Skip to content

Commit e92d9ff

Browse files
author
Jill Grant
authored
Merge pull request #288277 from TacoTechSharma/changename
added new alias
2 parents 312f60c + d255359 commit e92d9ff

File tree

2 files changed

+34
-37
lines changed

2 files changed

+34
-37
lines changed
Lines changed: 23 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,38 +1,35 @@
11
---
2-
title: Renew a Trusted Signing identity validation
3-
description: Learn how to renew a Trusted Signing identity validation.
4-
author: mehasharma
2+
title: Renew Trusted Signing Identity Validation
3+
description: How-to rerenew a Trusted Signing Identity Validation.
4+
author: TacoTechSharma
55
ms.author: mesharm
66
ms.service: trusted-signing
77
ms.topic: how-to
88
ms.date: 04/12/2024
99
---
1010

11-
# Renew a Trusted Signing identity validation
11+
# Renew Trusted Signing Identity Validation
1212

13-
On the **Identity validation** pane, you can check the expiration date of your identity validation. You can renew your Trusted Signing identity validation 60 days before the expiration date. A reminder notification to renew your identity validation is sent to the primary and secondary email addresses for the Trusted Signing account.
13+
You can check the expiration date of your Identity Validation on the Identity Validation page. You can renew your Trusted Signing Identity Validation **60 days** before the expiration. A notification is to the primary and secondary email addresses with the reminder to renew your Identity Validation.
14+
**Identity Validation can only be completed in the Azure portal – it can not be completed with Azure CLI.**
1415

15-
You can complete identity validation *only* in the Azure portal. You can't complete identity validation by using the Azure CLI.
16+
>[!Note]
17+
>Failure to renew Identity Validation before the expiration date will stop certificate renewal, effectively halting the signing process associated with those specific certificate profiles.
18+
>EKU does not change when you renew Identity Validation.
1619
17-
> [!NOTE]
18-
> If you don't renew your identity validation before the expiration date, certificate renewal stops. The signing process that's associated with the specific certificate profiles is effectively halted.
20+
1. Navigate to your Trusted Signing account in the [Azure portal](https://portal.azure.com/).
21+
2. Confirm you have the **Trusted Signing Identity Verifier role**.
22+
- To learn more about Role Based Access management (RBAC) access management, see [Assigning roles in Trusted Signing](tutorial-assign-roles.md).
23+
3. From either the Trusted Signing account overview page or from Objects, select **Identity Validation**.
24+
4. Select the Identity Validation request that needs to be renewed. Select **Renew** on the top.
1925

20-
1. In the [Azure portal](https://portal.azure.com/), go to your Trusted Signing account.
21-
1. Confirm that you're assigned the Trusted Signing Identity Verifier role.
26+
:::image type="content" source="media/trusted-signing-renew-identity-validation.png" alt-text="Screenshot of trusted signing renew identity-validation button.png." lightbox="media/trusted-signing-renew-identity-validation.png":::
2227

23-
To learn about managing access by using role-based access control (RBAC), see [Assign roles in Trusted Signing](tutorial-assign-roles.md).
24-
1. On the Trusted Signing account **Overview** pane or on the resource menu under **Objects**, select **Identity validations**.
25-
1. Select the identity validation request that you want to renew. On the menu bar, select **Renew**.
26-
27-
:::image type="content" source="media/trusted-signing-renew-identity-validation.png" alt-text="Screenshot that shows the Renew option for an identity validation request." lightbox="media/trusted-signing-renew-identity-validation.png":::
28-
29-
If you encounter validation errors when you renew by selecting the **Renew** button or if the identity validation request is expired, create a new identity validation request. To learn more about creating a new identity validation, see the [Set up Trusted Signing quickstart](quickstart.md).
30-
1. Verify that after you renew a request, the identity validation status is **Completed**.
31-
1. To ensure that you can continue to use your existing *metadata.json* file:
32-
33-
1. On the Trusted Signing account **Overview** pane or on the resource menu under **Objects**, select **Certificate profiles**.
34-
1. On the **Certificate profiles** pane, delete the existing certificate profile that's associated with the expiring identity validation.
35-
1. Create a new certificate profile that has the same name.
36-
1. Select the identity validation.
37-
38-
When the certificate profile is successfully created, signing resumes without any other configuration changes.
28+
5. If you encounter validation errors while renewing through the renew button or if Identity Validation is Expired, you need to create a new Identity Validation.
29+
- To learn more about creating new Identity Validation, see [Quickstart](quickstart.md).
30+
6. After the Identity Validation status changes to Completed.
31+
7. To ensure you can continue with your existing metadata.json.
32+
- Navigate back to the trusted signing account overview page or from Objects, select **Certificate Profile**.
33+
- On the **Certificate Profiles**, delete the existing cert profile associated to the Identity Validation expiring soon:
34+
- Create new cert profile with the same name.
35+
- Select the Identity Validation from the pull-down. Once the certificate profile is created successfully, signing resumes requiring no configuration changes on your end.

