Skip to content

Attempt to use the script Export-AppServiceCertificate #842

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
WiseMack opened this issue Dec 31, 2018 · 2 comments
Closed

Attempt to use the script Export-AppServiceCertificate #842

WiseMack opened this issue Dec 31, 2018 · 2 comments

Comments

@WiseMack
Copy link

Export-AppServiceCertificate

cmdlet Export-AppServiceCertificate at command pipeline position 1
Supply values for the following parameters:
(Type !? for Help.)
loginId: [email protected]
subscriptionId: (The big ass line of numbers that shows up in the VMInstance Overview)
resourceGroupName: airheadsbc
name: airheadsbcCert

Account SubscriptionName TenantId Environment


[email protected] Pay-As-You-Go lotsanumbers AzureCloud

Name : Pay-As-You-Go (BigAssCode) - [email protected]
Account : [email protected]
Environment : AzureCloud
Subscription : SubsC
Tenant : Tenant
TokenCache : Microsoft.Azure.Commands.Common.Authentication.Core.ProtectedFileTokenCache
VersionProfile :
ExtendedProperties : {}

Set-AzureRmKeyVaultAccessPolicy : Cannot find the Active Directory object '' in tenant 'Tenant'. Please make sure that the user or application service principal you are authorizing is registered in the current subscription's Azure Active directory. The TenantID displayed by the cmdlet 'Get-AzContext' is the current subscription's Azure Active directory.
At line:38 char:1

  • Set-AzureRmKeyVaultAccessPolicy -ResourceGroupName $keyVaultResourceG ...
  • CategoryInfo : CloseError: (:) [Set-AzKeyVaultAccessPolicy], ArgumentException
  • FullyQualifiedErrorId : Microsoft.Azure.Commands.KeyVault.SetAzureKeyVaultAccessPolicy

Get Secret Access to account [email protected] has been granted from the KeyVault, please check and remove the policy after exporting the certificate
Created an App Service Certificate copy at: /home/jorge\appservicecertificate.pfx
WARNING: For security reasons, do not store the PFX password. Use it directly from the console as required.
PFX password:

Environment data

PS version: 6.1.1
PSReadline version: 2.0.0-beta3
os: Linux cc-11d3989c-85fb59dbf-jkhpq 4.15.0-1036-azure #38~16.04.1-Ubuntu SMP Fri Dec 7 03:21:52 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux
PS file version:
Steps to reproduce or exception report

Attempt to use the script Export-AppServiceCertificate found in
https://blogs.msdn.microsoft.com/appserviceteam/2017/02/24/creating-a-local-pfx-copy-of-app-service-certificate/

@WiseMack
Copy link
Author

For the record Issue #821 includes the problems I had using the script

@daxian-dbw
Copy link
Member

I believe this issue has been fixed in the latest PSReadLine module. Please upgrade and give it a try.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants