You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/how-to-dnsbind.md
+51-25Lines changed: 51 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: karenhoran
7
7
ms.service: active-directory
8
8
ms.topic: how-to
9
9
ms.subservice: verifiable-credentials
10
-
ms.date: 04/01/2021
10
+
ms.date: 02/22/2022
11
11
ms.author: barclayn
12
12
13
13
#Customer intent: Why are we doing this?
@@ -17,15 +17,9 @@ ms.author: barclayn
17
17
18
18
> [!IMPORTANT]
19
19
> Azure Active Directory Verifiable Credentials is currently in public preview.
20
-
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
20
+
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
21
21
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
22
22
23
-
In this article:
24
-
> [!div class="checklist"]
25
-
> * Why do we need to link our DID to our domain?
26
-
> * How do we link DIDs and domains?
27
-
> * How does the domain linking process work?
28
-
> * How does the verify/unverified domain logic work?
29
23
30
24
## Prerequisites
31
25
@@ -35,16 +29,20 @@ To link your DID to your domain, you need to have completed the following.
35
29
36
30
## Why do we need to link our DID to our domain?
37
31
38
-
A DID starts out as an identifier that is not anchored to existing systems. A DID is useful because a user or organization can own it and control it. If an entity interacting with the organization does not know 'who' the DID belongs to, then the DID is not as useful.
32
+
A DID starts out as an identifier that isn't anchored to existing systems. A DID is useful because a user or organization can own it and control it. If an entity interacting with the organization doesn't know 'who' the DID belongs to, then the DID isn't as useful.
39
33
40
34
Linking a DID to a domain solves the initial trust problem by allowing any entity to cryptographically verify the relationship between a DID and a Domain.
41
35
36
+
## When do you need to update the domain in your DID?
37
+
38
+
In the event where the domain associated with your company changes, you would also need to change the domain in your DID document that is also published in the ION network. You can update the domain in your DID directly from the Azure AD Verifiable Credential portal.
39
+
42
40
## How do we link DIDs and domains?
43
41
44
-
We make a link between a domain and a DID by implementing an open standard written by the Decentralized Identity Foundation called [Well-Known DID configuration](https://identity.foundation/.well-known/resources/did-configuration/). The verifiable credentials service in Azure Active Directory (Azure AD) helps your organization make the link between the DID and domain by including the domain information that you provided in your DID, and generating the well-known config file:
42
+
We follow the [Well-Known DID configuration](https://identity.foundation/.well-known/resources/did-configuration/) specification when creating the link. The verifiable credentials service links your DID and domain. The service includes the domain information that you provided in your DID, and generates the well-known config file:
45
43
46
44
1. Azure AD uses the domain information you provide during organization setup to write a Service Endpoint within the DID Document. All parties who interact with your DID can see the domain your DID proclaims to be associated with.
47
-
45
+
48
46
```json
49
47
"service": [
50
48
{
@@ -71,25 +69,25 @@ We make a link between a domain and a DID by implementing an open standard writt
71
69
}
72
70
```
73
71
74
-
After you have the well-known configuration file, you need to make the file available using the domain name you specified when enabling your AAD for verifiable credentials.
72
+
After you have the well-known configuration file, you need to make the file available using the domain name you specified when you enabled your Azure AD for verifiable credentials.
75
73
76
-
* Host the well-known DID configuration file at the root of the domain.
77
-
* Do not use redirects.
78
-
* Use https to distribute the configuration file.
74
+
- Host the well-known DID configuration file at the root of the domain.
75
+
- Don't use redirects.
76
+
- Use https to distribute the configuration file.
79
77
80
78
>[!IMPORTANT]
81
79
>Microsoft Authenticator does not honor redirects, the URL specified must be the final destination URL.
82
80
83
-
## User experience
81
+
## User experience in the wallet
84
82
85
-
When a user is going through an issuance flow or presenting a verifiable credential, they should know something about organization and its DID. If the domain our verifiable credential wallet, Microsoft Authenticator, validates a DID's relationship with the domain in the DID document and presents users with two different experiences depending on the outcome.
83
+
When a user is going through an issuance flow or presenting a verifiable credential, they should know something about the organization and its DID. Microsoft Authenticator, validates a DID's relationship with the domain in the DID document and presents users with two different experiences depending on the outcome.
