Skip to content

Commit e831eaa

Browse files
author
Jill Grant
authored
Merge pull request #286917 from mehasharma/dgsssupport
Dgsssupport
2 parents d7f0fcb + 452e6ba commit e831eaa

File tree

2 files changed

+6
-1
lines changed

2 files changed

+6
-1
lines changed

articles/trusted-signing/faq.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -151,6 +151,7 @@ sections:
151151
| No certificates were found that met all the given criteria. | Check the dlib path, dlib version, dlib name, filename, and SignTool version. This error indicates that SignTool is attempting to pull certificates from your local computer instead of using Trusted Signing certificates. |
152152
| Error: "SignerSign() failed." (-2147024846/0x80070032) | Ensure that you're using the latest version of SignTool. |
153153
| Error code (-2147024885/0x8007000b) | For MSIX signing, this error indicates that the publisher in the manifest file doesn't match the certificate subject. Check the publisher that's listed in the manifest file. |
154+
| Error code (-2147467259/0x80004005) | If you use Service Principal + certificate based authentication, check your Environment Variables listed under the table for ["Service principal with certificate"](https://learn.microsoft.com/dotnet/api/azure.identity.environmentcredential?view=azure-dotnet).|
154155
| No error codes, SignTool silently fails | Ensure that the relevant .NET runtime version is installed. |
155156
| `Azure.Identity.CredentialUnavailableException` | You might see this error in [environments outside Azure](https://github.com/Azure/azure-sdk-for-net/issues/29471). If you are working outside of Azure, we recommend that you add "exclude ManagedIdentity" to your manifest file. |
156157
| 403 | - Check your Trusted Signing role. <br> - Check the Trusted Signing account name and the Trusted Signing certificate profile name in your *metadata.json* file. <br> - Check the dlib and dlib path. <br> - Install C++ Redistributables from https://docs.microsoft.com/en-us/cpp/windows/latest-supported-vc-redist?view=msvc-170. <br> - Check your .NET version, dlib version, and Windows SDK version. <br> - Check if the Trusted Signing role is assigned to the identity that's trying to sign the file. <br> - Check if the corresponding identity validation has a status of **Completed**.<br> - Verify whether you access the Trusted Signing endpoint from this virtual machine or computer. Try executing the action on a different virtual machine or computer. The error might indicate a network issue. <br> - For Private Trust scenarios 403: The user object ID that does the signing is different from the user object ID that calls `Get-azCodeSigningRootCert`. The appropriate object ID must have the role Trusted Signing Certificate Profile Signer.|

articles/trusted-signing/how-to-device-guard-signing-service-migration.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,4 +195,8 @@ If isolation is desired, deploy a new CI policy by following steps outlined in S
195195
- [Understand Windows Defender Application Control (WDAC) policy rules and file rules](/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create).
196196
- [Deploy catalog files to support Windows Defender Application Control (Windows 10) - Windows security](/windows/security/threat-protection/windows-defender-application-control/deploy-catalog-files-to-support-windows-defender-application-control#:~:text=%20Deploy%20catalog%20files%20to%20support%20Windows%20Defender,signing%20certificate%20to%20a%20Windows%20Defender...%20More%20).
197197
- [Example Windows Defender Application Control (WDAC) base policies (Windows 10) - Windows security | Microsoft Docs](/windows/security/threat-protection/windows-defender-application-control/example-wdac-base-policies)
198-
- [Use multiple Windows Defender Application Control Policies (Windows 10)](/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies#deploying-multiple-policies-locally)
198+
- [Use multiple Windows Defender Application Control Policies (Windows 10)](/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies#deploying-multiple-policies-locally)
199+
- Need help with the migration: Contact us via:
200+
- Support + troubleshooting (on Azure portal)
201+
- [Microsoft Q&A](https://learn.microsoft.com/answers/tags/509/trusted-signing) (use the tag **Azure Trusted Signing**)
202+
- [Stack Overflow](https://stackoverflow.com/questions/tagged/trusted-signing) (use the tag **trusted-signing**).

0 commit comments

Comments
 (0)