You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/verifiable-credentials-configure-tenant.md
+21-5Lines changed: 21 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: barclayn
7
7
manager: karenhoran
8
8
ms.author: barclayn
9
9
ms.topic: tutorial
10
-
ms.date: 10/08/2021
10
+
ms.date: 02/24/2022
11
11
# Customer intent: As an enterprise, we want to enable customers to manage information about themselves by using verifiable credentials.
12
12
13
13
---
@@ -82,6 +82,8 @@ After you create your key vault, Verifiable Credentials generates a set of keys
82
82
83
83
A Key Vault [access policy](../../key-vault/general/assign-access-policy.md) defines whether a specified security principal can perform operations on Key Vault secrets and keys. Set access policies in your key vault for both the administrator account of the Azure AD Verifiable Credentials service, and for the Request Service API principal that you created.
84
84
85
+
### Set access policies for the Verifiable Credentials Admin user
86
+
85
87
1. In the [Azure portal](https://portal.azure.com/), go to the key vault you use for this tutorial.
86
88
87
89
1. Under **Settings**, select **Access policies**.
@@ -94,20 +96,34 @@ A Key Vault [access policy](../../key-vault/general/assign-access-policy.md) def
94
96
95
97
1. To save the changes, select **Save**.
96
98
99
+
### Set access policies for the Verifiable Credentials Issuer and Request services
100
+
97
101
1. Select **+ Add Access Policy** to add permission to the service principal of the **Verifiable Credential Request Service**.
98
102
99
103
1. In **Add access policy**:
100
104
101
105
1. For **Key permissions**, select **Get** and **Sign**.
102
106
103
-
1. For **Secret permissions**, select **Get**.
104
-
105
107
1. For **Select principal**, select **Verifiable Credential Request Service**.
106
108
107
109
1. Select **Add**.
108
110
109
-

111
+
:::image type="content" source="media/verifiable-credentials-configure-tenant/request-service-key-vault-access-policy.png" alt-text="Screenshot that demonstrates how to add an access policy for the Verifiable Credential Request Service." :::
112
+
113
+
The access policies for the Verifiable Credentials Issuer service should be added automatically. In the event that **Verifiable Credential Issuer Service** doesn't appear in the list of access policies, take the following steps to manually add access policies to the service.
114
+
115
+
1. Select **+ Add Access Policy** to add permission to the service principal of the **Verifiable Credential Issuer Service**.
116
+
117
+
1. In **Add access policy**:
118
+
119
+
1. For **Key permissions**, select **Get** and **Sign**.
120
+
121
+
1. For **Select principal**, select **Verifiable Credential Issuer Service**.
122
+
123
+
1. Select **Add**.
110
124
125
+
:::image type="content" source="media/verifiable-credentials-configure-tenant/issuer-service-key-vault-access-policy.png" alt-text="Screenshot that demonstrates how to add an access policy for the Verifiable Credential Request Service." :::
126
+
111
127
1. Select **Save** to save the new policy you created.
112
128
113
129
## Register an application in Azure AD
@@ -180,4 +196,4 @@ To set up Azure AD Verifiable Credentials, follow these steps:
180
196
## Next steps
181
197
182
198
- [Learn how to issue Azure AD Verifiable Credentials from a web application](verifiable-credentials-configure-issuer.md).
183
-
- [Learn how to verify Azure AD Verifiable Credentials](verifiable-credentials-configure-verifier.md).
199
+
- [Learn how to verify Azure AD Verifiable Credentials](verifiable-credentials-configure-verifier.md).
0 commit comments