@@ -20,56 +20,56 @@ To complete the steps in this article, you need:
2020- An Artifact Signing account, identity validation, and certificate profile.
2121- Individual or group assignment of the Artifact Signing Certificate Profile Signer role.
2222- [ Azure PowerShell in Windows] ( /powershell/azure/install-azps-windows ) installed.
23- - [ Az.TrustedSigning ] ( /powershell/module/az.trustedsigning / ) module downloaded.
23+ - [ Az.ArtifactSigning ] ( /powershell/module/az.artifactsigning / ) module downloaded.
2424
2525## Sign a CI policy
2626
27271 . Open [ PowerShell 7] ( https://github.com/PowerShell/PowerShell/releases/latest ) .
2828
29- 1 . Optionally, you can create a * metadata.json* file that looks like this example:(` "Endpoint" ` URI value must be a URI that aligns with the region where you created your Artifact Signing account and certificate profile when you set up these resources.)
29+ 1 . Optionally, you can create a * metadata.json* file that looks like this example: (` "Endpoint" ` URI value must be a URI that matches the region where you created your Artifact Signing account and certificate profile when you set up these resources.)
3030
3131 ``` json
3232 {
3333 "Endpoint" :" https://xxx.codesigning.azure.net/" ,
34- "CodeSigningAccountName" :" <Artifact Signing Account Name>" ,
34+ "CodeSigningAccountName" :" <Signing Account Name>" ,
3535 "CertificateProfileName" :" <Certificate Profile Name>"
3636 }
3737 ```
3838
39- 1 . Get the [ root certificate] ( /powershell/module/az.trustedsigning /get-aztrustedsigningcertificateroot ) that you want to add to the trust store:
39+ 1 . Get the [ root certificate] ( /powershell/module/az.artifactsigning /get-azartifactsigningcertificateroot ) that you want to add to the trust store:
4040
4141 ``` powershell
42- Get-AzTrustedSigningCertificateRoot -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/ -Destination c:\temp\root.cer
42+ Get-AzArtifactSigningCertificateRoot -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/ -Destination c:\temp\root.cer
4343 ```
4444
4545 If you're using a * metadata.json* file, run this command instead:
4646
4747 ``` powershell
48- Get-AzTrustedSigningCertificateRoot -MetadataFilePath C:\temp\metadata.json -Destination c:\temp\root.cer
48+ Get-AzArtifactSigningCertificateRoot -MetadataFilePath C:\temp\metadata.json -Destination c:\temp\root.cer
4949 ```
5050
51- 1 . To get the [ Extended Key Usage (EKU)] ( /powershell/module/az.trustedsigning /get-aztrustedsigningcustomereku ) to insert into your policy:
51+ 1 . To get the [ Extended Key Usage (EKU)] ( /powershell/module/az.artifactsigning /get-azartifactsigningcustomereku ) to insert into your policy:
5252
5353 ``` powershell
54- Get-AzTrustedSigningCustomerEku -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/
54+ Get-AzArtifactSigningCustomerEku -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/
5555 ```
5656
5757 If you're using a * metadata.json* file, run this command instead:
5858
5959 ``` powershell
60- Get-AzTrustedSigningCustomerEku -MetadataFilePath C:\temp\metadata.json
60+ Get-AzArtifactSigningCustomerEku -MetadataFilePath C:\temp\metadata.json
6161 ```
6262
63- 1 . To [ sign your policy] ( /powershell/module/az.trustedsigning /invoke-aztrustedsigningcipolicysigning ) , run the ` invoke ` command:
63+ 1 . To [ sign your policy] ( /powershell/module/az.artifactsigning /invoke-azartifactsigningcipolicysigning ) , run the ` invoke ` command:
6464
6565 ``` powershell
66- Invoke-AzTrustedSigningCIPolicySigning -accountName TestAccount -profileName TestCertProfile -endpointurl "https://xxx.codesigning.azure.net/" -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
66+ Invoke-AzArtifactSigningCIPolicySigning -accountName TestAccount -profileName TestCertProfile -endpointurl "https://xxx.codesigning.azure.net/" -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
6767 ```
6868
6969 If you're using a * metadata.json* file, run this command instead:
7070
7171 ``` powershell
72- Invoke-AzTrustedSigningCIPolicySigning -MetadataFilePath C:\temp\metadata.json -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
72+ Invoke-AzArtifactSigningCIPolicySigning -MetadataFilePath C:\temp\metadata.json -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
7373 ```
7474
7575## Create and deploy a CI policy
0 commit comments