Skip to content

Commit 57d5c49

Browse files
committed
whats new + app access token + clarifications
1 parent 10da7b2 commit 57d5c49

File tree

3 files changed

+57
-17
lines changed

3 files changed

+57
-17
lines changed

articles/active-directory/verifiable-credentials/admin-api.md

Lines changed: 20 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,11 +24,29 @@ The Microsoft Entra Verified ID Admin API enables you to manage all aspects of t
2424
2525
## Base URL
2626

27-
The Admin API is server over HTTPS. All URLs referenced in the documentation have the following base: `https://verifiedid.did.msidentity.com`.
27+
The Admin API is server over HTTPS. All URLs referenced in the documentation have the following base: `https://verifiedid.did.msidentity.com`.
2828

2929
## Authentication
3030

31-
The API is protected through Azure Active Directory and uses OAuth2 bearer tokens. The app registration needs to have the API Permission for `Verifiable Credentials Service Admin` and then when acquiring the access token the app should use scope `6a8b4b39-c021-437c-b060-5a14a3fd65f3/full_access`. The access token must be for a user with the [global administrator](../../active-directory/roles/permissions-reference.md#global-administrator) or the [authentication policy administrator](../../active-directory/roles/permissions-reference.md#authentication-policy-administrator) role.
31+
The API is protected through Azure Active Directory and uses OAuth2 bearer tokens. The access token can be for a user or for an application.
32+
33+
### User bearer tokens
34+
35+
The app registration needs to have the API Permission for `Verifiable Credentials Service Admin` and then when acquiring the access token the app should use scope `6a8b4b39-c021-437c-b060-5a14a3fd65f3/full_access`. The access token must be for a user with the [global administrator](../../active-directory/roles/permissions-reference.md#global-administrator) or the [authentication policy administrator](../../active-directory/roles/permissions-reference.md#authentication-policy-administrator) role. A user with role [global reader](../../active-directory/roles/permissions-reference.md#global-reader) will be able to perform read-only API calls.
36+
37+
### Application bearer tokens
38+
39+
The `Verifiable Credentials Service Admin` service supports the following application permissions.
40+
41+
| Permission | Description |
42+
| ---------- | ----------- |
43+
| VerifiableCredential.Authority.ReadWrite | Permission to read/write authority object(s) |
44+
| VerifiableCredential.Contract.ReadWrite | Permission to read/write contract object(s) |
45+
| VerifiableCredential.Credential.Search | Permission to search for a credential to revoke |
46+
| VerifiableCredential.Credential.Revoke | Permission to [revoke a previously issued credential](how-to-issuer-revoke.md) |
47+
| VerifiableCredential.Network.Read | Permission to read entries from the [Verified ID Network](vc-network-api.md) |
48+
49+
The app registration needs to have the API Permission for `Verifiable Credentials Service Admin` and permissions required from the above table. When acquiring the access token, via the [client credentials flow](../../active-directory/develop/v2-oauth2-client-creds-grant-flow.md), the app should use scope `6a8b4b39-c021-437c-b060-5a14a3fd65f3/.default`.
3250

3351
## Onboarding
3452

articles/active-directory/verifiable-credentials/how-to-dnsbind.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ To verify domain ownership to your DID, you need to have completed the following
2626

2727
## Verify domain ownership and distribute did-configuration.json file
2828

29-
The domain you will verify ownership of to your DID is defined in the organizational settings.
29+
The domain you will verify ownership of to your DID is defined in the [overview section](verifiable-credentials-configure-tenant.md#set-up-verified-id). The domain needs to be a domain under your control and it should be in the format `https://www.example.com/`.
3030

3131
1. From the Azure portal, navigate to the VerifiedID page.
3232

@@ -36,7 +36,7 @@ The domain you will verify ownership of to your DID is defined in the organizati
3636

3737
![Screenshot of download well-known config.](media/how-to-dnsbind/verify-download.png)
3838

39-
1. Host the `did-configuration.json` file at the location specified. Example: `https://www.example.com/.well-known/did-configuration.json`
39+
1. Host the `did-configuration.json` file at the location specified. Example: If you specified domain `https://www.example.com` the file need to be hosted at this URL `https://www.example.com/.well-known/did-configuration.json`.
4040
There can be no additional path in the URL other than the .well-known path name.
4141

4242
1. When the `did-configuration.json` is publicly available at the .well-known/did-configuration.json URL, verify it by pressing the **Refresh verification status** button.

articles/active-directory/verifiable-credentials/whats-new.md

Lines changed: 35 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,27 @@ ms.author: barclayn
2020

2121
This article lists the latest features, improvements, and changes in the Microsoft Entra Verified ID service.
2222

23+
## March 2023
24+
25+
- Admin API now supports [application access tokens](admin-api.md#authentication) and in addition to user bearer tokens.
26+
- Introducing the Entra Verified ID [Services partner gallery](services-partners.md) listing trusted partners that can help accelerate your Entra Verified ID implementation.
27+
- Improvements to our Administrator onboarding experience in the [Admin portal](verifiable-credentials-configure-tenant.md#register-decentralized-id-and-verify-domain-ownership) based on customer feedback.
28+
- Updates to our samples in [github](https://github.com/Azure-Samples/active-directory-verifiable-credentials) showcasing how to dynamically display VC claims.
29+
30+
## February 2023
31+
32+
- *Public preview* - Entitlement Management customers can now create access packages that leverage Entra Verified ID [learn more](https://learn.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-verified-id-settings)
33+
34+
- The Request Service API can now do revocation check for verifiable credentials presented that was issued with [StatusList2021](https://w3c.github.io/vc-status-list-2021/) or the [RevocationList2020](https://w3c-ccg.github.io/vc-status-rl-2020/) status list types. Entra Verified ID itself still issues verifiable credentials with the RevocationList2021Status type.
35+
36+
## January 2023
37+
38+
- Microsoft Authenticator user experience improvements on pin code, verifiable credential overview and verifiable credentials requirements.
39+
40+
## November 2022
41+
42+
- Entra Verified ID now reports events in the [Azure AD Audit Log](https://learn.microsoft.com/azure/active-directory/reports-monitoring/concept-audit-logs). Only management changes made via the Admin API are currently logged. Issuance or presentation of verifiable credentials are not reported in the audit log. The log entries will have a service name of `Verified ID` and the activity will be `Create authority`, `Update contract`, etc.
43+
2344
## September 2022
2445

2546
- The Request Service API now have [granular app permissions](verifiable-credentials-configure-tenant.md?#grant-permissions-to-get-access-tokens) and you can grant **VerifiableCredential.Create.IssueRequest** and **VerifiableCredential.Create.PresentRequest** separately to segregate duties of issuance and presentation to separate application.
@@ -30,7 +51,8 @@ This article lists the latest features, improvements, and changes in the Microso
3051

3152
Microsoft Entra Verified ID is now generally available (GA) as the new member of the Microsoft Entra portfolio! [read more](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-verified-id-now-generally-available/ba-p/3295506)
3253

33-
### Known issues
54+
### Known issues
55+
3456
- Tenants that [opt-out](verifiable-credentials-faq.md?#how-do-i-reset-the-entra-verified-id-service) without issuing any Verifiable Credential will get a `Specified resource does not exist` error from the Admin API and/or the Entra portal. A fix for this issue should be available by August 20, 2022.
3557

3658
## July 2022
@@ -43,9 +65,9 @@ Microsoft Entra Verified ID is now generally available (GA) as the new member of
4365
- For migrating your Azure Storage based credentials to become Managed Credentials there's a PowerShell script in the [GitHub samples repo](https://github.com/Azure-Samples/active-directory-verifiable-credentials/tree/contractmigration/scripts/contractmigration) for the task.
4466

