Skip to content

Commit 892988c

Browse files
authored
Merge pull request #9362 from MicrosoftDocs/split-troubleshoot-the-wrap-feature-article-into-3-articles
AB#6682, AB#6703, AB#6704: Split the article into 3 articles based on scenarios
2 parents a4bd276 + a860227 commit 892988c

23 files changed

Lines changed: 370 additions & 343 deletions
Lines changed: 238 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,238 @@
1+
---
2+
title: Azure Key Vault Errors in Wrap For Power Apps
3+
description: Provides solutions for the Azure key vault errors that occur when using the wrap feature in Power Apps.
4+
ms.reviewer: sitaramp, koagarwa
5+
ms.author: arijitba
6+
author: arijitba
7+
ms.date: 08/04/2025
8+
ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done, sap:App Management\Wrap an app
9+
---
10+
# Azure key vault errors in wrap for Power Apps
11+
12+
This article provides step-by-step solutions for Azure Key Vault errors you might encounter when using the [wrap wizard](/power-apps/maker/common/wrap/wrap-how-to) to build your mobile app.
13+
14+
| Error code | Error message |
15+
|------------|-------------|
16+
| [1000118](#error-code-1000118) | Default subscription not found or missing access permissions. |
17+
| [1000119](#error-code-1000119) | Key vault doesn't exist or is missing access privileges.|
18+
| [1000120](#error-code-1000120) | No organization ID tags found on key vault. Ensure that the tag {Bundle ID}.{organization-id} is present and uses the correct case sensitivity.|
19+
| [1000121](#error-code-1000121) | Android keystore isn't valid. Ensure that the tag {Bundle ID}.{keystore} is present and uses the correct case sensitivity.|
20+
| [1000122](#error-code-1000122) | iOS certificate isn't valid. Missing Tag and/or Secret. Ensure that the tag {Bundle ID}.{cert} is present and uses the correct case sensitivity.|
21+
| [1000123](#error-code-1000123) | iOS profile isn't valid. Ensure that the tag {Bundle ID}.{profile} is present and uses the correct case sensitivity.|
22+
| [1000128](#error-code-1000128) | Missing access key required to access the Azure Blob Storage location. Ensure that the tag {Bundle ID}.{accessKey} is present and uses the correct case sensitivity.|
23+
| [1000130](#error-code-1000130) | Missing default value: The required environment variable for setting up Azure Key Vault in the wrap wizard isn't set.|
24+
| [1000131](#error-code-1000131) | No tags or missing access permission for the specified Azure Key Vault. |
25+
| [1000132](#error-code-1000132) | Missing environment variable 'PA_Wrap_KV_ResourceID' for the targeted environment. |
26+
27+
## Error code 1000118
28+
29+
Error message: Default subscription not found, or missing access permissions.
30+
31+
#### Resolution steps
32+
33+
1. Ensure your Azure key vault is in the tenant's **Default subscription**.
34+
35+
2. As a Microsoft Entra ID (formerly Azure AD) admin, add the service principal for the AppID "4e1f8dc5-5a42-45ce-a096-700fa485ba20" by running the following commands in PowerShell:
36+
37+
```powershell
38+
Connect-AzureAD -TenantId <your tenant ID>
39+
New-AzureADServicePrincipal -AppId 4e1f8dc5-5a42-45ce-a096-700fa485ba20 -DisplayName "Wrap KeyVault Access App"
40+
```
41+
42+
3. In the [Azure portal](https://portal.azure.com), under **Access Control (IAM)**, assign the **Reader** role to your service principal:
43+
44+
1. Go to **Access control (IAM)**, and then select **Add role assignment**.
45+
46+
:::image type="content" source="media/azure-key-vault-errors/add-role-assignment.png" alt-text="Screenshot that shows the Add role assignment option in the Access control (IAM) tab." lightbox="media/azure-key-vault-errors/add-role-assignment.png":::
47+
48+
1. Choose **Reader** under **Job function roles** and go to the **Members** tab.
49+
50+
:::image type="content" source="media/azure-key-vault-errors/add-members.png" alt-text="Screenshot that shows the Members tab on the top menu." lightbox="media/azure-key-vault-errors/add-members.png":::
51+
52+
1. Search for your app name.
53+
54+
:::image type="content" source="media/azure-key-vault-errors/select-members-to-add-role.png" alt-text="Screenshot that shows how to search for your app." lightbox="media/azure-key-vault-errors/select-members-to-add-role.png":::
55+
56+
1. Assign the **Reader** role.
57+
58+
:::image type="content" source="media/azure-key-vault-errors/assign-reader-role-to-wrap-keyvault-access-app.png" alt-text="Screenshot that shows how to assign a Reader role to your app." lightbox="media/azure-key-vault-errors/assign-reader-role-to-wrap-keyvault-access-app.png":::
59+
60+
## Error code 1000119
61+
62+
Error message: Key vault doesn't exist or is missing access privileges.
63+
64+
### Resolution steps
65+
66+
1. Confirm your Azure key vault is in the tenant's **Default subscription**.
67+
68+
2. While creating the key vault, select **Vault access policy**.
69+
70+
:::image type="content" source="media/azure-key-vault-errors/vault-acces-policy.png" alt-text="Select the Vault Access policy option under the Access configuration tab.":::
