You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/how-to-use-quickstart-idtoken.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -208,7 +208,7 @@ To match the display and rules definitions, you should make your application's o
208
208
},
209
209
```
210
210
211
-
**For Azure Active Directory B2C**: Configuring other claims in your ID token depends on whether your B2C policy is a *user flow* or a *custom policy*. For information about user flows, see [Set up a sign-up and sign-in flow in Azure Active Directory B2C](../../active-directory-b2c/add-sign-up-and-sign-in-policy.md?pivots=b2c-user-flow). For information about custom policy, see [Provide optional claims to your app](../../active-directory-b2c/configure-tokens.md?pivots=b2c-custom-policy#provide-optional-claims-to-your-app).
211
+
**For Azure Active Directory B2C**: Configuring other claims in your ID token depends on whether your B2C policy is a *user flow* or a *custom policy*. For information about user flows, see [Set up a sign-up and sign-in flow in Azure Active Directory B2C](/azure/active-directory-b2c/add-sign-up-and-sign-in-policy?pivots=b2c-user-flow). For information about custom policy, see [Provide optional claims to your app](/azure/active-directory-b2c/configure-tokens?pivots=b2c-custom-policy#provide-optional-claims-to-your-app).
212
212
213
213
For other identity providers, see the relevant documentation.
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/plan-issuance-solution.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -176,7 +176,7 @@ The following provides areas to consider when planning for performance:
176
176
* To limit latency, deploy your issuance frontend website and key vault in the region listed above.
177
177
178
178
Model based on throughput:
179
-
* The Issuer service is subject to [Azure Key Vault service limits](../../key-vault/general/service-limits.md).
179
+
* The Issuer service is subject to [Azure Key Vault service limits](/azure/key-vault/general/service-limits).
180
180
181
181
* For Azure Key Vault, there are three signing operations involved in each a VC issuance:
182
182
@@ -186,7 +186,7 @@ Model based on throughput:
186
186
187
187
* One for the contract download
188
188
189
-
* You can't control throttling; however, we recommend you read [Azure Key Vault throttling guidance](../../key-vault/general/overview-throttling.md).
189
+
* You can't control throttling; however, we recommend you read [Azure Key Vault throttling guidance](/azure/key-vault/general/overview-throttling).
190
190
191
191
* If you're planning a large rollout and onboarding of VCs, consider batching VC creation to ensure you don't exceed limits.
192
192
@@ -216,7 +216,7 @@ For scalability, consider implementing metrics for the following items:
216
216
217
217
* Monitor Azure Key Vault using the following link:
218
218
219
-
*[Azure Key Vault monitoring and alerting](../../key-vault/general/alert.md)
219
+
*[Azure Key Vault monitoring and alerting](/azure/key-vault/general/alert)
220
220
221
221
* Monitor the components used for your business logic layer.
222
222
@@ -226,7 +226,7 @@ To plan for reliability, we recommend:
226
226
227
227
* After you define your availability and redundancy goals, use the following guides to understand how to achieve your goals:
228
228
229
-
*[Azure Key Vault availability and redundancy - Azure Key Vault](../../key-vault/general/disaster-recovery-guidance.md)
229
+
*[Azure Key Vault availability and redundancy - Azure Key Vault](/azure/key-vault/general/disaster-recovery-guidance)
230
230
231
231
* For frontend and business layer, your solution can manifest in an unlimited number of ways. As with any solution, for the dependencies you identify, ensure that the dependencies are resilient and monitored.
232
232
@@ -272,7 +272,7 @@ As part of your design considerations focused on security, we recommend the foll
272
272
273
273
For security logging and monitoring, we recommend the following items:
274
274
275
-
* Enable logging and alerting of Azure Key Vault. Track credential issuance operations, key extraction attempts and permission changes. Monitor and send alert for configuration changes. More information can be found at [How to enable Key Vault logging](../../key-vault/general/howto-logging.md).
275
+
* Enable logging and alerting of Azure Key Vault to track credential issuance operations, key extraction attempts, permission changes, and to monitor and send alert for configuration changes. More information can be found at [How to enable Key Vault logging](/azure/key-vault/general/howto-logging).
276
276
277
277
* Archive logs in a security information and event management (SIEM) systems, such as [Microsoft Sentinel](https://azure.microsoft.com/services/azure-sentinel) for long-term retention.
278
278
@@ -292,7 +292,7 @@ For guidance on managing your Azure environment, we recommend you review the [Mi
292
292
293
293
When you complete your POC, gather all the information and documentation generated, and consider tearing down the issuer configuration.
294
294
295
-
For more information on Key Vault implementation and operation, see [Best practices to use Key Vault](../../key-vault/general/best-practices.md). For more information on Securing Azure environments with Active Directory, see[Securing Azure environments with Microsoft Entra ID](https://aka.ms/AzureADSecuredAzure).
