You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/admin-api.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ The API is protected through Azure Active Directory and uses OAuth2 bearer token
32
32
33
33
### User bearer tokens
34
34
35
-
The app registration needs to have the API Permission for `Verifiable Credentials Service Admin` and then when acquiring the access token the app should use scope `6a8b4b39-c021-437c-b060-5a14a3fd65f3/full_access`. The access token must be for a user with the [global administrator](../../active-directory/roles/permissions-reference.md#global-administrator) or the [authentication policy administrator](../../active-directory/roles/permissions-reference.md#authentication-policy-administrator) role. A user with role [global reader](../../active-directory/roles/permissions-reference.md#global-reader)will be able to perform read-only API calls.
35
+
The app registration needs to have the API Permission for `Verifiable Credentials Service Admin` and then when acquiring the access token the app should use scope `6a8b4b39-c021-437c-b060-5a14a3fd65f3/full_access`. The access token must be for a user with the [global administrator](../../active-directory/roles/permissions-reference.md#global-administrator) or the [authentication policy administrator](../../active-directory/roles/permissions-reference.md#authentication-policy-administrator) role. A user with role [global reader](../../active-directory/roles/permissions-reference.md#global-reader)can perform read-only API calls.
36
36
37
37
### Application bearer tokens
38
38
@@ -84,7 +84,7 @@ Content-type: application/json
84
84
}
85
85
```
86
86
87
-
Repeatedly calling this API will result in the exact same return message.
87
+
Repeatedly calling this API results in the exact same return message.
88
88
89
89
## Authorities
90
90
@@ -189,7 +189,7 @@ We support two different didModels. One is `ion` and the other supported method
189
189
|`recoveryKeys`| string array | URL to the recovery key |
190
190
|`encryptionKeys`| string array | URL to the encryption key |
191
191
|`linkedDomainUrls`| string array | Domains linked to this DID |
192
-
|`didDocumentStatus`| string | status of the DID, `published` when it's written to ION otherwise it will be`submitted`|
192
+
|`didDocumentStatus`| string | status of the DID, `published` when it's written to ION otherwise it is`submitted`|
This call creates a new **private key**, recovery key and update key, stores these in the specified Azure Key Vault and sets the permissions to this Key Vault for the verifiable credential service and a create new **DID** with corresponding DID Document and commits that to the ION network.
308
+
This call creates a new **private key**, recovery key and update key, stores these keys in the specified Azure Key Vault and sets the permissions to this Key Vault for the verifiable credential service and a create new **DID** with corresponding DID Document and commits that to the ION network.
Save this result with the file name did-configuration.json and upload this file to the correct folder and website. If you specify a domain not linked to this DID/DID Document, you'll receive an error:
606
+
Save this result with the file name did-configuration.json and upload this file to the correct folder and website. If you specify a domain not linked to this DID/DID Document, you receive an error:
607
607
608
608
```
609
609
HTTP/1.1 400 Bad Request
@@ -852,7 +852,7 @@ The response contains the following properties
852
852
|`vc`| vcType array | types for this contract |
853
853
|`customStatusEndpoint`|[customStatusEndpoint] (#customstatusendpoint-type) (optional) | status endpoint to include in the verifiable credential for this contract |
854
854
855
-
If the property `customStatusEndpoint` property isn't specified then the `anonymous` status endpoint is used.
855
+
If the property `customStatusEndpoint` property isn't specified, then the `anonymous` status endpoint is used.
856
856
857
857
#### attestations type
858
858
@@ -1099,7 +1099,7 @@ example message:
1099
1099
### Create contract
1100
1100
1101
1101
When creating a contract the name has to be unique in the tenant. In case you have created multiple authorities, the contract name has to be unique across all authorities.
1102
-
The name of the contract will be part of the contract URL which is used in the issuance requests.
1102
+
The name of the contract will be part of the contract URL, which is used in the issuance requests.
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/how-to-dnsbind.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,18 +26,18 @@ To verify domain ownership to your DID, you need to have completed the following
26
26
27
27
## Verify domain ownership and distribute did-configuration.json file
28
28
29
-
The domain you will verify ownership of to your DID is defined in the [overview section](verifiable-credentials-configure-tenant.md#set-up-verified-id). The domain needs to be a domain under your control and it should be in the format `https://www.example.com/`.
29
+
The domain you verify ownership of to your DID is defined in the [overview section](verifiable-credentials-configure-tenant.md#set-up-verified-id). The domain needs to be a domain under your control and it should be in the format `https://www.example.com/`.
