You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/social-transformations.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,10 +16,10 @@ ms.subservice: B2C
16
16
17
17
# Social accounts claims transformations
18
18
19
-
In Azure Active Directory B2C (Azure AD B2C), social account identities are stored in a `userIdentities` attribute of a **alternativeSecurityIdCollection** claim type. Each item in the **alternativeSecurityIdCollection** specifies the issuer (identity provider name, such as facebook.com) and the `issuerUserId`, which is a unique user identifier for the issuer.
19
+
In Azure Active Directory B2C (Azure AD B2C), social account identities are stored in a `alternativeSecurityIds` attribute of a **alternativeSecurityIdCollection** claim type. Each item in the **alternativeSecurityIdCollection** specifies the issuer (identity provider name, such as facebook.com) and the `issuerUserId`, which is a unique user identifier for the issuer.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -229,6 +229,12 @@ For the next test scenario, configure the authentication policy where the **poli
229
229
230
230
- The **Additional Details** tab shows **User certificate subject name** as the attribute name but it is actually "User certificate binding identifier". It is the value of the certificate field that username binding is configured to use.
231
231
232
+
- There is a double prompt for iOS because iOS only supports pushing certificates to a device storage. When an organization pushes user certificates to an iOS device through Mobile Device Management (MDM) or when a user accesses first-party or native apps, there is no access to device storage. Only Safari can access device storage.
233
+
234
+
When an iOS client sees a client TLS challenge and the user clicks **Sign in with certificate**, iOS client knows it cannot handle it and sends a completely new authorization request using the Safari browser. The user clicks **Sign in with certificate** again, at which point Safari which has access to certificates for authentication in device storage. This requires users to click **Sign in with certificate** twice, once in app’s WKWebView and once in Safari’s System WebView.
235
+
236
+
We are aware of the UX experience issue and are working to fix this on iOS and to have a seamless UX experience.
237
+
232
238
## Next steps
233
239
234
240
-[Overview of Azure AD CBA](concept-certificate-based-authentication.md)
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-with-federation.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Step-by-step guidance to move from Azure MFA Server on-premises to
4
4
ms.service: active-directory
5
5
ms.subservice: authentication
6
6
ms.topic: how-to
7
-
ms.date: 04/07/2022
7
+
ms.date: 04/21/2022
8
8
ms.author: BaSelden
9
9
author: BarbaraSelden
10
10
manager: martinco
@@ -174,7 +174,7 @@ This section covers final steps before migrating user phone numbers.
174
174
175
175
### Set federatedIdpMfaBehavior to enforceMfaByFederatedIdp
176
176
177
-
For federated domains, MFA may be enforced by Azure AD Conditional Access or by the on-premises federation provider. Each federated domain has a Microsoft Graph PowerShell security setting named **federatedIdpMfaBehavior**. You can set **federatedIdpMfaBehavior** to `enforceMfaByFederatedIdp` so Azure AD accepts MFA that's performed by the federated identity provider. If the federated identity provider didn't perform MFA, Azure AD redirects the request to the federated identity provider to perform MFA. For more information, see [federatedIdpMfaBehavior](/graph/api/resources/federatedIdpMfaBehavior?view=graph-rest-beta&preserve-view=true).
177
+
For federated domains, MFA may be enforced by Azure AD Conditional Access or by the on-premises federation provider. Each federated domain has a Microsoft Graph PowerShell security setting named **federatedIdpMfaBehavior**. You can set **federatedIdpMfaBehavior** to `enforceMfaByFederatedIdp` so Azure AD accepts MFA that's performed by the federated identity provider. If the federated identity provider didn't perform MFA, Azure AD redirects the request to the federated identity provider to perform MFA. For more information, see [federatedIdpMfaBehavior](/graph/api/resources/internaldomainfederation?view=graph-rest-beta#federatedidpmfabehavior-values).
178
178
179
179
>[!NOTE]
180
180
> The **federatedIdpMfaBehavior** setting is an evolved version of the **SupportsMfa** property of the [Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet](/powershell/module/msonline/set-msoldomainfederationsettings).
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/verifiable-credentials-configure-issuer.md
+4-31Lines changed: 4 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: barclayn
7
7
manager: karenhoran
8
8
ms.author: barclayn
9
9
ms.topic: tutorial
10
-
ms.date: 10/08/2021
10
+
ms.date: 04/26/2022
11
11
# Customer intent: As an enterprise, we want to enable customers to manage information about themselves by using verifiable credentials.
