Skip to content

Commit e9a9959

Browse files
Merge pull request #311663 from Jaxelr/patch-3
Update commands for Az.ArtifactSigning module
2 parents 124a286 + 1554d3d commit e9a9959

1 file changed

Lines changed: 12 additions & 12 deletions

File tree

articles/artifact-signing/how-to-sign-ci-policy.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -20,56 +20,56 @@ To complete the steps in this article, you need:
2020
- An Artifact Signing account, identity validation, and certificate profile.
2121
- Individual or group assignment of the Artifact Signing Certificate Profile Signer role.
2222
- [Azure PowerShell in Windows](/powershell/azure/install-azps-windows) installed.
23-
- [Az.TrustedSigning](/powershell/module/az.trustedsigning/) module downloaded.
23+
- [Az.ArtifactSigning](/powershell/module/az.artifactsigning/) module downloaded.
2424

2525
## Sign a CI policy
2626

2727
1. ⁠Open [PowerShell 7](https://github.com/PowerShell/PowerShell/releases/latest).
2828

29-
1. Optionally, you can create a *metadata.json* file that looks like this example:(`"Endpoint"` URI value must be a URI that aligns with the region where you created your Artifact Signing account and certificate profile when you set up these resources.)
29+
1. Optionally, you can create a *metadata.json* file that looks like this example: (`"Endpoint"` URI value must be a URI that matches the region where you created your Artifact Signing account and certificate profile when you set up these resources.)
3030

3131
```json
3232
{
3333
"Endpoint":"https://xxx.codesigning.azure.net/",
34-
"CodeSigningAccountName":"<Artifact Signing Account Name>",
34+
"CodeSigningAccountName":"<Signing Account Name>",
3535
"CertificateProfileName":"<Certificate Profile Name>"
3636
}
3737
```
3838

39-
1. Get the [root certificate](/powershell/module/az.trustedsigning/get-aztrustedsigningcertificateroot) that you want to add to the trust store:
39+
1. Get the [root certificate](/powershell/module/az.artifactsigning/get-azartifactsigningcertificateroot?view=azps-15.4.0&preserve-view=true) that you want to add to the trust store:
4040

4141
```powershell
42-
Get-AzTrustedSigningCertificateRoot -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/ -Destination c:\temp\root.cer
42+
Get-AzArtifactSigningCertificateRoot -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/ -Destination c:\temp\root.cer
4343
```
4444

4545
If you're using a *metadata.json* file, run this command instead:
4646

4747
```powershell
48-
Get-AzTrustedSigningCertificateRoot -MetadataFilePath C:\temp\metadata.json -Destination c:\temp\root.cer
48+
Get-AzArtifactSigningCertificateRoot -MetadataFilePath C:\temp\metadata.json -Destination c:\temp\root.cer
4949
```
5050

51-
1. To get the [Extended Key Usage (EKU)](/powershell/module/az.trustedsigning/get-aztrustedsigningcustomereku) to insert into your policy:
51+
1. To get the [Extended Key Usage (EKU)](/powershell/module/az.artifactsigning/get-azartifactsigningcustomereku?view=azps-15.4.0&preserve-view=true) to insert into your policy:
5252

5353
```powershell
54-
Get-AzTrustedSigningCustomerEku -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/
54+
Get-AzArtifactSigningCustomerEku -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/
5555
```
5656

5757
If you're using a *metadata.json* file, run this command instead:
5858

5959
```powershell
60-
Get-AzTrustedSigningCustomerEku -MetadataFilePath C:\temp\metadata.json
60+
Get-AzArtifactSigningCustomerEku -MetadataFilePath C:\temp\metadata.json
6161
```
6262

63-
1. To [sign your policy](/powershell/module/az.trustedsigning/invoke-aztrustedsigningcipolicysigning), run the `invoke` command:
63+
1. To [sign your policy](/powershell/module/az.artifactsigning/invoke-azartifactsigningcipolicysigning?view=azps-15.4.0&preserve-view=true), run the `invoke` command:
6464

6565
```powershell
66-
Invoke-AzTrustedSigningCIPolicySigning -accountName TestAccount -profileName TestCertProfile -endpointurl "https://xxx.codesigning.azure.net/" -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
66+
Invoke-AzArtifactSigningCIPolicySigning -accountName TestAccount -profileName TestCertProfile -endpointurl "https://xxx.codesigning.azure.net/" -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
6767
```
6868

6969
If you're using a *metadata.json* file, run this command instead:
7070

7171
```powershell
72-
Invoke-AzTrustedSigningCIPolicySigning -MetadataFilePath C:\temp\metadata.json -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
72+
Invoke-AzArtifactSigningCIPolicySigning -MetadataFilePath C:\temp\metadata.json -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
7373
```
7474

7575
## Create and deploy a CI policy

0 commit comments

Comments
 (0)