30
30
31
31
1. From the Azure portal, navigate to the VerifiedID page.
32
32
33
33
1. Select **Setup**, then **Verify domain ownership** and choose **Verify** for the domain
34
34
35
-
1. Copy or download the `did-configuration.json` file shown in the image below.
35
+
1. Copy or download the `did-configuration.json` file.
36
36
37
37

38
38
39
39
1. Host the `did-configuration.json` file at the location specified. Example: If you specified domain `https://www.example.com` the file need to be hosted at this URL `https://www.example.com/.well-known/did-configuration.json`.
40
-
There can be no additional path in the URL other than the .well-known path name.
40
+
There can be no additional path in the URL other than the `.well-known path` name.
41
41
42
42
1. When the `did-configuration.json` is publicly available at the .well-known/did-configuration.json URL, verify it by pressing the **Refresh verification status** button.
43
43
@@ -50,7 +50,7 @@ There can be no additional path in the URL other than the .well-known path name.
50
50
51
51
## How can I verify that the verification is working?
52
52
53
-
The portal verifies that the `did-configuration.json` is reachable over public internet and valid when you click the **Refresh verification status** button. Microsoft Authenticator do not honor http redirects. You should also consider verifying that you can request that URL in a browser to avoid errors like not using https, a bad SSL certificate or the URL not being public. If the `did-configuration.json` file cannot be requested anonymously in a browser or via tools such as `curl`, without warnings or errors, the portal will not be able to complete the **Refresh verification status** step either.
53
+
The portal verifies that the `did-configuration.json` is reachable over public internet and valid when you click the **Refresh verification status** button. Microsoft Authenticator does not honor http redirects. You should also consider verifying that you can request that URL in a browser to avoid errors like not using https, a bad SSL certificate or the URL not being public. If the `did-configuration.json` file can't be requested anonymously in a browser or via tools such as `curl`, without warnings or errors, the portal can't complete the **Refresh verification status** step either.
54
54
55
55
>[!NOTE]
56
56
> If you are experiencing problems refreshing your verification status, you can troubleshoot it via running `curl -Iv https://yourdomain.com/.well-known/did-configuration.json` on an machine with Ubuntu OS. Windows Subsystem for Linux with Ubuntu will work too. If curl fails, refreshing the verification status will not work.
@@ -124,20 +124,20 @@ It is of high importance that you link your DID to a domain recognizable to the
124
124
125
125
## How do you update the linked domain on your DID?
126
126
127
-
If your trust system is Web, then updating your linked domain is not supported. You have to opt-out and re-onboard. If your trust system is ION, you can update the linked domain via redoing the **Verify domain ownership** step. It might take up to two hours for your DID document to be updated in the [ION network](https://identity.foundation/ion) with the new domain information. No other changes to the domain are possible before the changes are published.
127
+
If your trust system is Web, then updating your linked domain isn't supported. You have to opt-out and re-onboard. If your trust system is ION, you can update the linked domain via redoing the **Verify domain ownership** step. It might take up to two hours for your DID document to be updated in the [ION network](https://identity.foundation/ion) with the new domain information. No other changes to the domain are possible before the changes are published.
128
128
129
129
### How do I know when the linked domain update has successfully completed?
130
130
131
-
If the trust system is ION, once the domain changes are published to ION, the domain section inside the Microsoft Entra Verified ID service will display Published as the status and you should be able to make new changes to the domain. If the trust system is Web, the changes are public as soon as you replace the did-configuration.json file on your web server.
131
+
If the trust system is ION, once the domain changes are published to ION, the domain section inside the Microsoft Entra Verified ID service displays Published as the status and you should be able to make new changes to the domain. If the trust system is Web, the changes are public as soon as you replace the did-configuration.json file on your web server.
132
132
133
133
>[!IMPORTANT]
134
134
> No changes to your domain are possible while publishing is in progress.
135
135
136
136
## Linked Domain domain made easy for developers
137
137
138
-
The easiest way for a developer to get a domain to use for linked domain is to use Azure Storage's static website feature. You can't control what the domain name will be, other than it will contain your storage account name as part of it's hostname.
138
+
The easiest way for a developer to get a domain to use for linked domain is to use Azure Storage's static website feature. You can't control what the domain name is, other than it contains your storage account name as part of it's hostname.
139
139
140
-
Follow these steps to quickly set up a domain to use for Linked Domain:
140
+
Follow these steps to quickly setup a domain to use for Linked Domain:
141
141
142
142
1. Create an **Azure Storage account**. During storage account creation, choose StorageV2 (general-purpose v2 account) and Locally redundant storage (LRS).
143
143
1. Go to that Storage Account and select **Static website** in the left hand menu and enable static website. If you can't see the **Static website** menu item, you didn't create a **V2** storage account.
0 commit comments