|
| 1 | +--- |
| 2 | +title: Azure Key Vault Errors in Wrap For Power Apps |
| 3 | +description: Provides solutions for the Azure key vault errors that occur when using the wrap feature in Power Apps. |
| 4 | +ms.reviewer: sitaramp, koagarwa |
| 5 | +ms.author: arijitba |
| 6 | +author: arijitba |
| 7 | +ms.date: 08/04/2025 |
| 8 | +ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done, sap:App Management\Wrap an app |
| 9 | +--- |
| 10 | +# Azure key vault errors in wrap for Power Apps |
| 11 | + |
| 12 | +This article provides step-by-step solutions for Azure Key Vault errors you might encounter when using the [wrap wizard](/power-apps/maker/common/wrap/wrap-how-to) to build your mobile app. |
| 13 | + |
| 14 | +| Error code | Error message | |
| 15 | +|------------|-------------| |
| 16 | +| [1000118](#error-code-1000118) | Default subscription not found or missing access permissions. | |
| 17 | +| [1000119](#error-code-1000119) | Key vault doesn't exist or is missing access privileges.| |
| 18 | +| [1000120](#error-code-1000120) | No organization ID tags found on key vault. Ensure that the tag {Bundle ID}.{organization-id} is present and uses the correct case sensitivity.| |
| 19 | +| [1000121](#error-code-1000121) | Android keystore isn't valid. Ensure that the tag {Bundle ID}.{keystore} is present and uses the correct case sensitivity.| |
| 20 | +| [1000122](#error-code-1000122) | iOS certificate isn't valid. Missing Tag and/or Secret. Ensure that the tag {Bundle ID}.{cert} is present and uses the correct case sensitivity.| |
| 21 | +| [1000123](#error-code-1000123) | iOS profile isn't valid. Ensure that the tag {Bundle ID}.{profile} is present and uses the correct case sensitivity.| |
| 22 | +| [1000128](#error-code-1000128) | Missing access key required to access the Azure Blob Storage location. Ensure that the tag {Bundle ID}.{accessKey} is present and uses the correct case sensitivity.| |
| 23 | +| [1000130](#error-code-1000130) | Missing default value: The required environment variable for setting up Azure Key Vault in the wrap wizard isn't set.| |
| 24 | +| [1000131](#error-code-1000131) | No tags or missing access permission for the specified Azure Key Vault. | |
| 25 | +| [1000132](#error-code-1000132) | Missing environment variable 'PA_Wrap_KV_ResourceID' for the targeted environment. | |
| 26 | + |
| 27 | +## Error code 1000118 |
| 28 | + |
| 29 | +Error message: Default subscription not found, or missing access permissions. |
| 30 | + |
| 31 | +#### Resolution steps |
| 32 | + |
| 33 | +1. Ensure your Azure key vault is in the tenant's **Default subscription**. |
| 34 | + |
| 35 | +2. As a Microsoft Entra ID (formerly Azure AD) admin, add the service principal for the AppID "4e1f8dc5-5a42-45ce-a096-700fa485ba20" by running the following commands in PowerShell: |
| 36 | + |
| 37 | + ```powershell |
| 38 | + Connect-AzureAD -TenantId <your tenant ID> |
| 39 | + New-AzureADServicePrincipal -AppId 4e1f8dc5-5a42-45ce-a096-700fa485ba20 -DisplayName "Wrap KeyVault Access App" |
| 40 | + ``` |
| 41 | + |
| 42 | +3. In the [Azure portal](https://portal.azure.com), under **Access Control (IAM)**, assign the **Reader** role to your service principal: |
| 43 | + |
| 44 | + 1. Go to **Access control (IAM)**, and then select **Add role assignment**. |
| 45 | + |
| 46 | + :::image type="content" source="media/azure-key-vault-errors/add-role-assignment.png" alt-text="Screenshot that shows the Add role assignment option in the Access control (IAM) tab." lightbox="media/azure-key-vault-errors/add-role-assignment.png"::: |
| 47 | + |
| 48 | + 1. Choose **Reader** under **Job function roles** and go to the **Members** tab. |
| 49 | + |
| 50 | + :::image type="content" source="media/azure-key-vault-errors/add-members.png" alt-text="Screenshot that shows the Members tab on the top menu." lightbox="media/azure-key-vault-errors/add-members.png"::: |
| 51 | + |
| 52 | + 1. Search for your app name. |
| 53 | + |
