Skip to content

Commit 0f6b7c4

Browse files
authored
Merge pull request #188570 from barclayn/linked-domain
adding link domain update sections
2 parents 4f9d9bc + f4f6b6e commit 0f6b7c4

File tree

5 files changed

+64
-35
lines changed

5 files changed

+64
-35
lines changed

articles/active-directory/verifiable-credentials/how-to-dnsbind.md

Lines changed: 51 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: karenhoran
77
ms.service: active-directory
88
ms.topic: how-to
99
ms.subservice: verifiable-credentials
10-
ms.date: 04/01/2021
10+
ms.date: 02/22/2022
1111
ms.author: barclayn
1212

1313
#Customer intent: Why are we doing this?
@@ -17,15 +17,9 @@ ms.author: barclayn
1717

1818
> [!IMPORTANT]
1919
> Azure Active Directory Verifiable Credentials is currently in public preview.
20-
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
20+
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
2121
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2222
23-
In this article:
24-
> [!div class="checklist"]
25-
> * Why do we need to link our DID to our domain?
26-
> * How do we link DIDs and domains?
27-
> * How does the domain linking process work?
28-
> * How does the verify/unverified domain logic work?
2923

3024
## Prerequisites
3125

@@ -35,16 +29,20 @@ To link your DID to your domain, you need to have completed the following.
3529

3630
## Why do we need to link our DID to our domain?
3731

38-
A DID starts out as an identifier that is not anchored to existing systems. A DID is useful because a user or organization can own it and control it. If an entity interacting with the organization does not know 'who' the DID belongs to, then the DID is not as useful.
32+
A DID starts out as an identifier that isn't anchored to existing systems. A DID is useful because a user or organization can own it and control it. If an entity interacting with the organization doesn't know 'who' the DID belongs to, then the DID isn't as useful.
3933

4034
Linking a DID to a domain solves the initial trust problem by allowing any entity to cryptographically verify the relationship between a DID and a Domain.
4135

36+
## When do you need to update the domain in your DID?
37+
38+
In the event where the domain associated with your company changes, you would also need to change the domain in your DID document that is also published in the ION network. You can update the domain in your DID directly from the Azure AD Verifiable Credential portal.
39+
4240
## How do we link DIDs and domains?
4341

44-
We make a link between a domain and a DID by implementing an open standard written by the Decentralized Identity Foundation called [Well-Known DID configuration](https://identity.foundation/.well-known/resources/did-configuration/). The verifiable credentials service in Azure Active Directory (Azure AD) helps your organization make the link between the DID and domain by including the domain information that you provided in your DID, and generating the well-known config file:
42+
We follow the [Well-Known DID configuration](https://identity.foundation/.well-known/resources/did-configuration/) specification when creating the link. The verifiable credentials service links your DID and domain. The service includes the domain information that you provided in your DID, and generates the well-known config file:
4543

4644
1. Azure AD uses the domain information you provide during organization setup to write a Service Endpoint within the DID Document. All parties who interact with your DID can see the domain your DID proclaims to be associated with.
47-
45+
4846
```json
4947
"service": [
5048
{
@@ -71,25 +69,25 @@ We make a link between a domain and a DID by implementing an open standard writt
7169
}
7270
```
7371

74-
After you have the well-known configuration file, you need to make the file available using the domain name you specified when enabling your AAD for verifiable credentials.
72+
After you have the well-known configuration file, you need to make the file available using the domain name you specified when you enabled your Azure AD for verifiable credentials.
7573

76-
* Host the well-known DID configuration file at the root of the domain.
77-
* Do not use redirects.
78-
* Use https to distribute the configuration file.
74+
- Host the well-known DID configuration file at the root of the domain.
75+
- Don't use redirects.
76+
- Use https to distribute the configuration file.
7977

8078
>[!IMPORTANT]
8179
>Microsoft Authenticator does not honor redirects, the URL specified must be the final destination URL.
8280

83-
## User experience
81+
## User experience in the wallet
8482

85-
When a user is going through an issuance flow or presenting a verifiable credential, they should know something about organization and its DID. If the domain our verifiable credential wallet, Microsoft Authenticator, validates a DID's relationship with the domain in the DID document and presents users with two different experiences depending on the outcome.
83+
When a user is going through an issuance flow or presenting a verifiable credential, they should know something about the organization and its DID. Microsoft Authenticator, validates a DID's relationship with the domain in the DID document and presents users with two different experiences depending on the outcome.
8684

