@@ -20,7 +20,7 @@ To complete the steps in this article, you need:
20
20
- A Trusted Signing account, identity validation, and certificate profile.
21
21
- Individual or group assignment of the Trusted Signing Certificate Profile Signer role.
22
22
- [ Azure PowerShell in Windows] ( /powershell/azure/install-azps-windows ) installed.
23
- - [ Az.CodeSigning ] ( /powershell/module/az.codesigning / ) module downloaded.
23
+ - [ Az.TrustedSigning ] ( /powershell/module/az.trustedsigning / ) module downloaded.
24
24
25
25
## Sign a CI policy
26
26
@@ -36,40 +36,40 @@ To complete the steps in this article, you need:
36
36
}
37
37
```
38
38
39
- 1 . Get the [ root certificate] ( /powershell/module/az.codesigning /get-azcodesigningrootcert ) that you want to add to the trust store:
39
+ 1 . Get the [ root certificate] ( /powershell/module/az.trustedsigning /get-aztrustedsigningcertificateroot ) that you want to add to the trust store:
40
40
41
41
``` powershell
42
- Get-AzCodeSigningRootCert -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/ -Destination c:\temp\root.cer
42
+ Get-AzTrustedSigningCertificateRoot -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/ -Destination c:\temp\root.cer
43
43
```
44
44
45
45
If you're using a * metadata.json* file, run this command instead:
46
46
47
47
``` powershell
48
- Get-AzCodeSigningRootCert -MetadataFilePath C:\temp\metadata.json https://xxx.codesigning.azure.net/ -Destination c:\temp\root.cer
48
+ Get-AzTrustedSigningCertificateRoot -MetadataFilePath C:\temp\metadata.json -Destination c:\temp\root.cer
49
49
```
50
50
51
- 1 . To get the Extended Key Usage (EKU) to insert into your policy:
51
+ 1 . To get the [ Extended Key Usage (EKU) ] ( /powershell/module/az.trustedsigning/get-aztrustedsigningcustomereku ) to insert into your policy:
52
52
53
53
``` powershell
54
- Get-AzCodeSigningCustomerEku -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/
54
+ Get-AzTrustedSigningCustomerEku -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/
55
55
```
56
56
57
57
If you're using a * metadata.json* file, run this command instead:
58
58
59
59
``` powershell
60
- Get-AzCodeSigningCustomerEku -MetadataFilePath C:\temp\metadata.json
60
+ Get-AzTrustedSigningCustomerEku -MetadataFilePath C:\temp\metadata.json
61
61
```
62
62
63
- 1 . To sign your policy, run the ` invoke ` command:
63
+ 1 . To [ sign your policy] ( /powershell/module/az.trustedsigning/invoke-aztrustedsigningcipolicysigning ) , run the ` invoke ` command:
64
64
65
65
``` powershell
66
- Invoke-AzCodeSigningCIPolicySigning -accountName TestAccount -profileName TestCertProfile -endpointurl "https://xxx.codesigning.azure.net/" -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
66
+ Invoke-AzTrustedSigningCIPolicySigning -accountName TestAccount -profileName TestCertProfile -endpointurl "https://xxx.codesigning.azure.net/" -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
67
67
```
68
68
69
69
If you're using a * metadata.json* file, run this command instead:
70
70
71
71
``` powershell
72
- Invoke-AzCodeSigningCIPolicySigning -MetadataFilePath C:\temp\metadata.json -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
72
+ Invoke-AzTrustedSigningCIPolicySigning -MetadataFilePath C:\temp\metadata.json -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
73
73
```
74
74
75
75
## Create and deploy a CI policy
0 commit comments