Skip to content

Commit d8082ef

Browse files
authored
Merge pull request #202540 from barclayn/vc-updates-june22
Vc updates june22
2 parents 61c33d5 + f58e2dd commit d8082ef

15 files changed

+567
-62
lines changed

articles/active-directory/verifiable-credentials/TOC.yml

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
- name: Overview
44
expanded: true
55
items:
6-
- name: Introduction to Azure Active Directory Verifiable Credentials
6+
- name: Introduction to Microsoft Entra Verified ID
77
href: decentralized-identifier-overview.md
88
- name: What's new
99
href: whats-new.md
@@ -32,20 +32,26 @@
3232
- name: How-to guides
3333
expanded: true
3434
items:
35+
- name: Create credentials using Quickstart
36+
items:
37+
- name: Directory based - Employee
38+
href: how-to-use-quickstart-verifiedemployee.md
39+
- name: ID Token Hint credentials
40+
href: how-to-use-quickstart.md
41+
- name: ID Token credentials
42+
href: how-to-use-quickstart-idtoken.md
43+
- name: Self Issued credentials
44+
href: how-to-use-quickstart-selfissued.md
3545
- name: Using the Request Service REST API
3646
href: get-started-request-api.md
3747
- name: How to customize your credentials
3848
href: credential-design.md
39-
- name: Manage credential revocation
40-
href: how-to-use-quickstart.md
41-
- name: Create credentials using the QuickStart
42-
href: how-to-use-quickstart.md
43-
- name: Revoke a Verifiable Credential
44-
href: how-to-issuer-revoke.md
4549
- name: Link your domain to your DID
4650
href: how-to-dnsbind.md
4751
- name: Register your website ID
4852
href: how-to-register-didwebsite.md
53+
- name: Revoke a Verifiable Credential
54+
href: how-to-issuer-revoke.md
4955
- name: Opt out of verifiable credentials
5056
href: how-to-opt-out.md
5157
- name: Samples

articles/active-directory/verifiable-credentials/credential-design.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: How to customize your Azure Active Directory Verifiable Credentials (preview)
2+
title: How to customize your Microsoft Entra Verified ID (preview)
33
description: This article shows you how to create your own custom verifiable credential
44
services: active-directory
55
author: barclayn
66
manager: rkarlin
77
ms.service: decentralized-identity
88
ms.subservice: verifiable-credentials
99
ms.topic: how-to
10-
ms.date: 06/08/2022
10+
ms.date: 06/22/2022
1111
ms.author: barclayn
1212
# Customer intent: As a developer I am looking for information on how to enable my users to control their own information
1313
---
@@ -16,35 +16,35 @@ ms.author: barclayn
1616

1717
[!INCLUDE [Verifiable Credentials announcement](../../../includes/verifiable-credentials-brand.md)]
1818

19-
Verifiable credentials are made up of two components, the rules and display definitions. The rules definition determines what the user needs to provide before they receive a verifiable credential. The display definition controls the branding of the credential and styling of the claims. In this guide, we will explain how to modify both files to meet the requirements of your organization.
19+
Verifiable credentials are made up of two components, the rules and display definitions. The rules definition determines what the user needs to provide before they receive a verifiable credential. The display definition controls the branding of the credential and styling of the claims. In this guide, we'll explain how to modify both files to meet the requirements of your organization.
2020

2121
> [!IMPORTANT]
22-
> Azure Active Directory Verifiable Credentials is currently in public preview.
22+
> Microsoft Entra Verified ID is currently in public preview.
2323
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
2424
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2525
2626
## Rules definition: Requirements from the user
2727

2828
The rules definition is a simple JSON document that describes important properties of verifiable credentials. In particular, it describes how claims are used to populate your verifiable credential.
2929

30-
There are currently three input types that are available to configure in the rules definition. These types are used by the verifiable credential issuing service to insert claims into a verifiable credential and attest to that information with your DID. The following are the four types with explanations.
30+
There are currently four input types that are available to configure in the rules definition. These types are used by the verifiable credential issuing service to insert claims into a verifiable credential and attest to that information with your DID. The following are the four types with explanations.
3131

3232
- ID Token
3333
- ID Token Hint
3434
- Verifiable credentials via a verifiable presentation.
3535
- Self-Attested Claims
3636