71+
72+
3. As a Microsoft Entra ID (formerly Azure AD) admin, add the service principal for the AppID "4e1f8dc5-5a42-45ce-a096-700fa485ba20" by running the following commands in PowerShell:
73+
74+
```powershell
75+
Connect-AzureAD -TenantId <your tenant ID>
76+
New-AzureADServicePrincipal -AppId 4e1f8dc5-5a42-45ce-a096-700fa485ba20 -DisplayName "Wrap KeyVault Access App"
77+
```
78+
79+
4. In the [Azure portal](https://portal.azure.com), assign the **Reader** role as shown in the previous error code section.
80+
81+
5. Add access policies to the key vault:
82+
83+
:::image type="content" source="media/azure-key-vault-errors/create-vault-access-policy.png" alt-text="Screenshot that shows how to add access policies for your Azure key vault.":::
84+
85+
:::image type="content" source="media/azure-key-vault-errors/review-and-create-vault-policy.png" alt-text="Screenshot that shows how to review and create the vault access policy.":::
86+
87+
## Error code 1000120
88+
89+
Error message: No organization ID tags found on key vault. Ensure that the tag {Bundle ID}.{organization-id} is present and uses the correct case sensitivity.
90+
91+
### Resolution steps
92+
93+
1. In the [Power Platform admin center](https://admin.powerplatform.microsoft.com/environments), select your environment.
94+
95+
:::image type="content" source="media/azure-key-vault-errors/environment-tab.png" alt-text="Screenshot that shows the Environment tab in Power Platform admin center." lightbox="media/azure-key-vault-errors/environment-tab.png":::
96+
97+
2. Copy the **Organization ID**.
98+
99+
:::image type="content" source="media/azure-key-vault-errors/organization-id.png" alt-text="Screenshot that shows the organization ID you can find in your environment in Power Platform admin center.":::
100+
101+
3. In your key vault, go to **Tags** and create a tag named **organization-id** with your organization ID as the value.
102+
103+
:::image type="content" source="media/azure-key-vault-errors/add-tag.png" alt-text="Screenshot that shows how to add an organization ID to a tag in Azure portal." lightbox="media/azure-key-vault-errors/add-tag.png":::
104+
105+
## Error code 1000121
106+
107+
Error message: Android keystore isn't valid. Ensure that the tag {Bundle ID}.{keystore} is present and uses the correct case sensitivity.
108+
109+
### Resolution steps
110+
111+
1. Import your **Android Certificate**.
112+
113+
:::image type="content" source="media/azure-key-vault-errors/import-certificate.png" alt-text="Screenshot that shows how to import an Android certificate." lightbox="media/azure-key-vault-errors/import-certificate.png":::
114+
115+
:::image type="content" source="media/azure-key-vault-errors/certificate-name.png" alt-text="Screenshot that shows how to create an Android certificate." lightbox="media/azure-key-vault-errors/certificate-name.png":::
116+
117+
2. Add a **Tag** for your certificate:
118+
119+
- **Tag name**: Use the same Bundle ID as your wrap project (for example, `com.testApp.wrap`).
120+
- **Tag value**: Use the certificate name you assigned when uploading (for example, `AndroidCertificate`).
121+
122+
:::image type="content" source="media/azure-key-vault-errors/create-certificate-tag.png" alt-text="Screenshot that shows how to create a certificate tag." lightbox="media/azure-key-vault-errors/create-certificate-tag.png":::
123+
124+
## Error code 1000122
125+
126+
Error message: iOS certificate isn't valid. Missing Tag and/or Secret. Ensure that the tag {Bundle ID}.{cert} is present and uses the correct case sensitivity.
127+
128+
### Resolution steps
129+
130+
1. Import your **iOS Certificate**.
131+
132+
:::image type="content" source="media/azure-key-vault-errors/import-certificate.png" alt-text="Screenshot that shows how to import an iOS certificate." lightbox="media/azure-key-vault-errors/import-certificate.png":::
133+
134+
:::image type="content" source="media/azure-key-vault-errors/certificate-name-ios.png" alt-text="Screenshot that shows how to create an iOS certificate." lightbox="media/azure-key-vault-errors/certificate-name-ios.png":::
135+
136+
2. Add a **Tag** for your certificate:
137+
138+
- **Tag name**: Use the Bundle ID from your wrap project.
139+
- **Tag value**: Use the certificate name you assigned when uploading (for example, `iOSCertificate`).
140+
141+
:::image type="content" source="media/azure-key-vault-errors/certificate-tag-ios.png" alt-text="Screenshot that shows how to create a certificate tag for iOS." lightbox="media/azure-key-vault-errors/certificate-tag-ios.png":::
142+
143+
## Error code 1000123
144+
145+
Error message: iOS profile isn't valid. Ensure that the tag {Bundle ID}.{profile} is present and uses the correct case sensitivity.
146+
147+
### Resolution steps
148+
149+
1. Import your **Provisioning Profile** as a **Secret**.
150+
151+
2. Add a **Tag** for your provisioning profile:
152+
153+
- **Tag name**: Use the Bundle ID from your wrap project.