12
12
13
13
---
@@ -46,7 +46,7 @@ The following diagram illustrates the Azure AD Verifiable Credentials architectu
46
46
47
47
## Create a storage account
48
48
49
-
Azure Blob Storage is an object storage solution for the cloud. Azure AD Verifiable Credentials uses[Azure Blob Storage](../../storage/blobs/storage-blobs-introduction.md) to store the configuration files when the service is issuing verifiable credentials.
49
+
Azure Blob Storage is an object storage solution for the cloud. Azure AD Verifiable Credentials use[Azure Blob Storage](../../storage/blobs/storage-blobs-introduction.md) to store the configuration files when the service is issuing verifiable credentials.
50
50
51
51
Create and configure Blob Storage by following these steps:
52
52
@@ -59,36 +59,9 @@ Create and configure Blob Storage by following these steps:
59
59
60
60

61
61
62
-
## Grant access to the container
63
-
64
-
After you create your container, grant the signed-in user the correct role assignment so they can access the files in Blob Storage.
65
-
66
-
1. From the list of containers, select **vc-container**.
67
-
68
-
1. From the menu, select **Access Control (IAM)**.
69
-
70
-
1. Select **+ Add,** and then select **Add role assignment**.
71
-
72
-

73
-
74
-
1. In **Add role assignment**:
75
-
76
-
1. For the **Role**, select **Storage Blob Data Reader**.
77
-
78
-
1. For the **Assign access to**, select **User, group, or service
79
-
principal**.
80
-
81
-
1. Then, search the account that you're using to perform these steps, and
82
-
select it.
83
-
84
-

85
-
86
-
>[!IMPORTANT]
87
-
>By default, container creators get the owner role assigned. The owner role isn't enough on its own. Your account needs the storage blob data reader role. For more information, see [Use the Azure portal to assign an Azure role for access to blob and queue data](../../storage/blobs/assign-azure-role-data-access.md).
88
-
89
62
### Upload the configuration files
90
63
91
-
Azure AD Verifiable Credentials uses two JSON configuration files, the rules file and the display file.
64
+
Azure AD Verifiable Credentials service uses two JSON configuration files, the rules file and the display file.
92
65
93
66
- The *rules* file describes important properties of verifiable credentials. In particular, it describes the claims that subjects (users) need to provide before a verifiable credential is issued for them.
94
67
- The *display* file controls the branding of the credential and styling of the claims.
@@ -175,7 +148,7 @@ In this step, you create the verified credential expert card by using Azure AD V
175
148
176
149
1. For **Subscription**, select your Azure AD subscription where you created Blob Storage.
177
150
178
-
1. Under the **Display file**, select **Select display file**. In the Storage accounts section, select **vc-container**. Then select the **VerifiedCredentialExpertDisplay.json** file and click **Select**.
151
+
1. Under the **Display file**, select **Select display file**. In the Storage accounts section, select **vc-container**. Then select the **VerifiedCredentialExpertDisplay.json** file and select **Select**.
179
152
180
153
1. Under the **Rules file**, **Select rules file**. In the Storage accounts section, select the **vc-container**. Then select the **VerifiedCredentialExpertRules.json** file, and choose **Select**.
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/verifiable-credentials-configure-tenant.md
+7-65Lines changed: 7 additions & 65 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: barclayn
7
7
manager: karenhoran
8
8
ms.author: barclayn
9
9
ms.topic: tutorial
10
-
ms.date: 02/24/2022
10
+
ms.date: 04/26/2022
11
11
# Customer intent: As an enterprise, we want to enable customers to manage information about themselves by using verifiable credentials.
12
12
13
13
---
@@ -22,10 +22,10 @@ Specifically, you learn how to:
22
22
23
23
> [!div class="checklist"]
24
24
>
25
-
> - Set up a service principal
26
-
> - Create a key vault in Azure Key Vault
27
-
> - Register an application in Azure AD
28
-
> - Set up the Verifiable Credentials service
25
+
> - Set up a service principal.
26
+
> - Create an Azure Key Vault instance.
27
+
> - Register an application in Azure AD.
28
+
> - Set up the Verifiable Credentials service.
29
29
30
30
The following diagram illustrates the Azure AD Verifiable Credentials architecture and the component you configure.
