Skip to content
This repository was archived by the owner on Nov 14, 2019. It is now read-only.

Commit f69dbed

Browse files
committed
Add README steps to trust IIS Express SSL cert
1 parent 743ec6e commit f69dbed

File tree

1 file changed

+8
-2
lines changed

1 file changed

+8
-2
lines changed

README.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -103,9 +103,11 @@ There are two projects in this sample. Each needs to be separately registered i
103103

104104
### Step 5: Trust the IIS Express SSL certificate
105105

106-
Since the web API is SSL protected, the client of the API (the web app) will refuse the SSL connection to the web API unless it trusts the API's SSL certificate. Use the following steps in Windows Powershell to trust the IIS Express SSL certificate. You only need to do this once. If you fail to do this step, calls to the TodoListService will always fail with Access Denied.
106+
Since the web API is SSL protected, the client of the API (the web app) will refuse the SSL connection to the web API unless it trusts the API's SSL certificate. Use the following steps in Windows Powershell to trust the IIS Express SSL certificate. You only need to do this once. If you fail to do this step, calls to the TodoListService will always throw an unhandled exception where the inner exception message is:
107107

108-
Begin by opening a Windows Powershell command window as Administrator.
108+
"The underlying connection was closed: Could not establish trust relationship for the SSL/TLS secure channel."
109+
110+
To configure your computer to trust the IIS Express SSL certificate, begin by opening a Windows Powershell command window as Administrator.
109111

110112
Query your personal certificate store to find the thumbprint of the certificate for `CN=localhost`:
111113

@@ -131,6 +133,10 @@ PS C:\windows\system32> $store.Add($cert)
131133
PS C:\windows\system32> $store.Close()
132134
```
133135

136+
You can verify the certificate is in the Trusted Root store by running this command:
137+
138+
`PS C:\windows\system32> dir Cert:\LocalMachine\Root`
139+
134140
### Step 6: Run the sample
135141

136142
You know what to do! Explore the sample by signing in, adding items to the To Do list, removing the user account, and starting again. Notice that if you stop the application without removing the user account, the next time you run the application you won't be prompted to sign-in again - that is the sample implements a persistent cache for ADAL, and remembers the tokens from the previous run.

0 commit comments

Comments
 (0)