154+
- **Tag value**: Use the name you gave the secret when uploading (for example, `iOSProvisioningProfile`).
155+
156+
:::image type="content" source="media/azure-key-vault-errors/provisioning-profile-secret-tag.png" alt-text="Screenshot that shows how to create a tag for iOS Provisioning Profile Secret." lightbox="media/azure-key-vault-errors/provisioning-profile-secret-tag.png":::
157+
158+
## Error code 1000128
159+
160+
Error message: Missing access key required to access the Azure Blob Storage location. Ensure that the tag {Bundle ID}.{accessKey} is present and uses the correct case sensitivity.
161+
162+
### Resolution steps
163+
164+
Add your access key from the Azure Blob storage account to the Azure key vault.
165+
166+
For more information, see [Step 3: Choose target platform](/power-apps/maker/common/wrap/wrap-how-to#3-choose-target-platform).
167+
168+
## Error code 1000130
169+
170+
Error message: Missing default value: The required environment variable for setting up Azure Key Vault in the wrap wizard isn't set.
171+
172+
### Resolution steps
173+
174+
1. Assign the resource ID of the Azure key vault you intend to use with your wrap application to the variable.
175+
176+
2. Confirm that the specified resource ID includes all required tags associated with the Bundle ID defined in the wrap wizard.
177+
178+
For more information, see [Step 3: Choose target platform](/power-apps/maker/common/wrap/wrap-how-to#3-choose-target-platform).
179+
180+
## Error code 1000131
181+
182+
Error message: No tags or missing access permission for the specified Azure Key Vault.
183+
184+
### Resolution steps
185+
186+
1. Assign the resource ID of the Azure key vault you intend to use with your wrap application to the variable.
187+
188+
2. Confirm that the specified resource ID includes all required tags associated with the Bundle ID defined in the wrap wizard.
189+
190+
3. Ensure you have permission to access your key vault:
191+
192+
1. As a Microsoft Entra ID (formerly Azure AD) admin, add the service principal for the AppID "4e1f8dc5-5a42-45ce-a096-700fa485ba20" by running the following commands in PowerShell:
193+
194+
```powershell
195+
Connect-AzureAD -TenantId <your tenant ID>
196+
New-AzureADServicePrincipal -AppId 4e1f8dc5-5a42-45ce-a096-700fa485ba20 -DisplayName "Wrap KeyVault Access App"
197+
```
198+
199+
1. In the [Azure portal](https://portal.azure.com), under **Access Control (IAM)**, assign the **Reader** role to your service principal:
200+
201+
1. Go to **Access control (IAM)**, and then select **Add role assignment**.
202+
203+
:::image type="content" source="media/azure-key-vault-errors/add-role-assignment.png" alt-text="Screenshot that shows the Add role assignment option in the Access control (IAM) tab." lightbox="media/azure-key-vault-errors/add-role-assignment.png":::
204+
205+
1. Choose **Reader** under **Job function roles** and go to the **Members** tab.
206+
207+
:::image type="content" source="media/azure-key-vault-errors/add-members.png" alt-text="Screenshot that shows the Members tab on the top menu." lightbox="media/azure-key-vault-errors/add-members.png":::
208+
209+
1. Search for your app name.
210+
211+
:::image type="content" source="media/azure-key-vault-errors/select-members-to-add-role.png" alt-text="Screenshot that shows how to search for your app." lightbox="media/azure-key-vault-errors/select-members-to-add-role.png":::
212+
213+
1. Assign the **Reader** role.
214+
215+
:::image type="content" source="media/azure-key-vault-errors/assign-reader-role-to-wrap-keyvault-access-app.png" alt-text="Screenshot that shows how to assign a Reader role to your app." lightbox="media/azure-key-vault-errors/assign-reader-role-to-wrap-keyvault-access-app.png":::
216+
217+
For more information, see [Step 2: Target platform](/power-apps/maker/common/wrap/wrap-how-to#step-2-target-platform).
218+
219+
## Error code 1000132
220+
221+
Error message: Missing environment variable 'PA_Wrap_KV_ResourceID' for the targeted environment.
222+
223+
### Resolution steps
224+
225+
1. Check whether the environment variable `PA_Wrap_KV_ResourceID` exists in the target environment. If it doesn't, create it.
226+
227+
2. Ensure the name follows the correct naming convention without typos or formatting errors.
228+
229+
For more information, see [Step 3: Choose target platform](/power-apps/maker/common/wrap/wrap-how-to#3-choose-target-platform).
230+
231+
## Other issues
232+
233+
If your issue isn't covered here, or if the preceding steps don't resolve your problem, [search for more support resources](https://powerapps.microsoft.com/support) or contact [Microsoft support](https://admin.powerplatform.microsoft.com/support) and provide detailed steps to reproduce the problem.
234+
235+
## Related information
236+
237+
- ["Something went wrong" error that occurs when using the wrap feature](something-went-wrong-error-codes.md)
238+
- [Troubleshoot common issues when using the wrap feature](wrap-issues.md)