86
84
87
85
## Verified domain
88
86
89
87
Before Microsoft Authenticator displays a **Verified** icon, a few things need to be true:
90
88
91
89
* The DID signing the self-issued open ID (SIOP) request must have a Service endpoint for Linked Domain.
92
-
* The root domain does not use a redirect and uses https.
90
+
* The root domain doesn't use a redirect and uses https.
93
91
* The domain listed in the DID Document has a resolvable well-known resource.
94
92
* The well-known resource's verifiable credential is signed with the same DID that was used to sign the SIOP that Microsoft Authenticator used to kick start the flow.
95
93
@@ -99,19 +97,47 @@ If all of the previously mentioned are true, then Microsoft Authenticator displa
99
97
100
98
## Unverified domain
101
99
102
-
If any of the above are not true, the Microsoft Authenticator will display a full page warning to the user that the domain is unverified, the user is in the middle of a risky transaction and they should proceed with caution. We have chosen to take this route because:
100
+
If any of the above aren't true, Microsoft Authenticator displays a full page warning to the user indicating that the domain is unverified. The user is warned that they are in the middle of a potential risky transaction and they should proceed with caution. We have chosen to take this route because:
103
101
104
102
* The DID is either not anchored to a domain.
105
-
* The configuration was not set up properly.
106
-
* The DID the user is interacting with is malicious and actually can't prove they own a domain (since they actually don't). Due to this last point, it is imperative that you link your DID to the domain the user is familiar with, to avoid propagating the warning message.
103
+
* The configuration wasn't set up properly.
104
+
* The DID that the user is interacting with could be malicious and actually can't prove that they own the domain linked.
105
+
106
+
It is of high importance that you link your DID to a domain recognizable to the user.
107
107
108
108

109
109
110
-
## Distribute well-known config
110
+
## How do you update the linked domain on your DID?
111
+
112
+
1. Navigate to the Verifiable Credentials | Getting Started page.
113
+
1. On the left side of the page select **Domain**.
114
+
1. In the Domain box, enter your new domain name.
115
+
1. Select **Publish**.
116
+
117
+
:::image type="content" source="media/how-to-dnsbind/publish-update-domain.png" alt-text="Choose the publish button so your changes become":::
118
+
119
+
It might take up to two hours for your DID document to be updated in the [ION network](https://identity.foundation/ion) with the new domain information. No other changes to the domain are possible before the changes are published.
120
+
121
+
>[!NOTE]
122
+
>If your changes are successful you will need to [verify](#verified-domain) your newly added domain.
111
123
112
-
1. Navigate to the Settings page in Verifiable Credentials and choose **Verify this domain**
113
124
114
-

125
+
:::image type="content" source="media/how-to-dnsbind/verification.png" alt-text="You need to verify your domain once that the publishing process completes":::
126
+
127
+
### Do I need to wait for my DID Doc to be updated to verify my newly added domains?
128
+
129
+
Yes. You need to wait until the config.json file gets updated before you publish it using your domain's hosting location.
130
+
131
+
### How do I know when the linked domain update has successfully completed?
132
+
133
+
Once the domain changes are publised to ION, the domain section inside the Azure AD Verifiable Credentials service will display `Published` as the status and you should be able to make new changes to the domain.
134
+
135
+
>[!IMPORTANT]
136
+
> No changes to your domain are possible while publishing is in progress.
137
+
138
+
## Distribute well-known config
139
+
140
+
1. From the Azure portal, navigate to the Verifiable Credentials page. Select **Domain** and choose **Verify this domain**
115
141
116
142
2. Download the did-configuration.json file shown in the image below.
117
143
@@ -132,4 +158,4 @@ Congratulations, you now have bootstrapped the web of trust with your DID!
132
158
133
159
## Next steps
134
160
135
-
If during onboarding you enter the wrong domain information or if you decide to change it, you will need to [opt out](how-to-opt-out.md). At this time, we don't support updating your DID document. Opting out and opting back in will create a brand new DID.