| 54 | + :::image type="content" source="media/azure-key-vault-errors/select-members-to-add-role.png" alt-text="Screenshot that shows how to search for your app." lightbox="media/azure-key-vault-errors/select-members-to-add-role.png"::: |
| 55 | + |
| 56 | + 1. Assign the **Reader** role. |
| 57 | + |
| 58 | + :::image type="content" source="media/azure-key-vault-errors/assign-reader-role-to-wrap-keyvault-access-app.png" alt-text="Screenshot that shows how to assign a Reader role to your app." lightbox="media/azure-key-vault-errors/assign-reader-role-to-wrap-keyvault-access-app.png"::: |
| 59 | + |
| 60 | +## Error code 1000119 |
| 61 | + |
| 62 | +Error message: Key vault doesn't exist or is missing access privileges. |
| 63 | + |
| 64 | +### Resolution steps |
| 65 | + |
| 66 | +1. Confirm your Azure key vault is in the tenant's **Default subscription**. |
| 67 | + |
| 68 | +2. While creating the key vault, select **Vault access policy**. |
| 69 | + |
| 70 | + :::image type="content" source="media/azure-key-vault-errors/vault-acces-policy.png" alt-text="Select the Vault Access policy option under the Access configuration tab."::: |
| 71 | + |
| 72 | +3. As a Microsoft Entra ID (formerly Azure AD) admin, add the service principal for the AppID "4e1f8dc5-5a42-45ce-a096-700fa485ba20" by running the following commands in PowerShell: |
| 73 | + |
| 74 | + ```powershell |
| 75 | + Connect-AzureAD -TenantId <your tenant ID> |
| 76 | + New-AzureADServicePrincipal -AppId 4e1f8dc5-5a42-45ce-a096-700fa485ba20 -DisplayName "Wrap KeyVault Access App" |
| 77 | + ``` |
| 78 | + |
| 79 | +4. In the [Azure portal](https://portal.azure.com), assign the **Reader** role as shown in the previous error code section. |
| 80 | + |
| 81 | +5. Add access policies to the key vault: |
| 82 | + |
| 83 | + :::image type="content" source="media/azure-key-vault-errors/create-vault-access-policy.png" alt-text="Screenshot that shows how to add access policies for your Azure key vault."::: |
| 84 | + |
| 85 | + :::image type="content" source="media/azure-key-vault-errors/review-and-create-vault-policy.png" alt-text="Screenshot that shows how to review and create the vault access policy."::: |
| 86 | + |
| 87 | +## Error code 1000120 |
| 88 | + |
| 89 | +Error message: No organization ID tags found on key vault. Ensure that the tag {Bundle ID}.{organization-id} is present and uses the correct case sensitivity. |
| 90 | + |
| 91 | +### Resolution steps |
| 92 | + |
| 93 | +1. In the [Power Platform admin center](https://admin.powerplatform.microsoft.com/environments), select your environment. |
| 94 | + |
| 95 | + :::image type="content" source="media/azure-key-vault-errors/environment-tab.png" alt-text="Screenshot that shows the Environment tab in Power Platform admin center." lightbox="media/azure-key-vault-errors/environment-tab.png"::: |
| 96 | + |
| 97 | +2. Copy the **Organization ID**. |
| 98 | + |
| 99 | + :::image type="content" source="media/azure-key-vault-errors/organization-id.png" alt-text="Screenshot that shows the organization ID you can find in your environment in Power Platform admin center."::: |
| 100 | + |
| 101 | +3. In your key vault, go to **Tags** and create a tag named **organization-id** with your organization ID as the value. |
| 102 | + |
| 103 | + :::image type="content" source="media/azure-key-vault-errors/add-tag.png" alt-text="Screenshot that shows how to add an organization ID to a tag in Azure portal." lightbox="media/azure-key-vault-errors/add-tag.png"::: |
| 104 | + |
| 105 | +## Error code 1000121 |
| 106 | + |
| 107 | +Error message: Android keystore isn't valid. Ensure that the tag {Bundle ID}.{keystore} is present and uses the correct case sensitivity. |
| 108 | + |
| 109 | +### Resolution steps |
| 110 | + |
| 111 | +1. Import your **Android Certificate**. |
| 112 | + |
| 113 | + :::image type="content" source="media/azure-key-vault-errors/import-certificate.png" alt-text="Screenshot that shows how to import an Android certificate." lightbox="media/azure-key-vault-errors/import-certificate.png"::: |
| 114 | + |
