Skip to content

Commit 0696248

Browse files
Merge pull request #250961 from barclayn/verified-id-two-steps
making changes to the first two steps
2 parents 4bbd3d7 + ba433ed commit 0696248

File tree

2 files changed

+15
-17
lines changed

2 files changed

+15
-17
lines changed

articles/active-directory/verifiable-credentials/verifiable-credentials-configure-issuer.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: barclayn
77
manager: amycolannino
88
ms.author: barclayn
99
ms.topic: tutorial
10-
ms.date: 08/26/2022
10+
ms.date: 09/15/2023
1111
# Customer intent: As an enterprise, we want to enable customers to manage information about themselves by using verifiable credentials.
1212

1313
---
@@ -51,8 +51,8 @@ The following diagram illustrates the Microsoft Entra Verified ID architecture a
5151

5252
In this step, you create the verified credential expert card by using Microsoft Entra Verified ID. After you create the credential, your Azure AD tenant can issue it to users who initiate the process.
5353

54-
1. Sign in to the [Azure portal](https://portal.azure.com)
55-
1. Search for **Verified ID** and select it.
54+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
55+
1. Select **Verifiable credentials**.
5656
1. After you [set up your tenant](verifiable-credentials-configure-tenant.md), the **Create credential** should appear. Alternatively, you can select **Credentials** in the left hand menu and select **+ Add a credential**.
5757
1. In **Create credential**, select **Custom Credential** and click **Next**:
5858

@@ -160,7 +160,9 @@ git clone https://github.com/Azure-Samples/active-directory-verifiable-credentia
160160
161161
Create a client secret for the registered application that you created. The sample application uses the client secret to prove its identity when it requests tokens.
162162
163-
1. Go to the **App registrations** page that is located inside **Azure Active Directory**.
163+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
164+
1. Select Microsoft Entra ID (Azure AD).
165+
1. Go to **Applications** > **App registrations** page.
164166
165167
1. Select the **verifiable-credentials-app** application you created earlier.
166168

articles/active-directory/verifiable-credentials/verifiable-credentials-configure-tenant.md

Lines changed: 9 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: barclayn
77
manager: amycolannino
88
ms.author: barclayn
99
ms.topic: tutorial
10-
ms.date: 01/26/2023
10+
ms.date: 09/15/2023
1111
# Customer intent: As an enterprise, we want to enable customers to manage information about themselves by using verifiable credentials.
1212

1313
---
@@ -53,12 +53,8 @@ After you create your key vault, Verifiable Credentials generates a set of keys
5353

5454
### Set access policies for the Verified ID Admin user
5555

56-
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
57-
58-
1. Sign in to the [Azure portal](https://portal.azure.com).
59-
56+
1. Sign in to the [Azure portal](https://portal.azure.com) with your administrative account.
6057
1. Go to the key vault you use for this tutorial.
61-
6258
1. Under **Settings**, select **Access policies**.
6359

6460
1. In **Add access policies**, under **USER**, select the account you use to follow this tutorial.
@@ -75,9 +71,9 @@ After you create your key vault, Verifiable Credentials generates a set of keys
7571

7672
To set up Verified ID, follow these steps:
7773

78-
1. Sign in to the [Azure portal](https://portal.azure.com).
74+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
7975

80-
1. Search for *Verified ID*. Then, select **Verified ID**.
76+
1. Select **Verifiable Credentials**.
8177

8278
1. From the left menu, select **Setup**.
8379

@@ -119,11 +115,10 @@ If you ever are in need of manually resetting the permissions, the access policy
119115

120116
Your application needs to get access tokens when it wants to call into Microsoft Entra Verified ID so it can issue or verify credentials. To get access tokens, you have to register an application and grant API permission for the Verified ID Request Service. For example, use the following steps for a web application:
121117

122-
1. Sign in to the [Azure portal](https://portal.azure.com) with your administrative account.
123-
124-
1. If you have access to multiple tenants, select the **Directory + subscription**. Then, search for and select your **Azure Active Directory**.
118+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
119+
1. Select Microsoft Entra ID (Azure AD).
125120

126-
1. Under **Manage**, select **App registrations** > **New registration**.
121+
1. Under **Applications**, select **App registrations** > **New registration**.
127122

128123
:::image type="content" source="media/verifiable-credentials-configure-tenant/register-app.png" alt-text="Screenshot that shows how to select a new application registration.":::
129124

@@ -169,7 +164,8 @@ After Azure Key Vault is setup, and the service have a signing key, you must com
169164

170165
:::image type="content" source="media/verifiable-credentials-configure-tenant/verifiable-credentials-getting-started-step-2-3.png" alt-text="Screenshot that shows how to set up Verifiable Credentials step 2 and 3.":::
171166

172-
1. Navigate to the Verified ID service in the Azure portal.
167+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
168+
1. Select **Verifiable credentials**
173169
1. From the left menu, select **Setup**.
174170
1. From the middle menu, select **Register decentralized ID** to register your DID document, as per instructions in article [How to register your decentralized ID for did:web](how-to-register-didwebsite.md). You must complete this step before you can continue to verify your domain. If you selected did:ion as your trust system, you should skip this step.
175171
1. From the middle menu, select **Verify domain ownership** to verify your domain, as per instructions in article [Verify domain ownership to your Decentralized Identifier (DID)](how-to-dnsbind.md)

0 commit comments

Comments
 (0)