Skip to content

Commit ac72790

Browse files
committed
updates as per review
1 parent 8bfbd6d commit ac72790

File tree

9 files changed

+22
-20
lines changed

9 files changed

+22
-20
lines changed

articles/active-directory/verifiable-credentials/admin-api.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -829,7 +829,7 @@ The response contains the following properties
829829

830830
| Property | Type | Description |
831831
| -------- | -------- | -------- |
832-
|`attestations`| [attestions](#attestations-type)| describing supported inputs for the rules |
832+
|`attestations`| [attestations](#attestations-type)| describing supported inputs for the rules |
833833
|`validityInterval` | number | this value shows the lifespan of the credential |
834834
|`vc`| vcType array | types for this contract |
835835
|`customStatusEndpoint`| [customStatusEndpoint] (#customstatusendpoint-type) (optional) | status endpoint to include in the verifiable credential for this contract |
@@ -840,8 +840,8 @@ If the property `customStatusEndpoint` property isn't specified then the `anonym
840840

841841
| Property | Type | Description |
842842
| -------- | -------- | -------- |
843-
|`idTokens`| [idTokenAttestation](#idtokenattestation-type) (array) (optional) | describes id token inputs|
844-
|`idTokenHints`| [idTokenHintAttestation](#idtokenhintattestation-type) (array) (optional) | describes id token hint inputs |
843+
|`idTokens`| [idTokenAttestation](#idtokenattestation-type) (array) (optional) | describes ID token inputs|
844+
|`idTokenHints`| [idTokenHintAttestation](#idtokenhintattestation-type) (array) (optional) | describes ID token hint inputs |
845845
|`presentations`| [verifiablePresentationAttestation](#verifiablepresentationattestation-type) (array) (optional) | describes verifiable presentations inputs |
846846
|`selfIssued`| [selfIssuedAttestation](#selfissuedattestation-type) (array) (optional) | describes self issued inputs |
847847
|`accessTokens`| [accessTokenAttestation](#accesstokenattestation-type) (array) (optional) | describes access token inputs |

articles/active-directory/verifiable-credentials/how-to-dnsbind.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -34,14 +34,14 @@ The domain you will verify ownership of to your DID is defined in the organizati
3434

3535
1. Copy or download the `did-configuration.json` file shown in the image below.
3636

37-
![Download well known config](media/how-to-dnsbind/verify-download.png)
37+
![Screenshot of download well-known config.](media/how-to-dnsbind/verify-download.png)
3838

3939
1. Host the `did-configuration.json` file at the location specified. Example: `https://www.example.com/.well-known/did-configuration.json`
4040
There can be no additional path in the URL other than the .well-known path name.
4141

4242
1. When the `did-configuration.json` is publicly available at the .well-known/did-configuration.json URL, verify it by pressing the **Refresh verification status** button.
4343

44-
![Verified well known config](media/how-to-dnsbind/verify-download-verified.png)
44+
![Screenshot of verified well-known config.](media/how-to-dnsbind/verify-download-verified.png)
4545

4646
1. Test out issuing or presenting with Microsoft Authenticator to validate. Make sure the setting in Authenticator 'Warn about unsafe apps' is toggled on.
4747

@@ -108,7 +108,7 @@ Before Microsoft Authenticator displays a **Verified** icon, a few things need t
108108

109109
If all of the previously mentioned are true, then Microsoft Authenticator displays a verified page and includes the domain that was validated.
110110

111-
![new permission request](media/how-to-dnsbind/new-permission-request.png)
111+
![Screenshot of new permission request.](media/how-to-dnsbind/new-permission-request.png)
112112

113113
## Unverified domain
114114

@@ -120,7 +120,7 @@ If any of the above aren't true, Microsoft Authenticator displays a full page wa
120120

121121
It is of high importance that you link your DID to a domain recognizable to the user.
122122

123-
![unverified domain warning in the add credential screen](media/how-to-dnsbind/add-credential-not-verified-authenticated.png)
123+
![Screenshot of unverified domain warning in the add credential screen.](media/how-to-dnsbind/add-credential-not-verified-authenticated.png)
124124

125125
## How do you update the linked domain on your DID?
126126

-29.4 KB
Loading
-14.9 KB
Loading
-1.55 KB
Loading
-2.72 KB
Loading

articles/active-directory/verifiable-credentials/presentation-request-api.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -109,8 +109,8 @@ The payload contains the following properties.
109109

