VERIFIED CREDENTIALS

Examples

Originally from: https://dev.azure.com/transport-canada/REEF (e-licensing)/_wiki/wikis/REEF-(e-licensing).wiki/6016/VC-Examples


These examples have been created to help understand issues, verify and revoke credentials and they will be available only in DEV.

Note1: These examples are works in progress and it is not 100% without bugs.
Note2: It is working only with Microsoft Authenticator App

Download the Authenticator App to try it out.

Issuing a credential

Verifying a credential

 

 

VC PostMan Example

 

These examples have been created to help understand issues, verify and revoke credentials and it will be available only in DEV.

VerifiedID Admin API User delegate.postman_collection.json
VerifiedID Request Admin API Application Token.postman_collection.json
VerifiedID Request API.postman_collection.json

for instruction please refer to:
https://github.com/Azure-Samples/active-directory-verifiable-credentials/tree/main/Postman

 

 

Key Vault secrets replication

 

steps:

To download and upload secrets from and to an Azure Key Vault, follow these steps:

Log into Azure and browse to Azure Cloud Shell, then choose the PowerShell option.

  1. Download secrets from the Key Vault using the download_keyvault_secrets_with_values.ps1 script. Replace ncasafsecsurkv01 with the name of your Azure Key Vault:

Run the following script:

.\download_keyvault_secrets_with_values.ps1 -KeyVaultName "ncasafsecsurkv01"
  1. The script will create a JSON file named secrets_with_values.json containing the downloaded secrets. Ensure that you modify the contents to your needs.

  2. Upload the secrets from the JSON file to the Key Vault using the upload_secrets_to_keyvault.ps1 script. Replace ncasafsecsurkv01 with the name of your Azure Key Vault:

Run the following script:

.\upload_secrets_to_keyvault.ps1 -KeyVaultName "ncasafsecsurkv01" -SecretsFile "secrets_with_values.json"

These instructions will help you download and upload secrets to your Azure Key Vault using the provided PowerShell scripts.

Please note attached scripts
upload_secrets_to_keyvault.ps1
download_keyvault_secrets_with_values.ps1

 

 

VerifiedCredentials Project instructions

 

Please be advised of the following instructions for running the VerifiedCredentials Project in development mode:

  1. Please clone the VerifiedCredentials project from the following link: https://dev.azure.com/transport-canada/REEF (e-licensing)/_git/EPL-LEP?version=GBVerifiedCredentials.

  2. Next, include the following configuration to the secrets.json file: Right-click on the VerifiedCredential project in Visual Studio and select 'Manage User Secrets'. Then, enter the following information:

{
"VerifiedIDSettings": {
"Endpoint": "https://verifiedid.did.msidentity.com/v1.0/ ",
"VCServiceScope": "3db474b9-6a0c-4840-96ac-1fceb342124f/.default",
"Instance": "https://login.microsoftonline.com/{0} ",
"TenantId": "override",
"ClientId": "override",
"ClientSecret": "override",
"CertificateName": "[MAKE EMPTY WHEN NOT USED Or instead of client secret: Enter here the name of a certificate (from the user cert store) as registered with your application]",
"IssuerAuthority": "did:web:michellecoelhostorage.z13.web.core.windows.net",
"VerifierAuthority": "did:web:michellecoelhostorage.z13.web.core.windows.net",
"CredentialManifest": "https://verifiedid.did.msidentity.com/v1.0/tenants/2a30f6a6-7a8d-47ea-bcc9-cbb3ed0553bc/verifiableCredentials/contracts/4ea74351-2268-777a-3993-4155b092f924/manifest "
}
}

  1. Launch the application using the 'VerifiableCredentials' launch setting.

  2. Ensure that the Cisco VPN client is in disconnected mode.

  3. download and run ngrok , you can download ngrok from ngrok | API Gateway, IoT Device Gateway, Secure Tunnels for Containers, Apps & APIs

  4. type the following in ngrok command line screen: ngrok http https://localhost:7135/

  5. copy and browse Forwarding link from ngrok command window: example https://c5b9-72-138-109-46.ngrok-free.app

-