Skip to content

Commit 1b379d3

Browse files
authored
Merge pull request #240837 from cljung/main
removing misleading text, adding missing req
2 parents 3cd862b + 372f494 commit 1b379d3

File tree

6 files changed

+11
-9
lines changed

6 files changed

+11
-9
lines changed

articles/active-directory/verifiable-credentials/admin-api.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -986,9 +986,8 @@ example:
986986

987987
| Property | Type | Description |
988988
| -------- | -------- | -------- |
989-
|`uri`| string (uri) | uri of the logo (optional if image is specified) |
989+
|`uri`| string (uri) | uri of the logo |
990990
|`description` | string | the description of the logo |
991-
|`image` | string | the base-64 encoded image (optional if uri is specified) |
992991

993992
#### displayConsent type
994993

articles/active-directory/verifiable-credentials/issuance-request-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ The payload contains the following properties:
108108
| `registration` | [RequestRegistration](#requestregistration-type)| Provides information about the issuer that can be displayed in the authenticator app. |
109109
| `type` | string | The verifiable credential type. Should match the type as defined in the verifiable credential manifest. For example: `VerifiedCredentialExpert`. For more information, see [Create the verified credential expert card in Azure](verifiable-credentials-configure-issuer.md). |
110110
| `manifest` | string| The URL of the verifiable credential manifest document. For more information, see [Gather credentials and environment details to set up your sample application](verifiable-credentials-configure-issuer.md).|
111-
| `claims` | string| Optional. Used for the `ID token hint` flow to include a collection of assertions made about the subject in the verifiable credential. For PIN code flow, it's important that you provide the user's first name and last name. For more information, see [Verifiable credential names](verifiable-credentials-configure-issuer.md#verifiable-credential-names). |
111+
| `claims` | string| Optional. Can only be used for the [ID token hint](rules-and-display-definitions-model.md#idtokenhintattestation-type) attestation flow to include a collection of assertions made about the subject in the verifiable credential. |
112112
| `pin` | [PIN](#pin-type)| Optional. PIN code can only be used with the [ID token hint](rules-and-display-definitions-model.md#idtokenhintattestation-type) attestation flow. A PIN number to provide extra security during issuance. You generate a PIN code, and present it to the user in your app. The user must provide the PIN code that you generated. |
113113

114114
There are currently four claims attestation types that you can send in the payload. Microsoft Entra Verified ID uses four ways to insert claims into a verifiable credential and attest to that information with the issuer's DID. The following are the four types:
Loading

articles/active-directory/verifiable-credentials/rules-and-display-definitions-model.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -154,9 +154,8 @@ When you want the user to enter information themselves. This type is also called
154154

155155
| Property | Type | Description |
156156
| -------- | -------- | -------- |
157-
|`uri`| string (url) | url of the logo (optional if image is specified) |
157+
|`uri`| string (url) | url of the logo. |
158158
|`description` | string | the description of the logo |
159-
|`image` | string | the base-64 encoded image (optional if url is specified) |
160159

161160
### displayConsent type
162161

articles/active-directory/verifiable-credentials/verifiable-credentials-configure-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ After you create your key vault, Verifiable Credentials generates a set of keys
5959

6060
1. In **Add access policies**, under **USER**, select the account you use to follow this tutorial.
6161

62-
1. For **Key permissions**, verify that the following permissions are selected: **Create**, **Delete**, and **Sign**. By default, **Create** and **Delete** are already enabled. **Sign** should be the only key permission you need to update.
62+
1. For **Key permissions**, verify that the following permissions are selected: **Get**, **Create**, **Delete**, and **Sign**. By default, **Create** and **Delete** are already enabled. **Sign** should be the only key permission you need to update.
6363

6464
:::image type="content" source="media/verifiable-credentials-configure-tenant/set-key-vault-admin-access-policy.png" alt-text="Screenshot that shows how to configure the admin access policy." border="false":::
6565

articles/active-directory/verifiable-credentials/whats-new.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,10 @@ ms.author: barclayn
2020