110110
|Parameter |Type | Description |
111111
|---------|---------|---------|
112-
| `includeQRCode` | Boolean | Determines whether a QR code is included in the response of this request. Present the QR code and ask the user to scan it. Scanning the QR code launches the authenticator app with this presentation request. Possible values are `true` (default) or `false`. When you set the value to `false`, use the return `url` property to render a deep link. |
113-
| `includeReceipt` | Boolean | Determines whether a receipt should be included in the response of this request. Possible values are `true` or `false` (default). The receipt contains the original payload sent from the authenticator to the Verifiable Credentials service. The receipt is useful for troubleshooting or if you have the need to ge the full details of the payload. There's otherwise no need be set this value to `true `by default. In the `OpenId Connect SIOP` request, the receipt contains the ID token from the original request. |
112+
| `includeQRCode` | Boolean | Optional. Determines whether a QR code is included in the response of this request. Present the QR code and ask the user to scan it. Scanning the QR code launches the authenticator app with this presentation request. Possible values are `true` (default) or `false`. When you set the value to `false`, use the return `url` property to render a deep link. |
113+
| `includeReceipt` | Boolean | Optional. Determines whether a receipt should be included in the response of this request. Possible values are `true` or `false` (default). The receipt contains the original payload sent from the authenticator to the Verifiable Credentials service. The receipt is useful for troubleshooting or if you have the need to ge the full details of the payload. There's otherwise no need be set this value to `true `by default. In the `OpenId Connect SIOP` request, the receipt contains the ID token from the original request. |
114114
| `authority` | string| Your decentralized identifier (DID) of your verifier Azure AD tenant. For more information, see [Gather tenant details to set up your sample application](verifiable-credentials-configure-verifier.md#gather-tenant-details-to-set-up-your-sample-application).|
115115
| `registration` | [RequestRegistration](#requestregistration-type)| Provides information about the verifier. |
116116
|`callback`| [Callback](#callback-type)| Mandatory. Allows the developer to update the UI during the verifiable credential presentation process. When the user completes the process, continue the process after the results are returned to the application.|
@@ -123,7 +123,10 @@ The `RequestRegistration` type provides information registration for the issuer.
123123

124124
|Property |Type |Description |
125125
|---------|---------|---------|
126-
| `clientName` | string| A display name of the issuer of the verifiable credential. This name will be presented to the user in the authenticator app. |
126+
| `clientName` | string| A display name of the verifier of the verifiable credential. This name will be presented to the user in the authenticator app. |
127+
| `purpose` | string| Optional. A string that is displayed to inform the user why the verifiable credentials are being requested. |
128+
| `logoUrl` | URL| Optional. A URL for a logotype of the verifier. This is not used by the Authenticator app. |
129+
| `termsOfServiceUrl` | URL| Optional. A URL to the terms of service for the verifier. This is not used by the Authenticator app. |
127130

128131
The following screenshot shows the `clientName` property and the display name of the `authority` (the verifier) in the presentation request.
129132

@@ -146,8 +149,8 @@ The `RequestCredential` provides information about the requested credentials the
146149
|Property |Type |Description |
147150
|---------|---------|---------|
148151
| `type`| string| The verifiable credential type. The `type` must match the type as defined in the `issuer` verifiable credential manifest (for example, `VerifiedCredentialExpert`). To get the issuer manifest, see [Gather credentials and environment details to set up your sample application](verifiable-credentials-configure-issuer.md). Copy the **Issue credential URL**, open it in a web browser, and check the **id** property. |
149-
| `purpose`| string | Provide information about the purpose of requesting this verifiable credential. |
150-
| `acceptedIssuers`| string collection | A collection of issuers' DIDs that could issue the type of verifiable credential that subjects can present. To get your issuer DID, see [Gather credentials and environment details to set up your sample application](verifiable-credentials-configure-issuer.md), and copy the value of the **Decentralized identifier (DID)**. If the `acceptedIssuers` collection is empty, then the presentation request will accept a credential type issued by any issuer. |
152+
| `purpose`| string | Optional. Provide information about the purpose of requesting this verifiable credential. This is not used by the Authenticator app. |
153+
| `acceptedIssuers`| string collection | Optional. A collection of issuers' DIDs that could issue the type of verifiable credential that subjects can present. To get your issuer DID, see [Gather credentials and environment details to set up your sample application](verifiable-credentials-configure-issuer.md), and copy the value of the **Decentralized identifier (DID)**. If the `acceptedIssuers` collection is empty or not present, then the presentation request will accept a credential type issued by any issuer. |
151154
| `configuration.validation` | [Configuration.Validation](#configurationvalidation-type) | Optional settings for presentation validation.|
152155

153156
### Configuration.Validation type
@@ -156,8 +159,8 @@ The `Configuration.Validation` provides information about how the presented cred
156159

157160
|Property |Type |Description |
158161
|---------|---------|---------|
159-
| `allowRevoked` | Boolean | Determines if a revoked credential should be accepted. Default is `false` (it shouldn't be accepted). |
160-
| `validateLinkedDomain` | Boolean | Determines if the linked domain should be validated. Default is `false`. Setting this flag to `false` means you as a Relying Party application accept credentials from an unverified linked domain. Setting this flag to `true` means the linked domain will be validated and only verified domains will be accepted. |
162+
| `allowRevoked` | Boolean | Optional. Determines if a revoked credential should be accepted. Default is `false` (it shouldn't be accepted). |
163+
| `validateLinkedDomain` | Boolean | Optional. Determines if the linked domain should be validated. Default is `false`. Setting this flag to `false` means you as a Relying Party application accept credentials from an unverified linked domain. Setting this flag to `true` means the linked domain will be validated and only verified domains will be accepted. |
161164

