Skip to content

Commit 3db87c9

Browse files
committed
replacing images
1 parent 054eaa3 commit 3db87c9

File tree

4 files changed

+21
-5
lines changed

4 files changed

+21
-5
lines changed
Loading
Loading

articles/active-directory/verifiable-credentials/verifiable-credentials-configure-tenant.md

Lines changed: 21 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: barclayn
77
manager: karenhoran
88
ms.author: barclayn
99
ms.topic: tutorial
10-
ms.date: 10/08/2021
10+
ms.date: 02/24/2022
1111
# Customer intent: As an enterprise, we want to enable customers to manage information about themselves by using verifiable credentials.
1212

1313
---
@@ -82,6 +82,8 @@ After you create your key vault, Verifiable Credentials generates a set of keys
8282
8383
A Key Vault [access policy](../../key-vault/general/assign-access-policy.md) defines whether a specified security principal can perform operations on Key Vault secrets and keys. Set access policies in your key vault for both the administrator account of the Azure AD Verifiable Credentials service, and for the Request Service API principal that you created.
8484
85+
### Set access policies for the Verifiable Credentials Admin user
86+
8587
1. In the [Azure portal](https://portal.azure.com/), go to the key vault you use for this tutorial.
8688
8789
1. Under **Settings**, select **Access policies**.
@@ -94,20 +96,34 @@ A Key Vault [access policy](../../key-vault/general/assign-access-policy.md) def
9496
9597
1. To save the changes, select **Save**.
9698
99+
### Set access policies for the Verifiable Credentials Issuer and Request services
100+
97101
1. Select **+ Add Access Policy** to add permission to the service principal of the **Verifiable Credential Request Service**.
98102
99103
1. In **Add access policy**:
100104
101105
1. For **Key permissions**, select **Get** and **Sign**.
102106
103-
1. For **Secret permissions**, select **Get**.
104-
105107
1. For **Select principal**, select **Verifiable Credential Request Service**.
106108
107109
1. Select **Add**.
108110
109-
![Screenshot that demonstrates how to add an access policy for the Verifiable Credential Request Service.](media/verifiable-credentials-configure-tenant/set-key-vault-service-principal-access-policy.png)
111+
:::image type="content" source="media/verifiable-credentials-configure-tenant/request-service-key-vault-access-policy.png" alt-text="Screenshot that demonstrates how to add an access policy for the Verifiable Credential Request Service." :::
112+
113+
The access policies for the Verifiable Credentials Issuer service should be added automatically. In the event that **Verifiable Credential Issuer Service** doesn't appear in the list of access policies, take the following steps to manually add access policies to the service.
114+
115+
1. Select **+ Add Access Policy** to add permission to the service principal of the **Verifiable Credential Issuer Service**.
116+
117+
1. In **Add access policy**:
118+
119+
1. For **Key permissions**, select **Get** and **Sign**.
120+
121+
1. For **Select principal**, select **Verifiable Credential Issuer Service**.
122+
123+
1. Select **Add**.
110124
125+
:::image type="content" source="media/verifiable-credentials-configure-tenant/issuer-service-key-vault-access-policy.png" alt-text="Screenshot that demonstrates how to add an access policy for the Verifiable Credential Request Service." :::
126+
111127
1. Select **Save** to save the new policy you created.
112128
113129
## Register an application in Azure AD
@@ -180,4 +196,4 @@ To set up Azure AD Verifiable Credentials, follow these steps:
180196
## Next steps
181197
182198
- [Learn how to issue Azure AD Verifiable Credentials from a web application](verifiable-credentials-configure-issuer.md).
183-
- [Learn how to verify Azure AD Verifiable Credentials](verifiable-credentials-configure-verifier.md).
199+
- [Learn how to verify Azure AD Verifiable Credentials](verifiable-credentials-configure-verifier.md).

0 commit comments

Comments
 (0)