Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Click the Manage Manifest button in the footer and select "Download Manifest" to save the app manifest locally
  2. Open the downloaded manifest file and locate the empty keyCredentials attribute
  3. Update the keyCredentials attribute with the following settings:

    Code Block
    languagetext
    themeRDark
    "keyCredentials": [
    	{
    		"customKeyIdentifier": "<$base64CertHash FROM ABOVE>",
    		"keyId": "<$KeyId FROM ABOVE>",
    		"type": "AsymmetricX509Cert",
    		"usage": "Verify",
    		"value": "<$base64Cert FROM ABOVE>"
    	}
    ],
  4. Save the updated manifest and upload it back into Windows Azure using the same Manage Manifest button in the footer (select "Upload Manifest" this time)

    Info
    Note: If you try to download the manifest again, you'll notice that the expiration dates are now there and the cert value is now null. This is normal and it shouldn't prevent the app to work as expected.
  5. Everything should now be setup in Azure AD for the app to run in the background and get app-only access tokens from Azure AD.

Part 5: Generate Private Key

Info
You may need to download OpenSSL for Windows to follow these steps.
  1. Extract pem key

    Code Block
    languagetext
    themeRDark
    openssl pkcs12 -nocerts -in <PFX Path> -out <PEM Path>
  2. Convert extracted pem key to der format

    Code Block
    languagetext
    themeRDark
    openssl pkcs8 -topk8 -inform PEM -outform DER -in <PEM Path> -out <DER Path> -nocrypt