162165
## Successful response
163166

articles/active-directory/verifiable-credentials/services-partners.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,13 +23,12 @@ If you are a Services Partner and would like to be considered into Entra Verifie
2323
| Services partner | Website |
2424
|:-------------------------|:--------------|
2525
| ![Affinitiquest logo](media/services-partners/affinitiquest.png) | [Secure Personally Identifiable Information | AffinitiQuest](https://affinitiquest.io/) |
26-
| ![Avanade logo](media/services-partners/avanade.png) | [Avanade Entra Verified ID Consulting Services](https://appsource.microsoft.com/en-us/marketplace/consulting-services/avanadeinc.ava_entra_verified_id_fy23?exp=ubp8) |
26+
| ![Avanade logo](media/services-partners/avanade.png) | [Avanade Entra Verified ID Consulting Services](https://appsource.microsoft.com/marketplace/consulting-services/avanadeinc.ava_entra_verified_id_fy23?exp=ubp8) |
2727
| ![Credivera logo](media/services-partners/credivera.png) | [Credivera: Digital Identity Solutions | Verifiable Credentials](https://www.credivera.com/) |
2828
| ![Condatis logo](media/services-partners/condatis.png) | [Decentralized Identity | Condatis](https://condatis.com/technology/decentralized-identity/) |
2929
| ![DXC logo](media/services-partners/dxc.png) | [Digital Identity - Connect with DXC](https://dxc.com/us/en/services/security/digital-identity) |
3030
| ![CTC logo](media/services-partners/ctc.png) | [CTC's SELMID offering](https://ctc-insight.com/selmid) |
31-
| ![Kocho logo](media/services-partners/kocho.png) | [Connect with Kocho. See Verified Identity in Action](https://kocho.co.uk/contact-us/)
32-
[See Verified Identity in Action](https://kocho.co.uk/verified-id-in-action/) |
31+
| ![Kocho logo](media/services-partners/kocho.png) | [Connect with Kocho. See Verified Identity in Action](https://kocho.co.uk/contact-us/)<br/>[See Verified Identity in Action](https://kocho.co.uk/verified-id-in-action/) |
3332
| ![Predica logo](media/services-partners/predica.png) | [Verified ID - Predica Group](https://www.predicagroup.com/en/verified-id/) |
3433
| ![Sphereon logo](media/services-partners/sphereon.png) | [Sphereon supports customers on Microsoft's Entra Verified ID](https://sphereon.com/sphereon-supports-microsofts-entra-verified-id/) |
3534
| ![Unify logo](media/services-partners/unify.png) | [Microsoft Entra Verified ID - UNIFY Solutions](https://unifysolutions.net/entra/verified-id/) |

articles/active-directory/verifiable-credentials/verifiable-credentials-configure-tenant.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ After you create your key vault, Verifiable Credentials generates a set of keys
6161

6262
1. For **Key permissions**, verify that the following permissions are selected: **Create**, **Delete**, and **Sign**. By default, **Create** and **Delete** are already enabled. **Sign** should be the only key permission you need to update.
6363

64-
:::image type="content" source="media/verifiable-credentials-configure-tenant/set-key-vault-admin-access-policy.png" alt-text="Screenshot that shows how to configure the admin access policy." border="false":::
64+
:::image type="content" source="media/verifiable-credentials-configure-tenant/set-key-vault-admin-access-policy.png" alt-text="Screenshot that shows how to configure the admin access policy." border="false":::
6565

6666
1. To save the changes, select **Save**.
6767

@@ -165,8 +165,8 @@ After Azure Key Vault is setup, and the service have a signing key, you must com
165165

166166
1. Navigate to the Verified ID service in the Azure portal.
167167
1. From the left menu, select **Setup**.
168-
1. From the middle menu, select **Register decentralized ID** to register your DID document, as per instructions in articel [How to register your website ID for did:web](how-to-register-didwebsite.md). You must complete this step before you can continue to verify your domain. If you selected did:ion as your trust system, you should skip this step.
169-
1. From the middle menu, select **Verify domain ownership** to verify your domain, as per instructions in articel [Link your domain to your Decentralized Identifier (DID)](how-to-dnsbind.md)
168+
1. From the middle menu, select **Register decentralized ID** to register your DID document, as per instructions in article [How to register your decentralized ID for did:web](how-to-register-didwebsite.md). You must complete this step before you can continue to verify your domain. If you selected did:ion as your trust system, you should skip this step.
169+
1. From the middle menu, select **Verify domain ownership** to verify your domain, as per instructions in article [Verify domain ownership to your Decentralized Identifier (DID)](how-to-dnsbind.md)
170170

171171
Once that you have successfully completed the verification steps, and have green checkmarks on all three steps, you are ready to continue to the next tutorial.
172172

0 commit comments

Comments
 (0)