our primary goal is to ensure our Office Add-ins display “Your Company” as the verified publisher within the Office Trust Center, rather than showing “None” or “Unknown Publisher.”

We have Azure Key Vault-store certificate with following

Could you clarify the exact certificate requirements for achieving “Trusted Publisher” status? We have attempted to sign the manifest using signtool and azuresigntool without success.
Some details:
- Certificate Export Process: The certificate is retrieved as an X509Certificate2 object that includes the public certificate. Only the signing certificate is directly retrieved from Key Vault The full certificate chain is not exported
- Signing Command: sign code azure-keyvault –azure-key-vault-url “https://mycompany.vault.azure.net/” –azure-key-vault-certificate “CodeSigningCert” –azure-credential-type “ManagedIdentity” –managed-identity-client-id “2a3xxxxx-xxxx-xxxx-xxxx-xxxxxxxxx” –application-name “Quark Publishing Platform Adapter for Microsoft Office” –publisher-name “Quark Software Inc” –description “Quark Publishing Platform Adapter for Microsoft Office” –description-url “https://www.quark.com” –timestamp-url “[http://timestamp.digicert.com]” “path/to/Quark.CMSAdapters.Office.Word.vsto”
- Certificate Chain Verification: PS C:\Windows\System32> Get-AuthenticodeSignature C:\Publish\Quark.CMSAdapters.Office.Word.vsto | Format-List *
SignerCertificate : TimeStamperCertificate : Status : UnknownError StatusMessage : The form specified for the subject is not one supported or known by the specified trust provider. Path : C:\Publish\Quark.CMSAdapters.Office.Word.vsto SignatureType : None IsOSBinary : False
- Manifest Signing: Yes Sign CLI does sign both VSTO and manifests:
Please let me know if any further info is needed?
Certificate Export Process: The certificate is retrieved as an X509Certificate2 object that includes the public certificate. Only the signing certificate is directly retrieved from Key Vault
The full certificate chain is not exported
Signing Command:
sign code azure-keyvault
–azure-key-vault-url “https://mycompany.vault.azure.net/”
–azure-key-vault-certificate “CodeSigningCert”
–azure-credential-type “ManagedIdentity”
–managed-identity-client-id “2a3xxxxx-xxxx-xxxx-xxxx-xxxxxxxxx”
–application-name “Quark Publishing Platform Adapter for Microsoft Office”
–publisher-name “Quark Software Inc”
–description “Quark Publishing Platform Adapter for Microsoft Office”
–description-url “https://www.quark.com”
–timestamp-url “[http://timestamp.digicert.com]”
“path/to/Quark.CMSAdapters.Office.Word.vsto”
Certificate Chain Verification:
PS C:\Windows\System32> Get-AuthenticodeSignature C:\Publish\Quark.CMSAdapters.Office.Word.vsto | Format-List *
SignerCertificate :
TimeStamperCertificate :
Status : UnknownError
StatusMessage : The form specified for the subject is not one supported or known by the specified trust
provider.
Path : C:\Publish\Quark.CMSAdapters.Office.Word.vsto
SignatureType : None
IsOSBinary : False
- Manifest Signing: Yes Sign CLI does sign both VSTO and manifests:
Please let me know if any further info is needed?
Specifically, can Azure Key Vault-stored certificates be used for this purpose?
Moved from Microsoft 365 and Office | Word | Other | Windows