| 115 | + :::image type="content" source="media/azure-key-vault-errors/certificate-name.png" alt-text="Screenshot that shows how to create an Android certificate." lightbox="media/azure-key-vault-errors/certificate-name.png"::: |
| 116 | + |
| 117 | +2. Add a **Tag** for your certificate: |
| 118 | + |
| 119 | + - **Tag name**: Use the same Bundle ID as your wrap project (for example, `com.testApp.wrap`). |
| 120 | + - **Tag value**: Use the certificate name you assigned when uploading (for example, `AndroidCertificate`). |
| 121 | + |
| 122 | + :::image type="content" source="media/azure-key-vault-errors/create-certificate-tag.png" alt-text="Screenshot that shows how to create a certificate tag." lightbox="media/azure-key-vault-errors/create-certificate-tag.png"::: |
| 123 | + |
| 124 | +## Error code 1000122 |
| 125 | + |
| 126 | +Error message: iOS certificate isn't valid. Missing Tag and/or Secret. Ensure that the tag {Bundle ID}.{cert} is present and uses the correct case sensitivity. |
| 127 | + |
| 128 | +### Resolution steps |
| 129 | + |
| 130 | +1. Import your **iOS Certificate**. |
| 131 | + |
| 132 | + :::image type="content" source="media/azure-key-vault-errors/import-certificate.png" alt-text="Screenshot that shows how to import an iOS certificate." lightbox="media/azure-key-vault-errors/import-certificate.png"::: |
| 133 | + |
| 134 | + :::image type="content" source="media/azure-key-vault-errors/certificate-name-ios.png" alt-text="Screenshot that shows how to create an iOS certificate." lightbox="media/azure-key-vault-errors/certificate-name-ios.png"::: |
| 135 | + |
| 136 | +2. Add a **Tag** for your certificate: |
| 137 | + |
| 138 | + - **Tag name**: Use the Bundle ID from your wrap project. |
| 139 | + - **Tag value**: Use the certificate name you assigned when uploading (for example, `iOSCertificate`). |
| 140 | + |
| 141 | + :::image type="content" source="media/azure-key-vault-errors/certificate-tag-ios.png" alt-text="Screenshot that shows how to create a certificate tag for iOS." lightbox="media/azure-key-vault-errors/certificate-tag-ios.png"::: |
| 142 | + |
| 143 | +## Error code 1000123 |
| 144 | + |
| 145 | +Error message: iOS profile isn't valid. Ensure that the tag {Bundle ID}.{profile} is present and uses the correct case sensitivity. |
| 146 | + |
| 147 | +### Resolution steps |
| 148 | + |
| 149 | +1. Import your **Provisioning Profile** as a **Secret**. |
| 150 | + |
| 151 | +2. Add a **Tag** for your provisioning profile: |
| 152 | + |
| 153 | + - **Tag name**: Use the Bundle ID from your wrap project. |
| 154 | + - **Tag value**: Use the name you gave the secret when uploading (for example, `iOSProvisioningProfile`). |
| 155 | + |
| 156 | + :::image type="content" source="media/azure-key-vault-errors/provisioning-profile-secret-tag.png" alt-text="Screenshot that shows how to create a tag for iOS Provisioning Profile Secret." lightbox="media/azure-key-vault-errors/provisioning-profile-secret-tag.png"::: |
| 157 | + |
| 158 | +## Error code 1000128 |
| 159 | + |
| 160 | +Error message: Missing access key required to access the Azure Blob Storage location. Ensure that the tag {Bundle ID}.{accessKey} is present and uses the correct case sensitivity. |
| 161 | + |
| 162 | +### Resolution steps |
| 163 | + |
| 164 | +Add your access key from the Azure Blob storage account to the Azure key vault. |
| 165 | + |
| 166 | +For more information, see [Step 3: Choose target platform](/power-apps/maker/common/wrap/wrap-how-to#3-choose-target-platform). |
| 167 | + |
| 168 | +## Error code 1000130 |
| 169 | + |
| 170 | +Error message: Missing default value: The required environment variable for setting up Azure Key Vault in the wrap wizard isn't set. |
| 171 | + |
| 172 | +### Resolution steps |
| 173 | + |
| 174 | +1. Assign the resource ID of the Azure key vault you intend to use with your wrap application to the variable. |
| 175 | + |
| 176 | +2. Confirm that the specified resource ID includes all required tags associated with the Bundle ID defined in the wrap wizard. |
| 177 | + |
