Skip to content

Commit ba433ed

Browse files
committed
updating article in response to reviewer feedback
1 parent 2f831a8 commit ba433ed

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed
Binary file not shown.

articles/active-directory/verifiable-credentials/verifiable-credentials-configure-issuer.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: barclayn
77
manager: amycolannino
88
ms.author: barclayn
99
ms.topic: tutorial
10-
ms.date: 09/11/2023
10+
ms.date: 09/15/2023
1111
# Customer intent: As an enterprise, we want to enable customers to manage information about themselves by using verifiable credentials.
1212

1313
---
@@ -160,7 +160,7 @@ git clone https://github.com/Azure-Samples/active-directory-verifiable-credentia
160160
161161
Create a client secret for the registered application that you created. The sample application uses the client secret to prove its identity when it requests tokens.
162162
163-
1. 1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
163+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
164164
1. Select Microsoft Entra ID (Azure AD).
165165
1. Go to **Applications** > **App registrations** page.
166166

articles/active-directory/verifiable-credentials/verifiable-credentials-configure-tenant.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: barclayn
77
manager: amycolannino
88
ms.author: barclayn
99
ms.topic: tutorial
10-
ms.date: 09/11/2023
10+
ms.date: 09/15/2023
1111
# Customer intent: As an enterprise, we want to enable customers to manage information about themselves by using verifiable credentials.
1212

1313
---
@@ -55,7 +55,7 @@ After you create your key vault, Verifiable Credentials generates a set of keys
5555

5656
1. Sign in to the [Azure portal](https://portal.azure.com) with your administrative account.
5757
1. Go to the key vault you use for this tutorial.
58-
1. 1. Under **Settings**, select **Access policies**.
58+
1. Under **Settings**, select **Access policies**.
5959

6060
1. In **Add access policies**, under **USER**, select the account you use to follow this tutorial.
6161

@@ -71,7 +71,7 @@ After you create your key vault, Verifiable Credentials generates a set of keys
7171

7272
To set up Verified ID, follow these steps:
7373

74-
1. 1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
74+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
7575

7676
1. Select **Verifiable Credentials**.
7777

0 commit comments

Comments
 (0)