You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/tutorial-create-replica-set.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -111,6 +111,7 @@ To delete a replica set, complete the following steps:
111
111
1. Choose your managed domain, such as *aaddscontoso.com*.
112
112
1. On the left-hand side, select **Replica sets**. From the list of replica sets, select the **...** context menu next to the replica set you want to delete.
113
113
1. Select **Delete** from the context menu, then confirm you want to delete the replica set.
114
+
1. In the Azure ADDS management VM, access the DNS console and manually delete DNS records for the domain controllers from the deleted replica set.
114
115
115
116
> [!NOTE]
116
117
> Replica set deletion may be a time-consuming operation.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/scenario-web-app-sign-user-app-configuration.md
-3Lines changed: 0 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -307,9 +307,6 @@ In the code above:
307
307
308
308
You can find more details about how Microsoft.Identity.Web enables you to create web apps in<https://aka.ms/ms-id-web/webapp>
309
309
310
-
> [!WARNING]
311
-
> Currently, Microsoft.Identity.Web does not support the scenario of **Individual User Accounts** (storing user accounts in-app) when using Azure ADasand external login provider. For details, see: [AzureAD/microsoft-identity-web#133](https://github.com/AzureAD/microsoft-identity-web/issues/133)
312
-
313
310
# [ASP.NET](#tab/aspnet)
314
311
315
312
The code related to authentication in an ASP.NET web app and web APIs is located in the [App_Start/Startup.Auth.cs](https://github.com/Azure-Samples/ms-identity-aspnet-webapp-openidconnect/blob/a2da310539aa613b77da1f9e1c17585311ab22b7/WebApp/App_Start/Startup.Auth.cs#L17-L61) file.
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-oracle-jde-easy-button.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ The secure hybrid access solution for this scenario is made up of several compon
43
43
44
44
**Azure AD:** Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verification of user credentials, Conditional Access (CA), and SSO to the BIG-IP.
45
45
46
-
**BIG-IP APM:** Reverse proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP before performing header-based SSO to the Oracle service.
46
+
**BIG-IP:** Reverse proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP before performing header-based SSO to the Oracle service.
47
47
48
48
SHA for this scenario supports both SP and IdP initiated flows. The following image illustrates the SP initiated flow.
49
49
@@ -146,9 +146,9 @@ Initiate the **Easy Button** configuration to set up a SAML Service Provider (SP
146
146
147
147
### Configuration Properties
148
148
149
-
The **Configuration Properties** tab creates up a new application config and SSO object. Consider **Azure Service Account Details** section to be the client application you registered in your Azure AD tenant earlier. These settings allow a BIG-IP to programmatically register a SAML application directly in your tenant, along with the properties you would normally configure manually. Easy Button does this for every BIG-IP APM service being enabled for SHA.
149
+
The **Configuration Properties** tab creates a new application config and SSO object. Consider **Azure Service Account Details** section to be the client application you registered in your Azure AD tenant earlier. These settings allow a BIG-IP to programmatically register a SAML application directly in your tenant, along with the properties you would normally configure manually. Easy Button does this for every BIG-IP APM service being enabled for SHA.
150
150
151
-
Some of these are global settings so can be re-used for publishing more applications, further reducing deployment time and effort.
151
+
Some of these are global settings can be re-used for publishing more applications, further reducing deployment time and effort.
152
152
153
153
1. Provide a unique **Configuration Name** that enables an admin to easily distinguish between Easy Button configurations
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/verifiable-credentials-configure-tenant.md
+23-7Lines changed: 23 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: barclayn
7
7
manager: karenhoran
8
8
ms.author: barclayn
9
9
ms.topic: tutorial
10
-
ms.date: 10/08/2021
10
+
ms.date: 02/24/2022
11
11
# Customer intent: As an enterprise, we want to enable customers to manage information about themselves by using verifiable credentials.
12
12
13
13
---
@@ -31,7 +31,7 @@ The following diagram illustrates the Azure AD Verifiable Credentials architectu
31
31
32
32

33
33
34
-
See a [video walkthrough](https://www.youtube.com/watch?v=8jqjHjQo-3c)of setting up the Azure AD Verifiable Credential service, including all prerequisites, like Azure AD and an Azure subscription.
34
+
See a [video walkthrough](https://www.youtube.com/watch?v=8jqjHjQo-3c)going over the setup of the Azure AD Verifiable Credential service.