37-
**ID token:** When this option is configured, you will need to provide an Open ID Connect configuration URI and include the claims that should be included in the VC. The user will be prompted to 'Sign in' on the Authenticator app to meet this requirement and add the associated claims from their account.
37+
**ID token:** When this option is configured, you'll need to provide an Open ID Connect configuration URI and include the claims that should be included in the VC. The user will be prompted to 'Sign in' on the Authenticator app to meet this requirement and add the associated claims from their account.
3838

39-
**ID token hint:** The sample App and Tutorial use the ID Token Hint. When this option is configured, the relying party app will need to provide claims that should be included in the VC in the Request Service API issuance request. Where the relying party app gets the claims from is up to the app, but it can come from the current login session, from backend CRM systems or even from self asserted user input.
39+
**ID token hint:** The sample App and Tutorial use the ID Token Hint. When this option is configured, the relying party app will need to provide claims that should be included in the VC in the Request Service API issuance request. Where the relying party app gets the claims from is up to the app, but it can come from the current sign-in session, from backend CRM systems or even from self asserted user input.
4040

4141
**Verifiable credentials:** The end result of an issuance flow is to produce a Verifiable Credential but you may also ask the user to Present a Verifiable Credential in order to issue one. The rules definition is able to take specific claims from the presented Verifiable Credential and include those claims in the newly issued Verifiable Credential from your organization.
4242

4343
**Self attested claims:** When this option is selected, the user will be able to directly type information into Authenticator. At this time, strings are the only supported input for self attested claims.
4444

4545
![detailed view of verifiable credential card](media/credential-design/issuance-doc.png)
4646

47-
**Static claims:** Additionally we are able to declare a static claim in the rules definition, however this input doesn't come from the user. The Issuer defines a static claim in the rules definition and would look like any other claim in the Verifiable Credential. Add a credentialSubject after vc.type and declare the attribute and the claim.
47+
**Static claims:** Additionally we can declare a static claim in the rules definition, however this input doesn't come from the user. The Issuer defines a static claim in the rules definition and would look like any other claim in the Verifiable Credential. Add a credentialSubject after vc.type and declare the attribute and the claim.
4848