4567
- We also made the following updates to our Plan and design docs:
46-
- (updated) [architecture planning overview](introduction-to-verifiable-credentials-architecture.md).
47-
- (updated) [Plan your issuance solution](plan-issuance-solution.md).
48-
- (updated) [Plan your verification solution](plan-verification-solution.md).
68+
- (updated) [architecture planning overview](introduction-to-verifiable-credentials-architecture.md).
69+
- (updated) [Plan your issuance solution](plan-issuance-solution.md).
70+
- (updated) [Plan your verification solution](plan-verification-solution.md).
4971

5072
## June 2022
5173

@@ -59,12 +81,12 @@ Microsoft Entra Verified ID is now generally available (GA) as the new member of
5981
> You need to migrate your Azure Storage based credentials to become Managed Credentials. We'll soon provide migration instructions.
6082
6183
- We made the following updates to our docs:
62-
- (new) [Current supported open standards for Microsoft Entra Verified ID](verifiable-credentials-standards.md).
63-
- (new) [How to create verifiable credentials for ID token hint](how-to-use-quickstart.md).
64-
- (new) [How to create verifiable credentials for ID token](how-to-use-quickstart-idtoken.md).
65-
- (new) [How to create verifiable credentials for self-asserted claims](how-to-use-quickstart-selfissued.md).
66-
- (new) [Rules and Display definition model specification](rules-and-display-definitions-model.md).
67-
- (new) [Creating an Azure AD tenant for development](how-to-create-a-free-developer-account.md).
84+
- (new) [Current supported open standards for Microsoft Entra Verified ID](verifiable-credentials-standards.md).
85+
- (new) [How to create verifiable credentials for ID token hint](how-to-use-quickstart.md).
86+
- (new) [How to create verifiable credentials for ID token](how-to-use-quickstart-idtoken.md).
87+
- (new) [How to create verifiable credentials for self-asserted claims](how-to-use-quickstart-selfissued.md).
88+
- (new) [Rules and Display definition model specification](rules-and-display-definitions-model.md).
89+
- (new) [Creating an Azure AD tenant for development](how-to-create-a-free-developer-account.md).
6890

6991
## May 2022
7092

@@ -104,7 +126,7 @@ Since the beginning of the Microsoft Entra Verified ID service public preview, t
104126
Take the following steps to configure the Verifiable Credentials service in Europe:
105127

106128
1. [Check the location](verifiable-credentials-faq.md#how-can-i-check-my-azure-ad-tenants-region) of your Azure Active Directory to make sure is in Europe.
107-
1. [Reconfigure the Verifiable Credentials service](verifiable-credentials-faq.md?#how-do-i-reset-the-entra-verified-id-service) in your tenant.
129+
1. [Reconfigure the Verifiable Credentials service](verifiable-credentials-faq.md?#how-do-i-reset-the-entra-verified-id-service) in your tenant.
108130

109131
>[!IMPORTANT]
110132
> On March 31st, 2022 European tenants that have not been [reconfigured](verifiable-credentials-faq.md?#how-do-i-reset-the-entra-verified-id-service) in Europe will lose access to any previous configuration and will require to configure a new instance of the Azure AD Verifiable Credential service.
@@ -133,7 +155,7 @@ To uptake this feature follow the next steps:
133155

134156
Sample contract file:
135157

136-
``` json
158+
``` json
137159
{
138160
"attestations": {
139161
"idTokens": [
@@ -157,7 +179,7 @@ Sample contract file:
157179
}
158180
```
159181

160-
3. You have to issue new verifiable credentials using your new configuration. All verifiable credentials previously issued continue to exist. Your previous DID remains resolvable however, they use the previous status endpoint implementation.
182+
1. You have to issue new verifiable credentials using your new configuration. All verifiable credentials previously issued continue to exist. Your previous DID remains resolvable however, they use the previous status endpoint implementation.
161183

162184
>[!IMPORTANT]
163185
> You have to reconfigure your Azure AD Verifiable Credential service instance to create your new Identity hub endpoint. You have until March 31st 2022, to schedule and manage the reconfiguration of your deployment. On March 31st, 2022 deployments that have not been reconfigured will lose access to any previous Microsoft Entra Verified ID service configuration. Administrators will need to set up a new service instance.

0 commit comments

Comments
 (0)