Skip to content

Commit a23f1d5

Browse files
committed
removing misleading text, adding missing req
1 parent ffcf75d commit a23f1d5

File tree

6 files changed

+8
-6
lines changed

6 files changed

+8
-6
lines changed

articles/active-directory/verifiable-credentials/admin-api.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -986,9 +986,8 @@ example:
986986

987987
| Property | Type | Description |
988988
| -------- | -------- | -------- |
989-
|`uri`| string (uri) | uri of the logo (optional if image is specified) |
989+
|`uri`| string (uri) | uri of the logo |
990990
|`description` | string | the description of the logo |
991-
|`image` | string | the base-64 encoded image (optional if uri is specified) |
992991

993992
#### displayConsent type
994993

articles/active-directory/verifiable-credentials/issuance-request-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ The payload contains the following properties:
108108
| `registration` | [RequestRegistration](#requestregistration-type)| Provides information about the issuer that can be displayed in the authenticator app. |
109109
| `type` | string | The verifiable credential type. Should match the type as defined in the verifiable credential manifest. For example: `VerifiedCredentialExpert`. For more information, see [Create the verified credential expert card in Azure](verifiable-credentials-configure-issuer.md). |
110110
| `manifest` | string| The URL of the verifiable credential manifest document. For more information, see [Gather credentials and environment details to set up your sample application](verifiable-credentials-configure-issuer.md).|
111-
| `claims` | string| Optional. Used for the `ID token hint` flow to include a collection of assertions made about the subject in the verifiable credential. For PIN code flow, it's important that you provide the user's first name and last name. For more information, see [Verifiable credential names](verifiable-credentials-configure-issuer.md#verifiable-credential-names). |
111+
| `claims` | string| Optional. Can only be used for the [ID token hint](rules-and-display-definitions-model.md#idtokenhintattestation-type) attestation flow to include a collection of assertions made about the subject in the verifiable credential. |
112112
| `pin` | [PIN](#pin-type)| Optional. PIN code can only be used with the [ID token hint](rules-and-display-definitions-model.md#idtokenhintattestation-type) attestation flow. A PIN number to provide extra security during issuance. You generate a PIN code, and present it to the user in your app. The user must provide the PIN code that you generated. |
113113

114114
There are currently four claims attestation types that you can send in the payload. Microsoft Entra Verified ID uses four ways to insert claims into a verifiable credential and attest to that information with the issuer's DID. The following are the four types:
Loading

articles/active-directory/verifiable-credentials/rules-and-display-definitions-model.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -154,9 +154,8 @@ When you want the user to enter information themselves. This type is also called
154154

155155
| Property | Type | Description |
156156
| -------- | -------- | -------- |
157-
|`uri`| string (url) | url of the logo (optional if image is specified) |
157+
|`uri`| string (url) | url of the logo. |
158158
|`description` | string | the description of the logo |
159-
|`image` | string | the base-64 encoded image (optional if url is specified) |
160159

161160
### displayConsent type
162161

articles/active-directory/verifiable-credentials/verifiable-credentials-configure-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ After you create your key vault, Verifiable Credentials generates a set of keys
5959

6060
1. In **Add access policies**, under **USER**, select the account you use to follow this tutorial.
6161

62-
1. For **Key permissions**, verify that the following permissions are selected: **Create**, **Delete**, and **Sign**. By default, **Create** and **Delete** are already enabled. **Sign** should be the only key permission you need to update.
62+
1. For **Key permissions**, verify that the following permissions are selected: **Get**, **Create**, **Delete**, and **Sign**. By default, **Create** and **Delete** are already enabled. **Sign** should be the only key permission you need to update.
6363

6464
:::image type="content" source="media/verifiable-credentials-configure-tenant/set-key-vault-admin-access-policy.png" alt-text="Screenshot that shows how to configure the admin access policy." border="false":::
6565

articles/active-directory/verifiable-credentials/whats-new.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,10 @@ ms.author: barclayn
2020

2121
This article lists the latest features, improvements, and changes in the Microsoft Entra Verified ID service.
2222

23+
## May 2023
24+
25+
- Wallet Library was announced at Build 2023 in session [Reduce fraud and improve engagement using Digital Wallets](https://build.microsoft.com/en-US/sessions/4ca41843-1b3f-4ee6-955e-9e2326733be8). The Wallet Library enables customers to addverifiable credentials technology to their own mobile apps. The libararies are available for [Android](https://github.com/microsoft/entra-verifiedid-wallet-library-android/tree/dev) and [iOS](https://github.com/microsoft/entra-verifiedid-wallet-library-ios/tree/dev).
26+
2327
## March 2023
2428

2529
- Admin API now supports [application access tokens](admin-api.md#authentication) and in addition to user bearer tokens.

0 commit comments

Comments
 (0)