You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/verifiable-credentials-configure-tenant.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ The following diagram illustrates the Azure AD Verifiable Credentials architectu
31
31
32
32

33
33
34
-
See a [video walkthrough](https://www.youtube.com/watch?v=8jqjHjQo-3c)of setting up the Azure AD Verifiable Credential service, including all prerequisites, like Azure AD and an Azure subscription.
34
+
See a [video walkthrough](https://www.youtube.com/watch?v=8jqjHjQo-3c)going over the setup of the Azure AD Verifiable Credential service.
35
35
36
36
## Prerequisites
37
37
@@ -110,7 +110,7 @@ A Key Vault [access policy](../../key-vault/general/assign-access-policy.md) def
110
110
111
111
:::image type="content" source="media/verifiable-credentials-configure-tenant/request-service-key-vault-access-policy.png" alt-text="Screenshot that demonstrates how to add an access policy for the Verifiable Credential Issuer Service." :::
112
112
113
-
The access policies for the Verifiable Credentials Issuer service should be added automatically. In the event that **Verifiable Credential Issuer Service** doesn't appear in the list of access policies, take the following steps to manually add access policies to the service.
113
+
The access policies for the Verifiable Credentials Issuer service should be added automatically. If the **Verifiable Credential Issuer Service** doesn't appear in the list of access policies, take the following steps to manually add access policies to the service.
114
114
115
115
1. Select **+ Add Access Policy** to add permission to the service principal of the **Verifiable Credential Issuer Service**.
116
116
@@ -182,7 +182,7 @@ To set up Azure AD Verifiable Credentials, follow these steps:
182
182
183
183
1. **Organization name**: Enter a name to reference your business within Verifiable Credentials. Your customers don't see this name.
184
184
185
-
1. **Domain**: Enter a domain that's added to a service endpoint in your decentralized identity (DID) document. The domain is what binds your DID to something tangible that the user might know about your business. Microsoft Authenticator and other digital wallets use this information to validate that your DID is linked to your domain. If the wallet can verify the DID, it displays a verified symbol. If the wallet can't verify the DID, it informs the user that the credential was issued by an organization it couldn't validate.
185
+
1. **Domain**: Enter a domain that's added to a service endpoint in your decentralized identity (DID) document. The domain is what binds your DID to something tangible that the user might know about your business. Microsoft Authenticator and other digital wallets use this information to validate that your DID is linked to your domain. If the wallet can verify the DID, it displays a verified symbol. If the wallet can't verify the DID, it informs the user that the credential was issued by an organization it couldn't validate.
186
186
187
187
>[!IMPORTANT]
188
188
> The domain can't be a redirect. Otherwise, the DID and domain can't be linked. Make sure to use HTTPS for the domain. For example: `https://contoso.com`.
0 commit comments