35
35
36
36
## Prerequisites
37
37
@@ -82,6 +82,8 @@ After you create your key vault, Verifiable Credentials generates a set of keys
82
82
83
83
A Key Vault [access policy](../../key-vault/general/assign-access-policy.md) defines whether a specified security principal can perform operations on Key Vault secrets and keys. Set access policies in your key vault for both the administrator account of the Azure AD Verifiable Credentials service, and for the Request Service API principal that you created.
84
84
85
+
### Set access policies for the Verifiable Credentials Admin user
86
+
85
87
1. In the [Azure portal](https://portal.azure.com/), go to the key vault you use for this tutorial.
86
88
87
89
1. Under **Settings**, select **Access policies**.
@@ -94,20 +96,34 @@ A Key Vault [access policy](../../key-vault/general/assign-access-policy.md) def
94
96
95
97
1. To save the changes, select **Save**.
96
98
99
+
### Set access policies for the Verifiable Credentials Issuer and Request services
100
+
97
101
1. Select **+ Add Access Policy** to add permission to the service principal of the **Verifiable Credential Request Service**.
98
102
99
103
1. In **Add access policy**:
100
104
101
105
1. For **Key permissions**, select **Get** and **Sign**.
102
106
103
-
1. For **Secret permissions**, select **Get**.
104
-
105
107
1. For **Select principal**, select **Verifiable Credential Request Service**.
106
108
107
109
1. Select **Add**.
108
110
109
-

111
+
:::image type="content" source="media/verifiable-credentials-configure-tenant/request-service-key-vault-access-policy.png" alt-text="Screenshot that demonstrates how to add an access policy for the Verifiable Credential Issuer Service." :::
112
+
113
+
The access policies for the Verifiable Credentials Issuer service should be added automatically. If the **Verifiable Credential Issuer Service** doesn't appear in the list of access policies, take the following steps to manually add access policies to the service.
114
+
115
+
1. Select **+ Add Access Policy** to add permission to the service principal of the **Verifiable Credential Issuer Service**.
116
+
117
+
1. In **Add access policy**:
118
+
119
+
1. For **Key permissions**, select **Get** and **Sign**.
120
+
121
+
1. For **Select principal**, select **Verifiable Credential Issuer Service**.
122
+
123
+
1. Select **Add**.
110
124
125
+
:::image type="content" source="media/verifiable-credentials-configure-tenant/issuer-service-key-vault-access-policy.png" alt-text="Screenshot that demonstrates how to add an access policy for the Verifiable Credential Request Service." :::
126
+
111
127
1. Select **Save** to save the new policy you created.
112
128
113
129
## Register an application in Azure AD
@@ -166,7 +182,7 @@ To set up Azure AD Verifiable Credentials, follow these steps:
166
182
167
183
1. **Organization name**: Enter a name to reference your business within Verifiable Credentials. Your customers don't see this name.
168
184
169
-
1. **Domain**: Enter a domain that's added to a service endpoint in your decentralized identity (DID) document. The domain is what binds your DID to something tangible that the user might know about your business. Microsoft Authenticator and other digital wallets use this information to validate that your DID is linked to your domain. If the wallet can verify the DID, it displays a verified symbol. If the wallet can't verify the DID, it informs the user that the credential was issued by an organization it couldn't validate.
185
+
1. **Domain**: Enter a domain that's added to a service endpoint in your decentralized identity (DID) document. The domain is what binds your DID to something tangible that the user might know about your business. Microsoft Authenticator and other digital wallets use this information to validate that your DID is linked to your domain. If the wallet can verify the DID, it displays a verified symbol. If the wallet can't verify the DID, it informs the user that the credential was issued by an organization it couldn't validate.
170
186
171
187
>[!IMPORTANT]
172
188
> The domain can't be a redirect. Otherwise, the DID and domain can't be linked. Make sure to use HTTPS for the domain. For example: `https://contoso.com`.
@@ -180,4 +196,4 @@ To set up Azure AD Verifiable Credentials, follow these steps:
180
196
## Next steps
181
197
182
198
- [Learn how to issue Azure AD Verifiable Credentials from a web application](verifiable-credentials-configure-issuer.md).
183
-
- [Learn how to verify Azure AD Verifiable Credentials](verifiable-credentials-configure-verifier.md).
199
+
- [Learn how to verify Azure AD Verifiable Credentials](verifiable-credentials-configure-verifier.md).
0 commit comments