4949
```json
5050
"vc": {
@@ -59,7 +59,7 @@ There are currently three input types that are available to configure in the rul
5959

6060
## Input type: ID token
6161

62-
To get ID Token as input, the rules definition needs to configure the well-known endpoint of the OIDC compatible Identity system. In that system you need to register an application with the correct information from [Issuer service communication examples](issuer-openid.md). Additionally, the client_id needs to be put in the rules definition, as well as a scope parameter needs to be filled in with the correct scopes. For example, Azure Active Directory needs the email scope if you want to return an email claim in the ID token.
62+
To get ID Token as input, the rules definition needs to configure the well-known endpoint of the OIDC compatible Identity system. In that system you need to register an application with the correct information from [Issuer service communication examples](issuer-openid.md). Additionally, the client_id needs to be put in the rules definition, and a scope parameter needs to be filled in with the correct scopes. For example, Azure Active Directory needs the email scope if you want to return an email claim in the ID token.
6363

6464
```json
6565
{
@@ -94,7 +94,7 @@ To get ID Token as input, the rules definition needs to configure the well-known
9494
}
9595
```
9696

97-
Please see [idToken attestation](rules-and-display-definitions-model.md#idtokenattestation-type) for reference of properties.
97+
See [idToken attestation](rules-and-display-definitions-model.md#idtokenattestation-type) for reference of properties.
9898

9999
## Input type: ID token hint
100100

@@ -134,7 +134,7 @@ See [idTokenHint attestation](rules-and-display-definitions-model.md#idtokenhint
134134

135135
### vc.type: Choose credential type(s)
136136

137-
All verifiable credentials must declare their "type" in their rules definition. The type of a credential distinguishes your verifiable credentials from credentials issued by other organizations and ensures interoperability between issuers and verifiers. To indicate a credential type, you must provide one or more credential types that the credential satisfies. Each type is represented by a unique string - often a URI will be used to ensure global uniqueness. The URI doesn't need to be addressable; it is treated as a string.
137+
All verifiable credentials must declare their "type" in their rules definition. The type of a credential distinguishes your verifiable credentials from credentials issued by other organizations and ensures interoperability between issuers and verifiers. To indicate a credential type, you must provide one or more credential types that the credential satisfies. Each type is represented by a unique string - often a URI will be used to ensure global uniqueness. The URI doesn't need to be addressable; it's treated as a string.
138138

139139
As an example, a diploma credential issued by Contoso University might declare the following types:
140140

@@ -144,7 +144,7 @@ As an example, a diploma credential issued by Contoso University might declare t
144144
| `https://schemas.ed.gov/universityDiploma2020` | Declares that diplomas issued by Contoso University contain attributes defined by the United States department of education. |
145145
| `https://schemas.contoso.edu/diploma2020` | Declares that diplomas issued by Contoso University contain attributes defined by Contoso University. |
146146

147-
By declaring all three types, Contoso University's diplomas can be used to satisfy different requests from verifiers. A bank can request a set of `EducationCredential`s from a user, and the diploma can be used to satisfy the request. But the Contoso University Alumni Association can request a credential of type `https://schemas.contoso.edu/diploma2020`, and the diploma will also satisfy the request.
147+
Contoso declaring three types of diplomas, allows them to issue credentials that satisfy different requests from verifiers. A bank can request a set of `EducationCredential`s from a user, and the diploma can be used to satisfy the request. But the Contoso University Alumni Association can request a credential of type `https://schemas.contoso.edu/diploma2020`, and the diploma will also satisfy the request.
148148

149149
To ensure interoperability of your credentials, it's recommended that you work closely with related organizations to define credential types, schemas, and URIs for use in your industry. Many industry bodies provide guidance on the structure of official documents that can be repurposed for defining the contents of verifiable credentials. You should also work closely with the verifiers of your credentials to understand how they intend to request and consume your verifiable credentials.
150150

@@ -237,7 +237,7 @@ Verifiable credentials issued to users are displayed as cards in Microsoft Authe
237237

238238
![issuance documentation](media/credential-design/detailed-view.png)
239239

240-
Cards also contain customizable fields that you can use to let users know the purpose of the card, the attributes it contains, and more.
240+
Cards also contain customizable fields. You can use these fields to let users know the purpose of the card, the attributes it contains, and more.
241241

242242
## Create a credential display definition
243243

@@ -285,4 +285,4 @@ See [Display definition model](rules-and-display-definitions-model.md#displaymod
285285
Now you have a better understanding of verifiable credential design and how you can create your own to meet your needs.
286286

287287
- [Issuer service communication examples](issuer-openid.md)
288-
- Reference for [Rules and Display definitions](rules-and-display-definitions-model.md)
288+
- Reference for [Rules and Display definitions](rules-and-display-definitions-model.md)

articles/active-directory/verifiable-credentials/how-to-create-a-free-developer-account.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,19 +12,21 @@ ms.author: barclayn
1212
# Customer intent: As a developer I am looking to create a developer Azure Active Directory account so I can participate in the Preview with a P2 license.
1313
---
1414

15-
# How to create a free Azure Active Directory developer tenant
15+
# Microsoft Entra Verified ID developer information
1616

1717
[!INCLUDE [Verifiable Credentials announcement](../../../includes/verifiable-credentials-brand.md)]
1818

1919
> [!IMPORTANT]
20-
> Azure Active Directory Verifiable Credentials is currently in public preview.
20+
> Microsoft Entra verified ID is currently in public preview.
2121
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
2222
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2323
2424
> [!NOTE]
25-
> While in Preview a P2 license is required.
25+
> The requirement of an Azure AD P2 license was removed in early May 2002. Azure AD Free tier is now supported.
2626
27-
There are two easy ways to create a free Azure Active Directory with a P2 trial license so you can install the Verifiable Credential Issuer service and you can test creating and validating Verifiable Credentials:
27+
## Creating an Azure AD tenant for development
28+
29+
There are two easy ways to create a free Azure Active Directory so you can onboard the Verifiable Credential service and test issuing and verifying Verifiable Credentials:
2830

2931
- [Join](https://aka.ms/o365devprogram) the free Microsoft 365 Developer Program and get a free sandbox, tools, and other resources like an Azure Active Directory with P2 licenses. Configured Users, Groups, mailboxes etc.
3032
- Create a new [tenant](../develop/quickstart-create-new-tenant.md) and activate a [free trial](https://azure.microsoft.com/trial/get-started-active-directory/) of Azure AD Premium P1 or P2 in your new tenant.

articles/active-directory/verifiable-credentials/how-to-dnsbind.md

Lines changed: 25 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: Link your Domain to your Decentralized Identifier (DID) (preview) - Azure Active Directory Verifiable Credentials
2+
title: Link your Domain to your Decentralized Identifier (DID) (preview) - Microsoft Entra Verified ID
33
description: Learn how to DNS Bind?
44
documentationCenter: ''
55
author: barclayn
66
manager: rkarlin
77
ms.service: decentralized-identity
88
ms.topic: how-to
99
ms.subservice: verifiable-credentials
10-
ms.date: 06/02/2022
10+
ms.date: 06/22/2022
1111
ms.author: barclayn
1212

1313
#Customer intent: Why are we doing this?
@@ -18,7 +18,7 @@ ms.author: barclayn
1818
[!INCLUDE [Verifiable Credentials announcement](../../../includes/verifiable-credentials-brand.md)]
1919

2020
> [!IMPORTANT]
21-
> Azure Active Directory Verifiable Credentials is currently in public preview.
21+
> Microsoft Entra Verified ID is currently in public preview.
2222
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
2323
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2424
@@ -59,7 +59,7 @@ We follow the [Well-Known DID configuration](https://identity.foundation/.well-k
5959
]
6060
```
6161