295
+
For more information on Key Vault implementation and operation, refer to [Best practices to use Key Vault](/azure/key-vault/general/best-practices). For more information on Securing Azure environments with Active Directory, refer to[Securing Azure environments with Microsoft Entra ID](https://aka.ms/AzureADSecuredAzure).
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/plan-verification-solution.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ This content covers the technical aspects of planning for a verifiable credentia
27
27
28
28
Supporting technologies that aren't specific to verification solutions are out of scope. For example, websites are used in a verifiable credential verification solution but planning a website deployment isn't covered in detail.
29
29
30
-
As you plan your verification solution, you must consider what business capability is being added or modified. You must also consider what IT capabilities can be reused, and what capabilities must be added to create the solution. Also consider what training is needed for the people involved in the business process and the people that support the end users and staff of the solution. These articles aren't covered in this content. We recommend reviewing the [Microsoft Azure Well-Architected Framework](/azure/architecture/framework/) for information covering these articles.
30
+
As you plan your verification solution, you must consider what business capability is being added or modified. You must also consider what IT capabilities can be reused, and what capabilities must be added to create the solution. Also consider what training is needed for the people involved in the business process and the people that support the end users and staff of the solution. These articles aren't covered in this content. We recommend reviewing the [Microsoft Azure Well-Architected Framework](/azure/well-architected/) for information covering these articles.
31
31
32
32
## Components of the solution
33
33
@@ -271,19 +271,19 @@ The following items provide areas to consider when planning for performance:
271
271
272
272
* Model based on throughput:
273
273
274
-
* VC verification capacity is subject to [Azure Key Vault service limits](../../key-vault/general/service-limits.md).
274
+
* VC verification capacity is subject to [Azure Key Vault service limits](/azure/key-vault/general/service-limits).
275
275
276
276
* Each verification of a VC requires one Key Vault signature operation.
277
277
278
-
* You can't control throttling; however, we recommend you read [Azure Key Vault throttling guidance](../../key-vault/general/overview-throttling.md) so that you understand how throttling might impact performance.
278
+
* You can't control throttling; however, we recommend you read [Azure Key Vault throttling guidance](/azure/key-vault/general/overview-throttling) so that you understand how throttling might impact performance.
279
279
280
280
## Plan for reliability
281
281
282
282
To best plan for high availability and disaster recovery, we suggest the following items:
283
283
284
284
* Microsoft Entra Verified ID service is deployed in the West Europe, North Europe, West US 2, and West Central US, Australia and Japan Azure regions. Consider deploying your supporting web servers and supporting applications in one of those regions, specifically in the ones from which you expect most of your validation traffic to originate.
285
285
286
-
* Review and incorporate best practices from [Azure Key Vault availability and redundancy](../../key-vault/general/disaster-recovery-guidance.md) as you design for your availability and redundancy goals.
286
+
* Review and incorporate best practices from [Azure Key Vault availability and redundancy](/azure/key-vault/general/disaster-recovery-guidance) as you design for your availability and redundancy goals.
287
287
288
288
## Plan for security
289
289
@@ -295,7 +295,7 @@ As you're designing for security, consider the following:
295
295
296
296
* Only the Microsoft Entra Verified ID service and the website service principals should have permissions to use Key Vault to sign messages with the private key.
297
297
298
-
* Don't assign any human identity administrative permissions to the Key Vault. For more information on Key Vault best practices, see [Azure Security Baseline for Key Vault](../../key-vault/general/security-baseline.md).
298
+
* Don't assign any human identity administrative permissions to the Key Vault. For more information on Key Vault best practices, see [Azure Security Baseline for Key Vault](/security/benchmark/azure/baselines/key-vault-security-baseline).
299
299
300
300
* Review [Securing Azure environments with Microsoft Entra ID](https://azure.microsoft.com/resources/securing-azure-environments-with-azure-active-directory/) for best practices for managing the supporting services for your solution.
301
301
@@ -323,11 +323,11 @@ As part of your operational planning, consider monitoring the following:
323
323
324
324
* Monitor underlying dependencies used by the verification solution.
325
325
326
-
* Follow [Azure Key Vault monitoring and alerting](../../key-vault/general/alert.md).
326
+
* Follow [Azure Key Vault monitoring and alerting](/azure/key-vault/general/alert).
327
327
328
328
***For security**:
329
329
330
-
* Enable logging for Key Vault to track signing operations, and to monitor and alert on configuration changes. See [How to enable Key Vault logging](../../key-vault/general/howto-logging.md) for more information.
330
+
* Enable logging for Key Vault to track signing operations, and to monitor and alert on configuration changes. Refer to [How to enable Key Vault logging](/azure/key-vault/general/howto-logging) for more information.
331
331
332
332
* Archive logs in a security information and event management (SIEM) systems, such as [Microsoft Sentinel](https://azure.microsoft.com/services/azure-sentinel/) for long-term retention.
0 commit comments