Skip to content

Commit d018f75

Browse files
Merge pull request #756 from dotnet/dtivel/update-readme
2 parents 429d24d + 151fc01 commit d018f75

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

README.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,8 @@ You should also use the `filter` parameter with the file list to sign, something
4646
- Key permissions
4747
- Cryptographic Operations
4848
- Sign
49+
- Key Management Operations
50+
- Get _(Note: this is only for the public key not the private key.)_
4951
- Certificate permissions
5052
- Certificate Management Operations
5153
- Get
@@ -70,7 +72,7 @@ The following information is needed for the signing build:
7072
* `Tenant Id` Azure AD tenant
7173
* `Client Id` / `Application Id` ServicePrincipal identifier
7274
* `Key Vault Url` Url to Key Vault. Must be a Premium Sku for EV code signing certificates and all certificates issued after June 2023
73-
* `Certificate Id` Id of the certificate in Key Vault.
75+
* `Certificate Id` Id of the certificate in Key Vault.
7476
* `Client Secret` for Azure DevOps Pipelines
7577
* `Subscription Id` for GitHub Actions
7678

@@ -81,4 +83,4 @@ Code signing certificates must use the `RSA-HSM` key type to ensure the private
8183

8284
## Migrating from the legacy code signing service
8385

84-
If you've been using the legacy code signing service, using `SignClient.exe` to upload files for signing, you can use your existing certificate and Key Vault with this new tool. You will need to create a new ServicePrincipal and assign it permissions as described above.
86+
If you've been using the legacy code signing service, using `SignClient.exe` to upload files for signing, you can use your existing certificate and Key Vault with this new tool. You will need to create a new ServicePrincipal and assign it permissions as described above.

0 commit comments

Comments
 (0)