If you are wondering where the data of this site comes from, please visit GitMemory does not store any data, but only uses NGINX to cache data for a period of time. The idea behind GitMemory is simply to give users a better reading experience.

jeffwmiles/azure-dsc-pipeline 5

Provide an example of how to insert Azure DSC workflow into a pipeline

jeffwmiles/terraform-snippets 4

Small examples and sections of Terraform code for reference or sampling

jeffwmiles/arm-azuresiterecovery 3

A full PowerShell and ARM solution for Azure Site Recovery implementation and Recovery Plan

jeffwmiles/AzureUpdateManagement 2

A collection of Azure Automation Runbooks which will facilitate creation of Update Management schedules

jeffwmiles/PrtgMaintenanceWindow 2

Website to add PRTG maintenance window for specified set of objects

jeffwmiles/25daysofserverless2019 0

jeffwmiles/azure-docs 0

Open source documentation of Microsoft Azure

jeffwmiles/AzureAutomationModules 0

Functions for working with Azure Automation Modules

jeffwmiles/AzureMonitorCommunity 0

An open repo for Azure Monitor queries, workbooks, alerts and more

issue commentMicrosoftDocs/azure-docs

Incorrect examples for exporting certificate chain

I can confirm that the code in the PowerShell example only exports the first certificate with a private key, as originally reported. I'd request that this be re-opened.

I exported the certificate according to the code, as well as through the Portal (pfx).

For both, I extracted the certificates as PEM using this command:

openssl pkcs12 -in cert.pfx -out keyStore.pem -nodes -nokeys

Then when viewing in a text editor, the file produced using PowerShell contains only 1 entry, however the file downloaded in the Portal contains 2.

I believe the object type needs to be created as a X509Certificate2Collection to allow for the full certificate chain.


comment created time in a month