161
+
- [How to customize your Azure Active Directory Verifiable Credentials](credential-design.md)
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/whats-new.md
+13-10Lines changed: 13 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ manager: karenhoran
6
6
ms.service: active-directory
7
7
ms.subservice: verifiable-credentials
8
8
ms.topic: reference
9
-
ms.date: 02/11/2022
9
+
ms.date: 02/22/2022
10
10
ms.custom: references_regions
11
11
ms.author: barclayn
12
12
@@ -18,13 +18,16 @@ ms.author: barclayn
18
18
19
19
This article lists the latest features, improvements, and changes in the Azure Active Directory (Azure AD) Verifiable Credentials service.
20
20
21
+
## March 2022
22
+
- Azure AD Verifiable Credentials customers can now change the [domain linked](how-to-dnsbind.md) to their DID easily from the Azure Portal.
23
+
21
24
## February 2022
22
25
23
-
We are rolling out some important updates to our service that are breaking changes and require Azure AD Verifiable Credentials service reconfiguration and re-issuance of verifiable credentials for end-users.
26
+
We are rolling out some breaking changes to our service. These updates require Azure AD Verifiable Credentials service reconfiguration. End-users need to have their verifiable credentials reissued.
24
27
25
28
- The Azure AD Verifiable Credentials service can now store and handle data processing in the Azure European region. [More information](whats-new.md?#azure-ad-verifiable-credentials-available-in-europe)
26
-
- Azure AD Verifiable Credentials customers can take advantage of enhancements to credential revocation that add a higher degree of privacy through the implementation of the [W3C Status List 2021](https://w3c-ccg.github.io/vc-status-list-2021/) standard. [More information](whats-new.md?#credential-revocation-with-enhanced-privacy)
27
-
- We made protocol updates in Microsoft Authenticator in the interaction between the Issuer of a verifiable credential and the user preenting the verifiable credential. This update will force all Verifiable Crecentials to be re-issued in Microsoft Authenticator for Android. [More information](whats-new.md?#microsoft-authenticator-android-did-generation-update)
29
+
- Azure AD Verifiable Credentials customers can take advantage of enhancements to credential revocation. These changes add a higher degree of privacy through the implementation of the [W3C Status List 2021](https://w3c-ccg.github.io/vc-status-list-2021/) standard. [More information](whats-new.md?#credential-revocation-with-enhanced-privacy)
30
+
- We made updates to Microsoft Authenticator that change the interaction between the Issuer of a verifiable credential and the user presenting the verifiable credential. This update forces all Verifiable Credentials to be reissued in Microsoft Authenticator for Android. [More information](whats-new.md?#microsoft-authenticator-android-did-generation-update)
28
31
29
32
>[!IMPORTANT]
30
33
> All Azure AD Verifiable Credential customers receiving a banner notice in the Azure portal need to go through a service reconfiguration before March 31st 2022. On March 31st 2022 tenants that have not been reconfigured will lose access to any previous configuration. Administrators will have to set up a new instance of the Azure AD Verifiable Credential service. Learn more about how to [reconfigure your tenant](verifiable-credentials-faq.md?#how-do-i-reconfigure-the-azure-ad-verifiable-credentials-service).
@@ -34,7 +37,7 @@ We are rolling out some important updates to our service that are breaking chang
34
37
Since the beginning of the Azure AD Verifiable Credentials service public preview, the service has only been available in our Azure North America region. Now, the service is also available in our Azure Europe region.
35
38
36
39
- New customers with Azure AD European tenants now have their Verifiable Credentials data located and processed in our Azure Europe region.
37
-
- Customers with Azure AD tenants setup in Europe who start using the Azure AD Verifiable Credentials service after February 15, 2022, have their data automatically processed in Europe and don't need to take any further actions.
40
+
- Customers with Azure AD tenants setup in Europe who start using the Azure AD Verifiable Credentials service after February 15, 2022, have their data automatically processed in Europe. There's no need to take any further actions.
38
41
- Customers with Azure AD tenants setup in Europe that started using the Azure AD Verifiable Credentials service before February 15, 2022, are required to reconfigure the service on their tenants before March 31, 2022.
39
42
40
43
Take the following steps to configure the Verifiable Credentials service in Europe:
@@ -92,20 +95,20 @@ Sample contract file:
92
95
}
93
96
```
94
97
95
-
3. You have to issue new verifiable credentials using your new configuration. All verifiable credentials previously issued will continue to exist as your previous DID will remain resolvable however, they use the previous status endpoint implementation.