31
31
@@ -35,36 +35,8 @@ See a [video walkthrough](https://www.youtube.com/watch?v=8jqjHjQo-3c) going ove
35
35
36
36
## Prerequisites
37
37
38
-
- If you don't have Azure subscription, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
39
-
- Sign up for [Azure Active Directory Premium editions](../../active-directory/fundamentals/active-directory-get-started-premium.md)
40
-
subscription in your tenant.
38
+
- You need an Azure tenant with an active subscription. If you don't have Azure subscription, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
41
39
- Ensure that you have the [global administrator](../../active-directory/roles/permissions-reference.md#global-administrator) permission for the directory you want to configure.
42
-
- Ensure that you have [PowerShell](/powershell/scripting/install/installing-powershell) 7.0.6 LTS-x64, PowerShell 7.1.3-x64, or later installed.
43
-
44
-
## Set up a service principal
45
-
46
-
Create a service principal for the Request Service API. The service API is the Microsoft service that you use to issue or verify Azure AD Verifiable Credentials.
47
-
48
-
To create the service principal:
49
-
50
-
1. Run the following PowerShell commands. These commands install and import the `Az` module. For more information, see [Install the Azure Az PowerShell module](/powershell/azure/install-az-ps#installation).
1. Run the following PowerShell command to connect to your Azure AD tenant. Replace \<*your-tenant-ID*> with your [Azure AD tenant ID](../../active-directory/fundamentals/active-directory-how-to-find-tenant.md).
58
-
59
-
```powershell
60
-
Connect-AzAccount -TenantId <your-tenant-ID>
61
-
```
62
-
63
-
1. Run the following command in the same PowerShell session. The `AppId` `bbb94529-53a3-4be5-a069-7eaf2712b826` refers to the Verifiable Credentials Microsoft service.
@@ -96,36 +68,6 @@ A Key Vault [access policy](../../key-vault/general/assign-access-policy.md) def
96
68
97
69
1. To save the changes, select **Save**.
98
70
99
-
### Set access policies for the Verifiable Credentials Issuer and Request services
100
-
101
-
1. Select **+ Add Access Policy** to add permission to the service principal of the **Verifiable Credential Request Service**.
102
-
103
-
1. In **Add access policy**:
104
-
105
-
1. For **Key permissions**, select **Get** and **Sign**.
106
-
107
-
1. For **Select principal**, select **Verifiable Credential Request Service**.
108
-
109
-
1. Select **Add**.
110
-
111
-
:::image type="content" source="media/verifiable-credentials-configure-tenant/request-service-key-vault-access-policy.png" alt-text="Screenshot that demonstrates how to add an access policy for the Verifiable Credential Issuer Service." :::
112
-
113
-
The access policies for the Verifiable Credentials Issuer service should be added automatically. If the **Verifiable Credential Issuer Service** doesn't appear in the list of access policies, take the following steps to manually add access policies to the service.
114
-
115
-
1. Select **+ Add Access Policy** to add permission to the service principal of the **Verifiable Credential Issuer Service**.
116
-
117
-
1. In **Add access policy**:
118
-
119
-
1. For **Key permissions**, select **Get** and **Sign**.
120
-
121
-
1. For **Select principal**, select **Verifiable Credential Issuer Service**.
122
-
123
-
1. Select **Add**.
124
-
125
-
:::image type="content" source="media/verifiable-credentials-configure-tenant/issuer-service-key-vault-access-policy.png" alt-text="Screenshot that demonstrates how to add an access policy for the Verifiable Credential Request Service." :::
126
-
127
-
1. Select **Save** to save the new policy you created.
128
-
129
71
## Register an application in Azure AD
130
72
131
73
Azure AD Verifiable Credentials Request Service needs to be able to get access tokens to issue and verify. To get access tokens, register a web application and grant API permission for the API Verifiable Credential Request Service that you set up in the previous step.
@@ -148,7 +90,7 @@ Azure AD Verifiable Credentials Request Service needs to be able to get access t
148
90
149
91
### Grant permissions to get access tokens
150
92
151
-
In this step, you grant permissions to the Verifiable Credential Request Service principal created in [step 1](#set-up-a-service-principal).
93
+
In this step, you grant permissions to the Verifiable Credential Request Service principal.
152
94
153
95
To add the required permissions, follow these steps:
0 commit comments