You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/verifiable-credentials-configure-issuer.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: barclayn
7
7
manager: amycolannino
8
8
ms.author: barclayn
9
9
ms.topic: tutorial
10
-
ms.date: 08/26/2022
10
+
ms.date: 09/15/2023
11
11
# Customer intent: As an enterprise, we want to enable customers to manage information about themselves by using verifiable credentials.
12
12
13
13
---
@@ -51,8 +51,8 @@ The following diagram illustrates the Microsoft Entra Verified ID architecture a
51
51
52
52
In this step, you create the verified credential expert card by using Microsoft Entra Verified ID. After you create the credential, your Azure AD tenant can issue it to users who initiate the process.
53
53
54
-
1. Sign in to the [Azure portal](https://portal.azure.com)
55
-
1.Search for **Verified ID** and select it.
54
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
55
+
1.Select **Verifiable credentials**.
56
56
1. After you [set up your tenant](verifiable-credentials-configure-tenant.md), the **Create credential** should appear. Alternatively, you can select **Credentials** in the left hand menu and select **+ Add a credential**.
57
57
1. In **Create credential**, select **Custom Credential** and click **Next**:
Create a client secret for the registered application that you created. The sample application uses the client secret to prove its identity when it requests tokens.
162
162
163
-
1. Go to the **App registrations** page that is located inside **Azure Active Directory**.
163
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
164
+
1. Select Microsoft Entra ID (Azure AD).
165
+
1. Go to **Applications** > **App registrations** page.
164
166
165
167
1. Select the **verifiable-credentials-app** application you created earlier.
1. Sign in to the [Azure portal](https://portal.azure.com).
59
-
56
+
1. Sign in to the [Azure portal](https://portal.azure.com) with your administrative account.
60
57
1. Go to the key vault you use for this tutorial.
61
-
62
58
1. Under **Settings**, select **Access policies**.
63
59
64
60
1. In **Add access policies**, under **USER**, select the account you use to follow this tutorial.
@@ -75,9 +71,9 @@ After you create your key vault, Verifiable Credentials generates a set of keys
75
71
76
72
To set up Verified ID, follow these steps:
77
73
78
-
1. Sign in to the [Azure portal](https://portal.azure.com).
74
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
79
75
80
-
1.Search for *Verified ID*. Then, select **Verified ID**.
76
+
1.Select **Verifiable Credentials**.
81
77
82
78
1. From the left menu, select **Setup**.
83
79
@@ -119,11 +115,10 @@ If you ever are in need of manually resetting the permissions, the access policy
119
115
120
116
Your application needs to get access tokens when it wants to call into Microsoft Entra Verified ID so it can issue or verify credentials. To get access tokens, you have to register an application and grant API permission for the Verified ID Request Service. For example, use the following steps for a web application:
121
117
122
-
1. Sign in to the [Azure portal](https://portal.azure.com) with your administrative account.
123
-
124
-
1. If you have access to multiple tenants, select the **Directory + subscription**. Then, search for and select your **Azure Active Directory**.
118
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
119
+
1. Select Microsoft Entra ID (Azure AD).
125
120
126
-
1. Under **Manage**, select **App registrations** > **New registration**.
121
+
1. Under **Applications**, select **App registrations** > **New registration**.
127
122
128
123
:::image type="content" source="media/verifiable-credentials-configure-tenant/register-app.png" alt-text="Screenshot that shows how to select a new application registration.":::
129
124
@@ -169,7 +164,8 @@ After Azure Key Vault is setup, and the service have a signing key, you must com
169
164
170
165
:::image type="content" source="media/verifiable-credentials-configure-tenant/verifiable-credentials-getting-started-step-2-3.png" alt-text="Screenshot that shows how to set up Verifiable Credentials step 2 and 3.":::
171
166
172
-
1. Navigate to the Verified ID service in the Azure portal.
167
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
168
+
1. Select **Verifiable credentials**
173
169
1. From the left menu, select **Setup**.
174
170
1. From the middle menu, select **Register decentralized ID** to register your DID document, as per instructions in article [How to register your decentralized ID for did:web](how-to-register-didwebsite.md). You must complete this step before you can continue to verify your domain. If you selected did:ion as your trust system, you should skip this step.
175
171
1. From the middle menu, select **Verify domain ownership** to verify your domain, as per instructions in article [Verify domain ownership to your Decentralized Identifier (DID)](how-to-dnsbind.md)
0 commit comments