You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/verifiable-credentials-configure-issuer.md
+32-5Lines changed: 32 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: barclayn
7
7
manager: karenhoran
8
8
ms.author: barclayn
9
9
ms.topic: tutorial
10
-
ms.date: 04/26/2022
10
+
ms.date: 10/08/2021
11
11
# Customer intent: As an enterprise, we want to enable customers to manage information about themselves by using verifiable credentials.
12
12
13
13
---
@@ -46,7 +46,7 @@ The following diagram illustrates the Azure AD Verifiable Credentials architectu
46
46
47
47
## Create a storage account
48
48
49
-
Azure Blob Storage is an object storage solution for the cloud. Azure AD Verifiable Credentials use[Azure Blob Storage](../../storage/blobs/storage-blobs-introduction.md) to store the configuration files when the service is issuing verifiable credentials.
49
+
Azure Blob Storage is an object storage solution for the cloud. Azure AD Verifiable Credentials uses[Azure Blob Storage](../../storage/blobs/storage-blobs-introduction.md) to store the configuration files when the service is issuing verifiable credentials.
50
50
51
51
Create and configure Blob Storage by following these steps:
52
52
@@ -59,9 +59,36 @@ Create and configure Blob Storage by following these steps:
59
59
60
60

61
61
62
+
## Grant access to the container
63
+
64
+
After you create your container, grant the signed-in user the correct role assignment so they can access the files in Blob Storage.
65
+
66
+
1. From the list of containers, select **vc-container**.
67
+
68
+
1. From the menu, select **Access Control (IAM)**.
69
+
70
+
1. Select **+ Add,** and then select **Add role assignment**.
71
+
72
+

73
+
74
+
1. In **Add role assignment**:
75
+
76
+
1. For the **Role**, select **Storage Blob Data Reader**.
77
+
78
+
1. For the **Assign access to**, select **User, group, or service
79
+
principal**.
80
+
81
+
1. Then, search the account that you're using to perform these steps, and
82
+
select it.
83
+
84
+

85
+
86
+
>[!IMPORTANT]
87
+
>By default, container creators get the owner role assigned. The owner role isn't enough on its own. Your account needs the storage blob data reader role. For more information, see [Use the Azure portal to assign an Azure role for access to blob and queue data](../../storage/blobs/assign-azure-role-data-access.md).
88
+
62
89
### Upload the configuration files
63
90
64
-
Azure AD Verifiable Credentials service uses two JSON configuration files, the rules file and the display file.
91
+
Azure AD Verifiable Credentials uses two JSON configuration files, the rules file and the display file.
65
92
66
93
- The *rules* file describes important properties of verifiable credentials. In particular, it describes the claims that subjects (users) need to provide before a verifiable credential is issued for them.
67
94
- The *display* file controls the branding of the credential and styling of the claims.
@@ -148,7 +175,7 @@ In this step, you create the verified credential expert card by using Azure AD V
148
175
149
176
1. For **Subscription**, select your Azure AD subscription where you created Blob Storage.
150
177
151
-
1. Under the **Display file**, select **Select display file**. In the Storage accounts section, select **vc-container**. Then select the **VerifiedCredentialExpertDisplay.json** file and select **Select**.
178
+
1. Under the **Display file**, select **Select display file**. In the Storage accounts section, select **vc-container**. Then select the **VerifiedCredentialExpertDisplay.json** file and click **Select**.
152
179
153
180
1. Under the **Rules file**, **Select rules file**. In the Storage accounts section, select the **vc-container**. Then select the **VerifiedCredentialExpertRules.json** file, and choose **Select**.
154
181
@@ -281,7 +308,7 @@ Now you're ready to issue your first verified credential expert card by running
281
308
282
309

283
310
284
-
1. At the risky website warning, select**Proceed anyways (unsafe)**. You're seeing this warning because your domain isn't linked to your decentralized identifier (DID). To verify your domain, follow the guidance in[Link your domain to your decentralized identifier (DID)](how-to-dnsbind.md). For this tutorial, you can skip the domain registration, and select**Proceed anyways (unsafe).**
311
+
1. At the risky website warning, select**Proceed anyways (unsafe)**. You're seeing this warning because your domain isn't linked to your decentralized identifier (DID). To verify your domain, follow [Link your domain to your decentralized identifier (DID)](how-to-dnsbind.md). For this tutorial, you can skip the domain registration, and select**Proceed anyways (unsafe).**
285
312
286
313

Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/verifiable-credentials-faq.md
+1-8Lines changed: 1 addition & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ This page contains commonly asked questions about Verifiable Credentials and Dec
28
28
29
29
### What is a DID?
30
30
31
-
Decentralized Identifers(DIDs) are identifiers that can be used to secure access to resources, sign and verify credentials, and facilitate application data exchange. Unlike traditional usernames and email addresses, DIDs are owned and controlled by the entity itself (be it a person, device, or company). DIDs exist independently of any external organization or trusted intermediary. [The W3C Decentralized Identifier spec](https://www.w3.org/TR/did-core/) explains this in further detail.
31
+
Decentralized Identifers(DIDs) are unique identifiers that can be used to secure access to resources, sign and verify credentials, and facilitate application data exchange. Unlike traditional usernames and email addresses, DIDs are owned and controlled by the entity itself (be it a person, device, or company). DIDs exist independently of any external organization or trusted intermediary. [The W3C Decentralized Identifier spec](https://www.w3.org/TR/did-core/) explains this in further detail.
32
32
33
33
### Why do we need a DID?
34
34
@@ -161,13 +161,6 @@ For the Request API the new scope for your application or Postman is now:
161
161
162
162
```3db474b9-6a0c-96ac-1fceb342124f/.default```
163
163
164
-
#### **5. Clean up configuration**
165
-
166
-
**Suggested after May 6, 2022**. Once you have confirmed that the Azure AD verifiable credentials service is working normally, you can issue, verify, etc after May 6, 2022 you can proceed to clean up your tenant so that the Azure AD Verifiable Credentials service has only the new service principals.
167
-
168
-
1. Run the following PowerShell command to connect to your Azure AD tenant. Replace ```<your tenant ID>``` with your Azure AD tenant ID.
169
-
1. Run the following commands in the same PowerShell session. The AppId ```603b8c59-ba28-40ff-83d1-408eee9a93e5``` and ```bbb94529-53a3-4be5-a069-7eaf2712b826``` refer to the previous Verifiable Credentials service principals.
170
-
171
164
### How do I reset the Azure AD Verifiable credentials service?
172
165
173
166
Resetting requires that you opt out and opt back into the Azure Active Directory Verifiable Credentials service, your existing verifiable credentials configurations will reset and your tenant will obtain a new DID to use during issuance and presentation.
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/whats-new.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ manager: karenhoran
6
6
ms.service: active-directory
7
7
ms.subservice: verifiable-credentials
8
8
ms.topic: reference
9
-
ms.date: 04/26/2022
9
+
ms.date: 04/27/2022
10
10
ms.custom: references_regions
11
11
ms.author: barclayn
12
12
@@ -20,10 +20,10 @@ This article lists the latest features, improvements, and changes in the Azure A
20
20
21
21
## April
22
22
23
-
From April 25th, 2022 the Verifiable Credentials service is available to more Azure tenants. This important update requires any tenant created prior to April 25, 2022 to make a 15 minutes reconfiguration of the service to ensure ongoing operation. Verifiable Credentials service Administrators must perform the [following steps](verifiable-credentials-faq.md?#updating-the-vc-service-configuration) to avoid service disruptions.
23
+
Verifiable Credentials service Administrators must perform a small configuration change before **May 4, 2022** following [these steps](verifiable-credentials-faq.md?#updating-the-vc-service-configuration) to avoid service disruptions. On May 4, 2022 we'll roll out updates on our service that will result in errors on issuance and presentation on those tenants that haven't applied the changes.
24
24
25
25
>[!IMPORTANT]
26
-
> When the configuration on your tenant has not been updated, there will be errors on issuance and presentation flows of verifiable credentials from/to your tenant. [Service configuration instructions](verifiable-credentials-faq.md?#updating-the-vc-service-configuration).
26
+
> When the configuration on your tenant has not been updated, . [Service configuration instructions](verifiable-credentials-faq.md?#updating-the-vc-service-configuration).
27
27
28
28
## March 2022
29
29
- Azure AD Verifiable Credentials customers can now change the [domain linked](how-to-dnsbind.md) to their DID easily from the Azure portal.
0 commit comments