8785
## Verified domain
8886

8987
Before Microsoft Authenticator displays a **Verified** icon, a few things need to be true:
9088

9189
* The DID signing the self-issued open ID (SIOP) request must have a Service endpoint for Linked Domain.
92-
* The root domain does not use a redirect and uses https.
90+
* The root domain doesn't use a redirect and uses https.
9391
* The domain listed in the DID Document has a resolvable well-known resource.
9492
* The well-known resource's verifiable credential is signed with the same DID that was used to sign the SIOP that Microsoft Authenticator used to kick start the flow.
9593

@@ -99,19 +97,47 @@ If all of the previously mentioned are true, then Microsoft Authenticator displa
9997

10098
## Unverified domain
10199

102-
If any of the above are not true, the Microsoft Authenticator will display a full page warning to the user that the domain is unverified, the user is in the middle of a risky transaction and they should proceed with caution. We have chosen to take this route because:
100+
If any of the above aren't true, Microsoft Authenticator displays a full page warning to the user indicating that the domain is unverified. The user is warned that they are in the middle of a potential risky transaction and they should proceed with caution. We have chosen to take this route because:
103101

104102
* The DID is either not anchored to a domain.
105-
* The configuration was not set up properly.
106-
* The DID the user is interacting with is malicious and actually can't prove they own a domain (since they actually don't). Due to this last point, it is imperative that you link your DID to the domain the user is familiar with, to avoid propagating the warning message.
103+
* The configuration wasn't set up properly.
104+
* The DID that the user is interacting with could be malicious and actually can't prove that they own the domain linked.
105+
106+
It is of high importance that you link your DID to a domain recognizable to the user.
107107

108108
![unverified domain warning in the add credential screen](media/how-to-dnsbind/add-credential-not-verified-authenticated.png)
109109

110-
## Distribute well-known config
110+
## How do you update the linked domain on your DID?
111+
112+
1. Navigate to the Verifiable Credentials | Getting Started page.
113+
1. On the left side of the page select **Domain**.
114+
1. In the Domain box, enter your new domain name.
115+
1. Select **Publish**.
116+
117+
:::image type="content" source="media/how-to-dnsbind/publish-update-domain.png" alt-text="Choose the publish button so your changes become":::
118+
119+
It might take up to two hours for your DID document to be updated in the [ION network](https://identity.foundation/ion) with the new domain information. No other changes to the domain are possible before the changes are published.
120+
121+
>[!NOTE]
122+
>If your changes are successful you will need to [verify](#verified-domain) your newly added domain.
111123

112-
1. Navigate to the Settings page in Verifiable Credentials and choose **Verify this domain**
113124

114-
![Verify this domain in settings](media/how-to-dnsbind/settings-verify.png)
125+
:::image type="content" source="media/how-to-dnsbind/verification.png" alt-text="You need to verify your domain once that the publishing process completes":::
126+
127+
### Do I need to wait for my DID Doc to be updated to verify my newly added domains?
128+
129+
Yes. You need to wait until the config.json file gets updated before you publish it using your domain's hosting location.
130+
131+
### How do I know when the linked domain update has successfully completed?
132+
133+
Once the domain changes are publised to ION, the domain section inside the Azure AD Verifiable Credentials service will display `Published` as the status and you should be able to make new changes to the domain.
134+
135+
>[!IMPORTANT]
136+
> No changes to your domain are possible while publishing is in progress.
137+
138+
## Distribute well-known config
139+
140+
1. From the Azure portal, navigate to the Verifiable Credentials page. Select **Domain** and choose **Verify this domain**
115141

116142
2. Download the did-configuration.json file shown in the image below.
117143

@@ -132,4 +158,4 @@ Congratulations, you now have bootstrapped the web of trust with your DID!
132158

