Skip to content

Commit 45067fb

Browse files
authored
Merge pull request #228379 from OWinfreyATL/owinfreyATL-id-settings-config
updates include file verified id settings config
2 parents fdc13bd + a8d7782 commit 45067fb

File tree

3 files changed

+16
-1
lines changed

3 files changed

+16
-1
lines changed

includes/active-directory-entitlement-management-request-policy.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -204,7 +204,22 @@ For example, if you listed Alice and Bob as the First Approver(s), list Carol an
204204

205205
![Screenshot that shows the option for enabling new requests and assignments.](./media/active-directory-entitlement-management-request-policy/enable-requests.png)
206206

207-
1. Select **Next**.
207+
1. Go to the [verified ID requirement section](#add-a-verified-id-requirement-preview) section to learn how to add a verified ID requirement to your access package. Otherwise, select **Next**.
208+
209+
## Add a Verified ID requirement (Preview)
210+
211+
> [!NOTE]
212+
> You will need to have a Global administrator role to add verified ID requirements to an access package. Identity Governance administrator, User administrator, Catalog owner, or Access package manager will be able to add verified ID requirements to access packages soon.
213+
214+
Follow these steps if you want to add a verified ID requirement to your access package policy. Users requesting access to the access package will need to present the required verified IDs before successfully submitting their request. You can learn more about how to configure your tenant with the Microsoft Entra Verified ID service [here](../articles/active-directory/verifiable-credentials/decentralized-identifier-overview.md).
215+
216+
1. Click + Add issuer and select an issuer from the Entra Verified ID network. If you want to issue your own credentials to users, you can find instructions on how to do that [here](../articles/active-directory/verifiable-credentials/verifiable-credentials-configure-issuer.md).
217+
:::image type="content" source="media/active-directory-entitlement-management-request-policy/access-package-select-issuer.png" alt-text="Access package select issuer.":::
218+
1. Select the credential type(s) you want users to present during the request process.
219+
:::image type="content" source="media/active-directory-entitlement-management-request-policy/access-package-select-credential.png" alt-text="Select access package credential.":::
220+
> [!NOTE]
221+
> If you select multiple credential types from one issuer, users will be required to present credentials of all selected types. Similarly, if you include multiple issuers, users will be required to present credentials from each of the issuers you include in the policy. To give users the option of presenting different credentials from various issuers, configure separate policies for each issuer/credential type you’ll accept.
222+
1. Click Add to add the verified ID requirement to the access package policy.
208223

209224
## Add Requestor information to an access package
210225

239 KB
Loading
239 KB
Loading

0 commit comments

Comments
 (0)