98
+
3. You have to issue new verifiable credentials using your new configuration. All verifiable credentials previously issued continue to exist. Your previous DID remains resolvable however, they use the previous status endpoint implementation.
96
99
97
100
>[!IMPORTANT]
98
101
> You have to reconfigure your Azure AD Verifiable Credential service instance to create your new Identity hub endpoint. You have until March 31st 2022, to schedule and manage the reconfiguration of your deployment. On March 31st, 2022 deployments that have not been reconfigured will lose access to any previous Azure AD Verifiable Credentials service configuration. Administrators will need to set up a new service instance.
99
102
100
103
### Microsoft Authenticator Android DID Generation Update
101
104
102
-
We are making protocol updates in Microsoft Authenticator to support Single Long Form DID, thus deprecating the use of pairwise. With this update your DID in Microsoft Authenticator will be used of every issuer and relaying party exchange. Holders of verifiable crendentials in Microsoft Authenticator for Android must get their verifiable credentials re-issued as any previous credentials are not going to continue working.
105
+
We are making protocol updates in Microsoft Authenticator to support Single Long Form DID, thus deprecating the use of pairwise. With this update, your DID in Microsoft Authenticator will be used of every issuer and relaying party exchange. Holders of verifiable credentials using Microsoft Authenticator for Android must get their verifiable credentials reissued as any previous credentials aren't going to continue working.
103
106
104
107
## December 2021
105
108
106
109
- We added [Postman collections](https://github.com/Azure-Samples/active-directory-verifiable-credentials/tree/main/Postman) to our samples as a quick start to start using the Request Service REST API.
107
110
- New sample added that demonstrates the integration of [Azure AD Verifiable Credentials with Azure AD B2C](https://github.com/Azure-Samples/active-directory-verifiable-credentials/tree/main/B2C).
108
-
-Fastrack setup sample for setting up the Azure AD Verifiable Credentials services using [PowerShell and an ARM template](https://github.com/Azure-Samples/active-directory-verifiable-credentials/tree/main/ARM).
111
+
-Sample for setting up the Azure AD Verifiable Credentials services using [PowerShell and an ARM template](https://github.com/Azure-Samples/active-directory-verifiable-credentials/tree/main/ARM).
109
112
- Sample Verifiable Credential configuration files to show sample cards for [IDToken](https://github.com/Azure-Samples/active-directory-verifiable-credentials/tree/main/CredentialFiles/IDToken), [IDTokenHit](https://github.com/Azure-Samples/active-directory-verifiable-credentials/tree/main/CredentialFiles/IDTokenHint) and [Self-attested](https://github.com/Azure-Samples/active-directory-verifiable-credentials/tree/main/CredentialFiles/IDTokenHint) claims.
110
113
111
114
## November 2021
@@ -116,10 +119,10 @@ Callback types enforcing rules so that URL endpoints for callbacks are reachable
116
119
117
120
## October 2021
118
121
119
-
You can now use [Request Service REST API](get-started-request-api.md) to build applications that can issue and verify credentials from any programming language you're using. This new REST API provides an improved abstraction layer and integration to the Azure AD Verifiable Credentials Service.
122
+
You can now use [Request Service REST API](get-started-request-api.md) to build applications that can issue and verify credentials from any programming language. This new REST API provides an improved abstraction layer and integration to the Azure AD Verifiable Credentials Service.
120
123
121
124
It's a good idea to start using the API soon, because the NodeJS SDK will be deprecated in the following months. Documentation and samples now use the Request Service REST API. For more information, see [Request Service REST API (preview)](get-started-request-api.md).
122
125
123
126
## April 2021
124
127
125
-
You can now issue [verifiable credentials](decentralized-identifier-overview.md) in Azure AD. This service is useful when you need to represent proof of employment, education, or any other claim, so that the holder of such a credential can decide when, and with whom, to share their credentials. Each credential is signed by using cryptographic keys associated with the decentralized identity that the user owns and controls.
128
+
You can now issue [verifiable credentials](decentralized-identifier-overview.md) in Azure AD. This service is useful when you need to present proof of employment, education, or any other claim. The holder of such a credential can decide when, and with whom, to share their credentials. Each credential is signed by using cryptographic keys associated with the decentralized identity that the user owns and controls.
0 commit comments