to caching of certificates. Add "ExcludeCredentials": ["SharedTokenCacheCredential"] to your JSON. To learn more, go to DefaultAzureCredential Class (Azure.Identity) |
143-
| 401 | You aren't authenticated. Try logging out and loggin back in. |
144-
| 403 | 1. Check Trusted Signing role.
145-
2. Check Trusted Signing account name and Trusted Signing Certificate profile name n your metadata.json.
146-
3. Check dlib and dlib path
147-
4. Install C++ Redistributables: Download link: https://docs.microsoft.com/en-us/cpp/windows/latest-supported-vc-redist?view=msvc-170
148-
5. Check .Net version, dlib version and Windows SDK
149-
6. Check if Trusted Signing role is assigned to the identity trying to sign the file.
150-
7. Check if the corresponding Identity Validation is in "Completed" state.
151-
8. Verify if you access the Trusted Signing endpoint from this VM or machine?Try executing the action on a differet VM or machine. It can be a potential network issue.
152-
9. For Private Trust scenarios 403: The user object Id to do the signing is different than the user object Id to call the Get-azCodeSigningRootCert. The appropriate objectId needs to have the role “Trusted Signing Certificate Profile Signer”. |
153-
| 404 | Ensure no changes happened with respect your config or firewalls rules. |
154-
| MsalUiRequiredException" | This usually occurs due to the local cache. The error resolves after the cache gets refreshed from Azure. |
155-
| No certificates were found that met all the given criteria. | Check dlib path, dlib version, dlib name, filename, check sign tool version. This error means it is trying to pull certificates from your local machine and not using Trusted Signing certificates. |
156-
| Error: SignerSign() failed." (-2147024846/0x80070032) | Ensure you're using the latest signtool version. |
157-
| Error code (-2147024885/0x8007000b) | For MSIX signing, indicates that the publisher in the manifest doesn't match the cert subject. Can you check the publisher in the manifest file? |
158-
| No error codes, Signtool silently fails | Ensure the relevant .NET runtime is installed. |
142+
| 400 | This is an Azure authentication error. This error is due to caching of certificates. Add "ExcludeCredentials": ["SharedTokenCacheCredential"] to your JSON. To learn more, go to DefaultAzureCredential Class (Azure.Identity)|
143+
| 401 | You aren't authenticated. Try logging out and log back in.|
144+
| 404 | Ensure no changes happened with respect your config or firewalls rules.|
145+
| MsalUiRequiredException" | This usually occurs due to the local cache. The error resolves after the cache gets refreshed from Azure.|
146+
| No certificates were found that met all the given criteria. | Check dlib path, dlib version, dlib name, filename, check sign tool version. This error means it's trying to pull certificates from your local machine and not using Trusted Signing certificates.|
147+
| Error: SignerSign() failed." (-2147024846/0x80070032) | Ensure you're using the latest signtool version.|
148+
| Error code (-2147024885/0x8007000b) | For MSIX signing, indicates that the publisher in the manifest doesn't match the cert subject. Can you check the publisher in the manifest file?|
149+
| No error codes, Signtool silently fails | Ensure the relevant .Net runtime is installed.|
159150
| Azure.Identity.CredentialUnavailableException | You should expect to see the error on environments outside of Azure [see here](https://github.com/Azure/azure-sdk-for-net/issues/29471). Recommendation is to "exclude ManagedIdentity" if you're outside of Azure.|
151+
160152
- name: Unenroll from the Service
161153
questions:
162154
- question: How do you unenroll from Trusted Signing Service?

articles/trusted-signing/quickstart.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -231,7 +231,7 @@ Here are the steps to create an Identity Validation request:
231231
| Onboarding | Trusted Signing at this time can only onboard Legal Business Entities that have verifiable tax history of three or more years. For a quicker onboarding process ensure public records for the Legal Entity being validated are upto date. |
232232
| Accuracy | Ensure you provide the correct information for Public Identity Validation. Any changes or typos require you to complete a new Identity Validation request and affect the associated certificates used for signing.|
233233
| Additional documentation | You are notified though email, if we need extra documentation to process the identity validation request. The documents can be uploaded in Azure portal. The email contains information about the file size requirements. Ensure the documents provided are latest.|
234-
| Failure to perform email verification | You are required to initiate a new Identity Validation request if you missed to verify your emaail address within 7 days of receiving the verification link.|
234+
| Failure to perform email verification | You are required to initiate a new Identity Validation request if you missed verifying your email address within 7 days of receiving the verification link.|
235235
| Identity Validation status | You are notified through email when there is an update to the Identity Validation status. You can also check the status in the Azure portal at any time. |
236236
| Processing time | Expect anywhere between 1-7 business days (or sometimes longer if we need extra documentation from you) to process your Identity Validation request.|
237237

0 commit comments

Comments
 (0)