133159
## Next steps
134160

135-
If during onboarding you enter the wrong domain information or if you decide to change it, you will need to [opt out](how-to-opt-out.md). At this time, we don't support updating your DID document. Opting out and opting back in will create a brand new DID.
161+
- [How to customize your Azure Active Directory Verifiable Credentials](credential-design.md)
88.9 KB
Loading
55.8 KB
Loading

articles/active-directory/verifiable-credentials/whats-new.md

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ manager: karenhoran
66
ms.service: active-directory
77
ms.subservice: verifiable-credentials
88
ms.topic: reference
9-
ms.date: 02/11/2022
9+
ms.date: 02/22/2022
1010
ms.custom: references_regions
1111
ms.author: barclayn
1212

@@ -18,13 +18,16 @@ ms.author: barclayn
1818

1919
This article lists the latest features, improvements, and changes in the Azure Active Directory (Azure AD) Verifiable Credentials service.
2020

21+
## March 2022
22+
- Azure AD Verifiable Credentials customers can now change the [domain linked](how-to-dnsbind.md) to their DID easily from the Azure Portal.
23+
2124
## February 2022
2225

23-
We are rolling out some important updates to our service that are breaking changes and require Azure AD Verifiable Credentials service reconfiguration and re-issuance of verifiable credentials for end-users.
26+
We are rolling out some breaking changes to our service. These updates require Azure AD Verifiable Credentials service reconfiguration. End-users need to have their verifiable credentials reissued.
2427

2528
- The Azure AD Verifiable Credentials service can now store and handle data processing in the Azure European region. [More information](whats-new.md?#azure-ad-verifiable-credentials-available-in-europe)
26-
- Azure AD Verifiable Credentials customers can take advantage of enhancements to credential revocation that add a higher degree of privacy through the implementation of the [W3C Status List 2021](https://w3c-ccg.github.io/vc-status-list-2021/) standard. [More information](whats-new.md?#credential-revocation-with-enhanced-privacy)
27-
- We made protocol updates in Microsoft Authenticator in the interaction between the Issuer of a verifiable credential and the user preenting the verifiable credential. This update will force all Verifiable Crecentials to be re-issued in Microsoft Authenticator for Android. [More information](whats-new.md?#microsoft-authenticator-android-did-generation-update)
29+
- Azure AD Verifiable Credentials customers can take advantage of enhancements to credential revocation. These changes add a higher degree of privacy through the implementation of the [W3C Status List 2021](https://w3c-ccg.github.io/vc-status-list-2021/) standard. [More information](whats-new.md?#credential-revocation-with-enhanced-privacy)
30+
- We made updates to Microsoft Authenticator that change the interaction between the Issuer of a verifiable credential and the user presenting the verifiable credential. This update forces all Verifiable Credentials to be reissued in Microsoft Authenticator for Android. [More information](whats-new.md?#microsoft-authenticator-android-did-generation-update)
2831

2932
>[!IMPORTANT]
3033
> All Azure AD Verifiable Credential customers receiving a banner notice in the Azure portal need to go through a service reconfiguration before March 31st 2022. On March 31st 2022 tenants that have not been reconfigured will lose access to any previous configuration. Administrators will have to set up a new instance of the Azure AD Verifiable Credential service. Learn more about how to [reconfigure your tenant](verifiable-credentials-faq.md?#how-do-i-reconfigure-the-azure-ad-verifiable-credentials-service).
@@ -34,7 +37,7 @@ We are rolling out some important updates to our service that are breaking chang
3437
Since the beginning of the Azure AD Verifiable Credentials service public preview, the service has only been available in our Azure North America region. Now, the service is also available in our Azure Europe region.
3538

3639
- New customers with Azure AD European tenants now have their Verifiable Credentials data located and processed in our Azure Europe region.
37-
- Customers with Azure AD tenants setup in Europe who start using the Azure AD Verifiable Credentials service after February 15, 2022, have their data automatically processed in Europe and don't need to take any further actions.
40+
- Customers with Azure AD tenants setup in Europe who start using the Azure AD Verifiable Credentials service after February 15, 2022, have their data automatically processed in Europe. There's no need to take any further actions.
3841
- Customers with Azure AD tenants setup in Europe that started using the Azure AD Verifiable Credentials service before February 15, 2022, are required to reconfigure the service on their tenants before March 31, 2022.
3942