| 178 | +For more information, see [Step 3: Choose target platform](/power-apps/maker/common/wrap/wrap-how-to#3-choose-target-platform). |
| 179 | + |
| 180 | +## Error code 1000131 |
| 181 | + |
| 182 | +Error message: No tags or missing access permission for the specified Azure Key Vault. |
| 183 | + |
| 184 | +### Resolution steps |
| 185 | + |
| 186 | +1. Assign the resource ID of the Azure key vault you intend to use with your wrap application to the variable. |
| 187 | + |
| 188 | +2. Confirm that the specified resource ID includes all required tags associated with the Bundle ID defined in the wrap wizard. |
| 189 | + |
| 190 | +3. Ensure you have permission to access your key vault: |
| 191 | + |
| 192 | + 1. As a Microsoft Entra ID (formerly Azure AD) admin, add the service principal for the AppID "4e1f8dc5-5a42-45ce-a096-700fa485ba20" by running the following commands in PowerShell: |
| 193 | + |
| 194 | + ```powershell |
| 195 | + Connect-AzureAD -TenantId <your tenant ID> |
| 196 | + New-AzureADServicePrincipal -AppId 4e1f8dc5-5a42-45ce-a096-700fa485ba20 -DisplayName "Wrap KeyVault Access App" |
| 197 | + ``` |
| 198 | +
|
| 199 | + 1. In the [Azure portal](https://portal.azure.com), under **Access Control (IAM)**, assign the **Reader** role to your service principal: |
| 200 | +
|
| 201 | + 1. Go to **Access control (IAM)**, and then select **Add role assignment**. |
| 202 | +
|
| 203 | + :::image type="content" source="media/azure-key-vault-errors/add-role-assignment.png" alt-text="Screenshot that shows the Add role assignment option in the Access control (IAM) tab." lightbox="media/azure-key-vault-errors/add-role-assignment.png"::: |
| 204 | +
|
| 205 | + 1. Choose **Reader** under **Job function roles** and go to the **Members** tab. |
| 206 | +
|
| 207 | + :::image type="content" source="media/azure-key-vault-errors/add-members.png" alt-text="Screenshot that shows the Members tab on the top menu." lightbox="media/azure-key-vault-errors/add-members.png"::: |
| 208 | +
|
| 209 | + 1. Search for your app name. |
| 210 | +
|
| 211 | + :::image type="content" source="media/azure-key-vault-errors/select-members-to-add-role.png" alt-text="Screenshot that shows how to search for your app." lightbox="media/azure-key-vault-errors/select-members-to-add-role.png"::: |
| 212 | +
|
| 213 | + 1. Assign the **Reader** role. |
| 214 | +
|
| 215 | + :::image type="content" source="media/azure-key-vault-errors/assign-reader-role-to-wrap-keyvault-access-app.png" alt-text="Screenshot that shows how to assign a Reader role to your app." lightbox="media/azure-key-vault-errors/assign-reader-role-to-wrap-keyvault-access-app.png"::: |
| 216 | +
|
| 217 | +For more information, see [Step 2: Target platform](/power-apps/maker/common/wrap/wrap-how-to#step-2-target-platform). |
| 218 | +
|
| 219 | +## Error code 1000132 |
| 220 | +
|
| 221 | +Error message: Missing environment variable 'PA_Wrap_KV_ResourceID' for the targeted environment. |
| 222 | +
|
| 223 | +### Resolution steps |
| 224 | +
|
| 225 | +1. Check whether the environment variable `PA_Wrap_KV_ResourceID` exists in the target environment. If it doesn't, create it. |
| 226 | +
|
| 227 | +2. Ensure the name follows the correct naming convention without typos or formatting errors. |
| 228 | +
|
| 229 | +For more information, see [Step 3: Choose target platform](/power-apps/maker/common/wrap/wrap-how-to#3-choose-target-platform). |
| 230 | +
|
| 231 | +## Other issues |
| 232 | +
|
| 233 | +If your issue isn't covered here, or if the preceding steps don't resolve your problem, [search for more support resources](https://powerapps.microsoft.com/support) or contact [Microsoft support](https://admin.powerplatform.microsoft.com/support) and provide detailed steps to reproduce the problem. |
| 234 | +
|
| 235 | +## Related information |
| 236 | +
|
| 237 | +- ["Something went wrong" error that occurs when using the wrap feature](something-went-wrong-error-codes.md) |
| 238 | +- [Troubleshoot common issues when using the wrap feature](wrap-issues.md) |
0 commit comments