Skip to content

Commit aa6934f

Browse files
Remove endpoint mismatch error example
Removed the endpoint mismatch error example and its resolution steps from the document. The error comes from signtool not Trusted signing and signtool team prefers to keep it generic.
1 parent 59ee6aa commit aa6934f

File tree

1 file changed

+0
-38
lines changed

1 file changed

+0
-38
lines changed

articles/trusted-signing/how-to-signing-integrations.md

Lines changed: 0 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -161,44 +161,6 @@ To sign by using Trusted Signing, you need to provide the details of your Truste
161161

162162
<sup>1</sup> The optional `"CorrelationId"` field is an opaque string value that you can provide to correlate sign requests with your own workflows, such as build identifiers or machine names.
163163

164-
#### Endpoint mismatch error example
165-
166-
If the endpoint does not match the region where the Trusted Signing account and certificate profile were created, a sign request can fail with a 403 Forbidden response and an internal SignTool error. This indicates the service rejected the request due to an incorrect regional endpoint.
167-
168-
Example failure output:
169-
170-
```
171-
Submitting digest for signing...
172-
Unhandled managed exception
173-
Azure.RequestFailedException: Service request failed.
174-
Status: 403 (Forbidden)
175-
176-
Headers:
177-
Date: Sun, 09 Nov 2025 20:39:58 GMT
178-
Connection: keep-alive
179-
Strict-Transport-Security: REDACTED
180-
x-azure-ref: REDACTED
181-
X-Cache: REDACTED
182-
Content-Length: 0
183-
184-
at Azure.CodeSigning.CertificateProfileRestClient.SignAsync(String codeSigningAccountName, String certificateProfileName, SignRequest body, String xCorrelationId, String clientVersion, CancellationToken cancellationToken)
185-
at Azure.CodeSigning.CertificateProfileClient.StartSignAsync(String codeSigningAccountName, String certificateProfileName, SignRequest body, String xCorrelationId, String clientVersion, CancellationToken cancellationToken)
186-
at Azure.CodeSigning.Dlib.Core.DigestSigner.SignAsync(UInt32 algorithm, Byte[] digest, SafeFileHandle safeFileHandle, CancellationToken cancellationToken)
187-
at Azure.CodeSigning.Dlib.Core.DigestSigner.Sign(UInt32 algorithm, Byte[] digest, SafeFileHandle safeFileHandle)
188-
at AuthenticodeDigestSignExWithFileHandleManaged(_CRYPTOAPI_BLOB* pMetadataBlob, UInt32 digestAlgId, Byte* pbToBeSignedDigest, UInt32 cbToBeSignedDigest, Void* hFile, _CRYPTOAPI_BLOB* pSignedDigest, _CERT_CONTEXT** ppSignerCert, Void* hCertChainStore)
189-
190-
SignTool Error: An unexpected internal error has occurred.
191-
Error information: "Error: SignerSign() failed." (-2147467259/0x80004005)
192-
```
193-
194-
Resolution:
195-
1. Verify the region where the Trusted Signing account and certificate profile were provisioned.
196-
2. Update the `"Endpoint"` value in the JSON to the correct regional URI from the table above.
197-
3. Retry the signing operation.
198-
199-
Tip: A 403 with zero content length and `SignerSign()` failure is a strong indicator of an endpoint–region mismatch.
200-
201-
202164
### Authentication
203165

204166
This Task performs authentication using [DefaultAzureCredential](/dotnet/api/azure.identity.defaultazurecredential), which attempts a series of authentication methods in order. If one method fails, it attempts the next one until authentication is successful.

0 commit comments

Comments
 (0)