4043
Take the following steps to configure the Verifiable Credentials service in Europe:
@@ -92,20 +95,20 @@ Sample contract file:
9295
}
9396
```
9497

95-
3. You have to issue new verifiable credentials using your new configuration. All verifiable credentials previously issued will continue to exist as your previous DID will remain resolvable however, they use the previous status endpoint implementation.
98+
3. You have to issue new verifiable credentials using your new configuration. All verifiable credentials previously issued continue to exist. Your previous DID remains resolvable however, they use the previous status endpoint implementation.
9699

97100
>[!IMPORTANT]
98101
> You have to reconfigure your Azure AD Verifiable Credential service instance to create your new Identity hub endpoint. You have until March 31st 2022, to schedule and manage the reconfiguration of your deployment. On March 31st, 2022 deployments that have not been reconfigured will lose access to any previous Azure AD Verifiable Credentials service configuration. Administrators will need to set up a new service instance.
99102
100103
### Microsoft Authenticator Android DID Generation Update
101104

102-
We are making protocol updates in Microsoft Authenticator to support Single Long Form DID, thus deprecating the use of pairwise. With this update your DID in Microsoft Authenticator will be used of every issuer and relaying party exchange. Holders of verifiable crendentials in Microsoft Authenticator for Android must get their verifiable credentials re-issued as any previous credentials are not going to continue working.
105+
We are making protocol updates in Microsoft Authenticator to support Single Long Form DID, thus deprecating the use of pairwise. With this update, your DID in Microsoft Authenticator will be used of every issuer and relaying party exchange. Holders of verifiable credentials using Microsoft Authenticator for Android must get their verifiable credentials reissued as any previous credentials aren't going to continue working.
103106

104107
## December 2021
105108

106109
- We added [Postman collections](https://github.com/Azure-Samples/active-directory-verifiable-credentials/tree/main/Postman) to our samples as a quick start to start using the Request Service REST API.
107110
- New sample added that demonstrates the integration of [Azure AD Verifiable Credentials with Azure AD B2C](https://github.com/Azure-Samples/active-directory-verifiable-credentials/tree/main/B2C).
108-
- Fastrack setup sample for setting up the Azure AD Verifiable Credentials services using [PowerShell and an ARM template](https://github.com/Azure-Samples/active-directory-verifiable-credentials/tree/main/ARM).
111+
- Sample for setting up the Azure AD Verifiable Credentials services using [PowerShell and an ARM template](https://github.com/Azure-Samples/active-directory-verifiable-credentials/tree/main/ARM).
109112
- Sample Verifiable Credential configuration files to show sample cards for [IDToken](https://github.com/Azure-Samples/active-directory-verifiable-credentials/tree/main/CredentialFiles/IDToken), [IDTokenHit](https://github.com/Azure-Samples/active-directory-verifiable-credentials/tree/main/CredentialFiles/IDTokenHint) and [Self-attested](https://github.com/Azure-Samples/active-directory-verifiable-credentials/tree/main/CredentialFiles/IDTokenHint) claims.
110113

111114
## November 2021
@@ -116,10 +119,10 @@ Callback types enforcing rules so that URL endpoints for callbacks are reachable
116119

117120
## October 2021
118121

119-
You can now use [Request Service REST API](get-started-request-api.md) to build applications that can issue and verify credentials from any programming language you're using. This new REST API provides an improved abstraction layer and integration to the Azure AD Verifiable Credentials Service.
122+
You can now use [Request Service REST API](get-started-request-api.md) to build applications that can issue and verify credentials from any programming language. This new REST API provides an improved abstraction layer and integration to the Azure AD Verifiable Credentials Service.
120123

121124
It's a good idea to start using the API soon, because the NodeJS SDK will be deprecated in the following months. Documentation and samples now use the Request Service REST API. For more information, see [Request Service REST API (preview)](get-started-request-api.md).
122125

123126
## April 2021
124127

125-
You can now issue [verifiable credentials](decentralized-identifier-overview.md) in Azure AD. This service is useful when you need to represent proof of employment, education, or any other claim, so that the holder of such a credential can decide when, and with whom, to share their credentials. Each credential is signed by using cryptographic keys associated with the decentralized identity that the user owns and controls.
128+
You can now issue [verifiable credentials](decentralized-identifier-overview.md) in Azure AD. This service is useful when you need to present proof of employment, education, or any other claim. The holder of such a credential can decide when, and with whom, to share their credentials. Each credential is signed by using cryptographic keys associated with the decentralized identity that the user owns and controls.

0 commit comments

Comments
 (0)