62-
2. The verifiable credential service in Azure AD generates a compliant well-known configuration resource that you can host on your domain. The configuration file includes a self-issued verifiable credential of credentialType 'DomainLinkageCredential' signed with your DID that has an origin of your domain. Here is an example of the config doc that is stored at the root domain URL.
62+
2. The verifiable credential service in Azure AD generates a compliant well-known configuration resource that you can host on your domain. The configuration file includes a self-issued verifiable credential of credentialType 'DomainLinkageCredential' signed with your DID that has an origin of your domain. Here's an example of the config doc that is stored at the root domain URL.
6363

6464

6565
```json
@@ -112,7 +112,7 @@ It is of high importance that you link your DID to a domain recognizable to the
112112
## How do you update the linked domain on your DID?
113113

114114
1. Navigate to the Verifiable Credentials | Getting Started page.
115-
1. On the left side of the page select **Domain**.
115+
1. On the left side of the page, select **Domain**.
116116
1. In the Domain box, enter your new domain name.
117117
1. Select **Publish**.
118118

@@ -158,6 +158,25 @@ If the trust system is ION, once the domain changes are published to ION, the do
158158

159159
Congratulations, you now have bootstrapped the web of trust with your DID!
160160

161+
## Linked Domain domain made easy for developers
162+
163+
The easiest way for a developer to get a domain to use for linked domain is to use Azure Storage's static website feature. You can't control what the domain name will be, other than it will contain your storage account name as part of it's hostname.
164+
165+
Follow these steps to quickly set up a domain to use for Linked Domain:
166+
167+
1. Create an **Azure Storage account**. During storage account creation, choose StorageV2 (general-purpose v2 account) and Locally redundant storage (LRS).
168+
1. Go to that Storage Account and select **Static website** in the left hand menu and enable static website. If you can't see the **Static website** menu item, you didn't create a **V2** storage account.
169+
1. Copy the primary endpoint name that appears after saving. This value is your domain name. It looks something like `https://<your-storageaccountname>.z6.web.core.windows.net/`.
170+
171+
When it comes time to upload the `did-configuration.json` file, take the following steps:
172+
173+
1. Go to that Storage Account and select **Containers** in the left hand menu. Then select the container named `$web`.
174+
1. Select **Upload** and select on the folder icon to find your file
175+
1. Before uploaded, open the **Advanced** section and specify `.well-known` in the **Upload to folder** textbox.
176+
1. Upload the file.
177+
178+
You now have your file publicly available at a URL that looks something like `https://<your-storageaccountname>.z6.web.core.windows.net/.well-known/did-configuration.json`.
179+
161180
## Next steps
162181

163-
- [How to customize your Azure Active Directory Verifiable Credentials](credential-design.md)
182+
- [How to customize your Microsoft Entra Verified ID](credential-design.md)

0 commit comments

Comments
 (0)