articles/trusted-signing/how-to-sign-history.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Access signed transactions in Trusted Signing
33
description: Learn how to access signed transactions in Trusted Signing in the Azure portal.
4-
author: mehasharma
4+
author: meha
55
ms.author: mesharm
66
ms.service: trusted-signing
77
ms.topic: how-to
@@ -49,22 +49,22 @@ To complete the steps in this article, you need:
4949
To access and send signing transactions to your storage account: 
5050

5151
1. In the Azure portal, go to your Trusted Signing account.
52-
1. On the Trusted Signing account **Overview** pane, in the resource menu under **Monitoring**, select **Diagnostic settings**.
53-
1. On the **Diagnostic settings** pane, select **+ Add diagnostic setting**.
52+
2. On the Trusted Signing account **Overview** pane, in the resource menu under **Monitoring**, select **Diagnostic settings**.
53+
3. On the **Diagnostic settings** pane, select **+ Add diagnostic setting**.
5454

5555
:::image type="content" source="media/trusted-signing-diagnostic-settings.png" alt-text="Screenshot that shows adding a diagnostic setting." lightbox="media/trusted-signing-diagnostic-settings.png":::
5656

5757
1. On the **Diagnostic setting** pane:
5858

5959
1. Enter a name for the diagnostic setting.
60-
1. Under **Logs** > **Categories**, select the **Sign Transactions** checkbox.
61-
1. Under **Destination details**, select the **Archive to a storage account** checkbox.
62-
1. Select the subscription and storage account that you want to use.
60+
2. Under **Logs** > **Categories**, select the **Sign Transactions** checkbox.
61+
3. Under **Destination details**, select the **Archive to a storage account** checkbox.
62+
4. Select the subscription and storage account that you want to use.
6363

6464
:::image type="content" source="media/trusted-signing-select-storage-account-subscription.png" alt-text="Screenshot that shows configuring a diagnostic setting for a storage account." lightbox="media/trusted-signing-select-storage-account-subscription.png":::
6565

66-
1. Select **Save**. A pane displays a list of all diagnostic settings that were created for this code signing account. 
67-
1. After you create a diagnostic setting, wait for 10 to 15 minutes for the events to begin to be ingested in the storage account you created. 
68-
1. Go to the storage account. 
69-
1. In your storage account resource menu under **Data storage**, go to **Containers**.
70-
1. In the list, select the container named `insights-logs-signtransactions`. Go to the date and time you want to view to download the log.
66+
2. Select **Save**. A pane displays a list of all diagnostic settings that were created for this code signing account. 
67+
3. After you create a diagnostic setting, wait for 10 to 15 minutes for the events to begin to be ingested in the storage account you created. 
68+
4. Go to the storage account. 
69+
5. In your storage account resource menu under **Data storage**, go to **Containers**.
70+
6. In the list, select the container named `insights-logs-signtransactions`. Go to the date and time you want to view to download the log.

0 commit comments

Comments
 (0)