You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/admin-api.md
+20-2Lines changed: 20 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,11 +24,29 @@ The Microsoft Entra Verified ID Admin API enables you to manage all aspects of t
24
24
25
25
## Base URL
26
26
27
-
The Admin API is server over HTTPS. All URLs referenced in the documentation have the following base: `https://verifiedid.did.msidentity.com`.
27
+
The Admin API is server over HTTPS. All URLs referenced in the documentation have the following base: `https://verifiedid.did.msidentity.com`.
28
28
29
29
## Authentication
30
30
31
-
The API is protected through Azure Active Directory and uses OAuth2 bearer tokens. The app registration needs to have the API Permission for `Verifiable Credentials Service Admin` and then when acquiring the access token the app should use scope `6a8b4b39-c021-437c-b060-5a14a3fd65f3/full_access`. The access token must be for a user with the [global administrator](../../active-directory/roles/permissions-reference.md#global-administrator) or the [authentication policy administrator](../../active-directory/roles/permissions-reference.md#authentication-policy-administrator) role.
31
+
The API is protected through Azure Active Directory and uses OAuth2 bearer tokens. The access token can be for a user or for an application.
32
+
33
+
### User bearer tokens
34
+
35
+
The app registration needs to have the API Permission for `Verifiable Credentials Service Admin` and then when acquiring the access token the app should use scope `6a8b4b39-c021-437c-b060-5a14a3fd65f3/full_access`. The access token must be for a user with the [global administrator](../../active-directory/roles/permissions-reference.md#global-administrator) or the [authentication policy administrator](../../active-directory/roles/permissions-reference.md#authentication-policy-administrator) role. A user with role [global reader](../../active-directory/roles/permissions-reference.md#global-reader) will be able to perform read-only API calls.
36
+
37
+
### Application bearer tokens
38
+
39
+
The `Verifiable Credentials Service Admin` service supports the following application permissions.
40
+
41
+
| Permission | Description |
42
+
| ---------- | ----------- |
43
+
| VerifiableCredential.Authority.ReadWrite | Permission to read/write authority object(s) |
44
+
| VerifiableCredential.Contract.ReadWrite | Permission to read/write contract object(s) |
45
+
| VerifiableCredential.Credential.Search | Permission to search for a credential to revoke |
46
+
| VerifiableCredential.Credential.Revoke | Permission to [revoke a previously issued credential](how-to-issuer-revoke.md)|
47
+
| VerifiableCredential.Network.Read | Permission to read entries from the [Verified ID Network](vc-network-api.md)|
48
+
49
+
The app registration needs to have the API Permission for `Verifiable Credentials Service Admin` and permissions required from the above table. When acquiring the access token, via the [client credentials flow](../../active-directory/develop/v2-oauth2-client-creds-grant-flow.md), the app should use scope `6a8b4b39-c021-437c-b060-5a14a3fd65f3/.default`.
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/how-to-dnsbind.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ To verify domain ownership to your DID, you need to have completed the following
26
26
27
27
## Verify domain ownership and distribute did-configuration.json file
28
28
29
-
The domain you will verify ownership of to your DID is defined in the organizational settings.
29
+
The domain you will verify ownership of to your DID is defined in the [overview section](verifiable-credentials-configure-tenant.md#set-up-verified-id). The domain needs to be a domain under your control and it should be in the format `https://www.example.com/`.
30
30
31
31
1. From the Azure portal, navigate to the VerifiedID page.
32
32
@@ -36,7 +36,7 @@ The domain you will verify ownership of to your DID is defined in the organizati
36
36
37
37

38
38
39
-
1. Host the `did-configuration.json` file at the location specified. Example: `https://www.example.com/.well-known/did-configuration.json`
39
+
1. Host the `did-configuration.json` file at the location specified. Example: If you specified domain `https://www.example.com` the file need to be hosted at this URL `https://www.example.com/.well-known/did-configuration.json`.
40
40
There can be no additional path in the URL other than the .well-known path name.
41
41
42
42
1. When the `did-configuration.json` is publicly available at the .well-known/did-configuration.json URL, verify it by pressing the **Refresh verification status** button.
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/whats-new.md
+35-13Lines changed: 35 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,6 +20,27 @@ ms.author: barclayn
20
20
21
21
This article lists the latest features, improvements, and changes in the Microsoft Entra Verified ID service.
22
22
23
+
## March 2023
24
+
25
+
- Admin API now supports [application access tokens](admin-api.md#authentication) and in addition to user bearer tokens.
26
+
- Introducing the Entra Verified ID [Services partner gallery](services-partners.md) listing trusted partners that can help accelerate your Entra Verified ID implementation.
27
+
- Improvements to our Administrator onboarding experience in the [Admin portal](verifiable-credentials-configure-tenant.md#register-decentralized-id-and-verify-domain-ownership) based on customer feedback.
28
+
- Updates to our samples in [github](https://github.com/Azure-Samples/active-directory-verifiable-credentials) showcasing how to dynamically display VC claims.
29
+
30
+
## February 2023
31
+
32
+
-*Public preview* - Entitlement Management customers can now create access packages that leverage Entra Verified ID [learn more](https://learn.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-verified-id-settings)
33
+
34
+
- The Request Service API can now do revocation check for verifiable credentials presented that was issued with [StatusList2021](https://w3c.github.io/vc-status-list-2021/) or the [RevocationList2020](https://w3c-ccg.github.io/vc-status-rl-2020/) status list types. Entra Verified ID itself still issues verifiable credentials with the RevocationList2021Status type.
35
+
36
+
## January 2023
37
+
38
+
- Microsoft Authenticator user experience improvements on pin code, verifiable credential overview and verifiable credentials requirements.
