Decentralised Identity is a technology I’m passionate about and have written many posts and tools on as well as participating in hackathons. Microsoft’s Entra Verified ID solution is an offering I’ve been a part of from the early previews. It can be time consuming setting up and getting all the configuration items correct. This month (October 2023) Microsoft released a new express wizard to setup Verified ID in an Entra ID Tenant. This new express Verified ID setup process is crazily quick.

“Unlock verifiable workplace credentials. It only takes a click and will be ready for use instantly”

Search for Verified ID in the Azure Portal and select it.

Having previously setup Entra Verified ID (or as it was formally known, Azure Active Directory Verifiable Credentials) many times I’m intimate with all the configuration items required to set it up the first time. For those not familiar with the process at a high level it requires an Application Registration a Key Vault, Domain verification and many permission configurations. The full process is here.

Now you can simply click the Get started button shown in the screen above and as long as you meet the following prerequisites you will have configured Entra Verified ID in your tenant and created the first verifiable credential quicker than it took you to read this.

Prerequisites

The prerequisites are:

  • you are a global administrator or have the authentication policy administrator permission for the Entra ID tenant
  • you have a custom domain registered for the Microsoft Entra tenant

Credential Configuration

Having clicked just the one button the first verifiable credential will have been created and all you have to do is update the look and feel to fit your organisation. That simply involves updating the logo and colours.

The logo must be on a publically addressable location (below I put mine on this blog) and a couple of HTML colour code changes later, I was done.

After selecting update and save.

Issuing our new Verifiable Credential

Now we have a Verifiable Credential created, let’s see what the defaults are for it and who can be issued one.

By default any Entra ID user in the tenant can be issued the VC. And the new feature of being able to self request via the MyAccount portal is selected by default.

Self Service Verified ID Verifiable Credential

So lets jump over to MyAccount using an Entra ID user account and get a Verified ID VC.

Using the Microsoft Authenticator App and the VC wallet feature I scan the QR code.

I’m shown the VC and can click Add.

And it’s issued. My new Verified ID VC is now in my Authenticator Verified ID Wallet.

Looking at the new VC we can see the claims that it contains. Basically your naming information. There are additional claims but I didn’t have those attributes populated on my Entra ID user account. More details on those further below.

Verified ID Quick Setup Defaults

Selecting the credential we can then look at the default configuration.

There are 8 default claims as part of the VC.

Digging Deeper

Let’s dig deeper into where the DID configuration is located and have a look at the configuration there. From the VC I copy the manifest URL.

Then using my DIDSearcher PowerShell Module (GitHub link) and the Search-DecentralizedIdentifer cmdlet we can get the manifest configuration and convert the token using the Get-DIDJWTDetails cmdlet.

We can then dig down into the properties of the configuration.

Summary

If you are new to Entra Verified ID and want to have a quick painless method to get started this is definitely for you. If you want to create VCs with different claims this setup creates the foundation which you can then use to create custom VCs. Either way there has NEVER been an easier or quicker method to get started with Entra Verified ID. Give it a go.

Darren Robinson

Bespoke learnings from a Microsoft Identity and Access Management Architect using lots of Microsoft Identity Manager, Azure Active Directory, PowerShell, SailPoint IdentityNow and Lithnet products and services.

Recent Posts

PowerShell MCP Azure Function Server

Recently under the experimental Azure Functions build Microsoft Developer Advocates have shown enabling Azure Functions…

2 weeks ago

EntraPulse – Your AI-Powered Gateway to Microsoft Graph & Docs

Today, I’m super excited to finally announce the Beta release of EntraPulse Lite – a…

2 months ago

Lokka MCP Authentication Enhancements

I'm excited to share some significant authentication enhancements I've contributed to the Lokka MCP Server…

3 months ago

AI Inception: Building AI Solutions with AI for AI

Last month I had the pleasure of speaking at the Sydney event for Global Azure.…

4 months ago

A Have I Been Pwned MCP Server for Claude

Model Context Protocol (MCP) is a powerful framework that extends AI clients like Claude and…

6 months ago

Azure AI Developer Hackathon

I've just completed participating in the Azure AI Developer Hackathon that was looking to provide…

6 months ago

This website uses cookies.