support/power-platform/power-apps/manage-apps/media/wrap-issues/add-members.png renamed to support/power-platform/power-apps/manage-apps/media/azure-key-vault-errors/add-members.png

File renamed without changes.

support/power-platform/power-apps/manage-apps/media/wrap-issues/add-new-organization.png renamed to support/power-platform/power-apps/manage-apps/media/azure-key-vault-errors/add-new-organization.png

File renamed without changes.

support/power-platform/power-apps/manage-apps/media/wrap-issues/add-role-assignment.png renamed to support/power-platform/power-apps/manage-apps/media/azure-key-vault-errors/add-role-assignment.png

File renamed without changes.

support/power-platform/power-apps/manage-apps/media/wrap-issues/add-tag.png renamed to support/power-platform/power-apps/manage-apps/media/azure-key-vault-errors/add-tag.png

File renamed without changes.

support/power-platform/power-apps/manage-apps/media/wrap-issues/assign-reader-role-to-wrap-keyvault-access-app.png renamed to support/power-platform/power-apps/manage-apps/media/azure-key-vault-errors/assign-reader-role-to-wrap-keyvault-access-app.png

File renamed without changes.

support/power-platform/power-apps/manage-apps/media/wrap-issues/certificate-name-ios.png renamed to support/power-platform/power-apps/manage-apps/media/azure-key-vault-errors/certificate-name-ios.png

File renamed without changes.

support/power-platform/power-apps/manage-apps/media/wrap-issues/certificate-name.png renamed to support/power-platform/power-apps/manage-apps/media/azure-key-vault-errors/certificate-name.png

File renamed without changes.

support/power-platform/power-apps/manage-apps/media/wrap-issues/certificate-tag-ios.png renamed to support/power-platform/power-apps/manage-apps/media/azure-key-vault-errors/certificate-tag-ios.png

File renamed without changes.

support/power-platform/power-apps/manage-apps/media/wrap-issues/create-certificate-tag.png renamed to support/power-platform/power-apps/manage-apps/media/azure-key-vault-errors/create-certificate-tag.png

File renamed without changes.

0 commit comments

Comments
 (0)