2121
This article lists the latest features, improvements, and changes in the Microsoft Entra Verified ID service.
2222

23+
## May 2023
24+
25+
- Wallet Library was announced at Build 2023 in session [Reduce fraud and improve engagement using Digital Wallets](https://build.microsoft.com/en-US/sessions/4ca41843-1b3f-4ee6-955e-9e2326733be8). The Wallet Library enables customers to add verifiable credentials technology to their own mobile apps. The libraries are available for [Android](https://github.com/microsoft/entra-verifiedid-wallet-library-android/tree/dev) and [iOS](https://github.com/microsoft/entra-verifiedid-wallet-library-ios/tree/dev).
26+
2327
## March 2023
2428

2529
- Admin API now supports [application access tokens](admin-api.md#authentication) and in addition to user bearer tokens.
@@ -71,7 +75,7 @@ Microsoft Entra Verified ID is now generally available (GA) as the new member of
7175

7276
## June 2022
7377

74-
- We're adding support for the [did:web](https://w3c-ccg.github.io/did-method-web/) method. Any new tenant that starts using the Verifiable Credentials Service after June 14, 2022 will have Web as a new, default, trust system when [onboarding](verifiable-credentials-configure-tenant.md#set-up-verified-id). VC Administrators can still choose to use ION when setting a tenant. If you want to use did:web instead of ION or viceversa, you'll need to [reconfigure your tenant](verifiable-credentials-faq.md?#how-do-i-reset-the-entra-verified-id-service).
78+
- We're adding support for the [did:web](https://w3c-ccg.github.io/did-method-web/) method. Any new tenant that starts using the Verifiable Credentials Service after June 14, 2022 will have Web as a new, default, trust system when [onboarding](verifiable-credentials-configure-tenant.md#set-up-verified-id). VC Administrators can still choose to use ION when setting a tenant. If you want to use did:web instead of ION or viceversa, you need to [reconfigure your tenant](verifiable-credentials-faq.md?#how-do-i-reset-the-entra-verified-id-service).
7579
- We're rolling out several features to improve the overall experience of creating verifiable credentials in the Entra Verified ID platform:
7680
- Introducing Managed Credentials, which are verifiable credentials that no longer use Azure Storage to store the [display & rules JSON definitions](rules-and-display-definitions-model.md). Their display and rule definitions are different from earlier versions.
7781
- Create Managed Credentials using the [new quickstart experience](how-to-use-quickstart.md).
@@ -140,7 +144,7 @@ Applications that use the Microsoft Entra Verified ID service must use the Reque
140144
| Europe | `https://beta.eu.did.msidentity.com/v1.0/{tenantID}/verifiablecredentials/request` |
141145
| Non-EU | `https://beta.did.msidentity.com/v1.0/{tenantID}/verifiablecredentials/request` |
142146

143-
To confirm which endpoint you should use, we recommend checking your Azure AD tenant's region as described above. If the Azure AD tenant is in the EU, you should use the Europe endpoint.
147+
To confirm which endpoint you should use, we recommend checking your Azure AD tenant's region as described previously. If the Azure AD tenant is in the EU, you should use the Europe endpoint.
144148

145149
### Credential Revocation with Enhanced Privacy
146150

@@ -186,7 +190,7 @@ Sample contract file:
186190
187191
### Microsoft Authenticator DID Generation Update
188192

189-
We're making protocol updates in Microsoft Authenticator to support Single Long Form DID, thus deprecating the use of pairwise. With this update, your DID in Microsoft Authenticator will be used of every issuer and relaying party exchange. Holders of verifiable credentials using Microsoft Authenticator must get their verifiable credentials reissued as any previous credentials aren't going to continue working.
193+
We're making protocol updates in Microsoft Authenticator to support Single Long Form DID, thus deprecating the use of pairwise. With this update, your DID in Microsoft Authenticator is used for every issuer and relaying party exchange. Holders of verifiable credentials using Microsoft Authenticator must get their verifiable credentials reissued as any previous credentials aren't going to continue working.
190194

191195
## December 2021
192196

0 commit comments

Comments
 (0)