39
+
40
+
## November 2022
41
+
42
+
- Entra Verified ID now reports events in the [Azure AD Audit Log](https://learn.microsoft.com/azure/active-directory/reports-monitoring/concept-audit-logs). Only management changes made via the Admin API are currently logged. Issuance or presentation of verifiable credentials are not reported in the audit log. The log entries will have a service name of `Verified ID` and the activity will be `Create authority`, `Update contract`, etc.
43
+
23
44
## September 2022
24
45
25
46
- The Request Service API now have [granular app permissions](verifiable-credentials-configure-tenant.md?#grant-permissions-to-get-access-tokens) and you can grant **VerifiableCredential.Create.IssueRequest** and **VerifiableCredential.Create.PresentRequest** separately to segregate duties of issuance and presentation to separate application.
@@ -30,7 +51,8 @@ This article lists the latest features, improvements, and changes in the Microso
30
51
31
52
Microsoft Entra Verified ID is now generally available (GA) as the new member of the Microsoft Entra portfolio! [read more](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-verified-id-now-generally-available/ba-p/3295506)
32
53
33
-
### Known issues
54
+
### Known issues
55
+
34
56
- Tenants that [opt-out](verifiable-credentials-faq.md?#how-do-i-reset-the-entra-verified-id-service) without issuing any Verifiable Credential will get a `Specified resource does not exist` error from the Admin API and/or the Entra portal. A fix for this issue should be available by August 20, 2022.
35
57
36
58
## July 2022
@@ -43,9 +65,9 @@ Microsoft Entra Verified ID is now generally available (GA) as the new member of
43
65
- For migrating your Azure Storage based credentials to become Managed Credentials there's a PowerShell script in the [GitHub samples repo](https://github.com/Azure-Samples/active-directory-verifiable-credentials/tree/contractmigration/scripts/contractmigration) for the task.
44
66
45
67
- We also made the following updates to our Plan and design docs:
- (updated) [Plan your issuance solution](plan-issuance-solution.md).
70
+
- (updated) [Plan your verification solution](plan-verification-solution.md).
49
71
50
72
## June 2022
51
73
@@ -59,12 +81,12 @@ Microsoft Entra Verified ID is now generally available (GA) as the new member of
59
81
> You need to migrate your Azure Storage based credentials to become Managed Credentials. We'll soon provide migration instructions.
60
82
61
83
- We made the following updates to our docs:
62
-
- (new) [Current supported open standards for Microsoft Entra Verified ID](verifiable-credentials-standards.md).
63
-
- (new) [How to create verifiable credentials for ID token hint](how-to-use-quickstart.md).
64
-
- (new) [How to create verifiable credentials for ID token](how-to-use-quickstart-idtoken.md).
65
-
- (new) [How to create verifiable credentials for self-asserted claims](how-to-use-quickstart-selfissued.md).
66
-
- (new) [Rules and Display definition model specification](rules-and-display-definitions-model.md).
67
-
- (new) [Creating an Azure AD tenant for development](how-to-create-a-free-developer-account.md).
84
+
- (new) [Current supported open standards for Microsoft Entra Verified ID](verifiable-credentials-standards.md).
85
+
- (new) [How to create verifiable credentials for ID token hint](how-to-use-quickstart.md).
86
+
- (new) [How to create verifiable credentials for ID token](how-to-use-quickstart-idtoken.md).
87
+
- (new) [How to create verifiable credentials for self-asserted claims](how-to-use-quickstart-selfissued.md).
88
+
- (new) [Rules and Display definition model specification](rules-and-display-definitions-model.md).
89
+
- (new) [Creating an Azure AD tenant for development](how-to-create-a-free-developer-account.md).
68
90
69
91
## May 2022
70
92
@@ -104,7 +126,7 @@ Since the beginning of the Microsoft Entra Verified ID service public preview, t
104
126
Take the following steps to configure the Verifiable Credentials service in Europe:
105
127
106
128
1.[Check the location](verifiable-credentials-faq.md#how-can-i-check-my-azure-ad-tenants-region) of your Azure Active Directory to make sure is in Europe.
107
-
1.[Reconfigure the Verifiable Credentials service](verifiable-credentials-faq.md?#how-do-i-reset-the-entra-verified-id-service) in your tenant.
129
+
1.[Reconfigure the Verifiable Credentials service](verifiable-credentials-faq.md?#how-do-i-reset-the-entra-verified-id-service) in your tenant.
108
130
109
131
>[!IMPORTANT]
110
132
> On March 31st, 2022 European tenants that have not been [reconfigured](verifiable-credentials-faq.md?#how-do-i-reset-the-entra-verified-id-service) in Europe will lose access to any previous configuration and will require to configure a new instance of the Azure AD Verifiable Credential service.
@@ -133,7 +155,7 @@ To uptake this feature follow the next steps:
133
155
134
156
Sample contract file:
135
157
136
-
```json
158
+
```json
137
159
{
138
160
"attestations": {
139
161
"idTokens": [
@@ -157,7 +179,7 @@ Sample contract file:
157
179
}
158
180
```
159
181
160
-
3. You have to issue new verifiable credentials using your new configuration. All verifiable credentials previously issued continue to exist. Your previous DID remains resolvable however, they use the previous status endpoint implementation.
182
+
1. You have to issue new verifiable credentials using your new configuration. All verifiable credentials previously issued continue to exist. Your previous DID remains resolvable however, they use the previous status endpoint implementation.
161
183
162
184
>[!IMPORTANT]
163
185
> You have to reconfigure your Azure AD Verifiable Credential service instance to create your new Identity hub endpoint. You have until March 31st 2022, to schedule and manage the reconfiguration of your deployment. On March 31st, 2022 deployments that have not been reconfigured will lose access to any previous Microsoft Entra Verified ID service configuration. Administrators will need to set up a new service instance.
0 commit comments