Skip to content

A code sample demonstrating how to use Azure Active Directory's preview functionality to issue and consume verifiable credentials.

License

Notifications You must be signed in to change notification settings

bajazid/active-directory-verifiable-credentials-dotnet

 
 

Repository files navigation

Azure AD Verifiable Credentials Samples

This repo contains a set of Azure AD Verifiable Credentials samples

Samples

Sample Description
1-asp-net-core-api-idtokenhint dotnet sample for using the VC Request API to issue and verify verifiable credentials with a credential contract which allows the VC Request API to pass in a payload for the Verifiable Credentials
2-asp-net-core-api-user-signin dotnet sample for a developer who wants to provide the signed-in users an option to get and present Verifiable credentials using the VC Request API. Note: This is different from 1-asp-net-core-api-idtokenhint sample as follows : User sign-in is a requirement to issue credentials since the credentials have claims (first name, last name) based on the signed-in user's idToken.'
3-asp-net-core-api-b2c dotnet sample for using the VC Request API to issue and verify verifiable credentials in a B2C policy

Microsoft provides a simple to use REST API to issue and verify verifiable credentials. You can use the programming language you prefer to the REST API. Instead of needing to understand the different protocols and encryption algoritms for Verifiable Credentials and DIDs you only need to understand how to format a JSON structure as parameter for the VC Request API.

API Overview

Issuance

Issuance JSON structure

To call the VC Client API to start the issuance process, the VC Request API needs a JSON structure payload like below.

{
  "authority": "did:ion: ...of the Issuer",
  "includeQRCode": true,
  "registration": {
    "clientName": "the verifier's client name"
  },
  "callback": {
    "url": "https://contoso.com/api/issuer/issuanceCallback",
    "state": "you pass your state here to correlate it when you get the callback",
    "headers": {
      "api-key": "API key to help protect your callback API"
    }
  },
  "type": "your credentialType",
  "manifest": "https://beta.did.msidentity.com/v1.0/3c32ed40-8a10-465b-8ba4-0b1e86882668/verifiableCredential/contracts/VerifiedCredentialExpert",
  "pin": {
    "value": "012345",
    "length": 6
  },
  "claims": {
    "given_name": "Megan",
    "family_name": "Bowen"
  }
}
  • authority - is the DID identifier for your registered Verifiable Credential from portal.azure.com.
  • includeQRCode - If you want the VC Client API to return a data:image/png;base64 string of the QR code to present in the browser. If you select false, you must create the QR code yourself (which is not difficult).
  • registration.clientName - name of your app which will be shown in the Microsoft Authenticator
  • callback.url - a callback endpoint in your application. The VC Request API will call this endpoint when the issuance is completed.
  • callback.state - A state value you provide so you can correlate this request when you get callback confirmation
  • callback.headers - Any HTTP Header values that you would like the VC Request API to pass back in the callbacks. Here you could set your own API key, for instance
  • type - the name of your credentialType. This value is configured in the rules definition.
  • manifest - url of your manifest for your VC. This comes from your defined Verifiable Credential in portal.azure.com
  • pin - If you want to require a pin code in the Microsoft Authenticator for this issuance request. This can be useful if it is a self issuing situation where there is no possibility of asking the user to prove their identity via a login. If you don't want to use the pin functionality, you should not have the pin section in the JSON structure. The appsettings.PinCode.json contains a settings for issuing with pin code.
  • claims - optional, extra claims you want to include in the VC.

In the response message from the VC Request API, it will include a URL to the request which is hosted at the Microsoft VC request service, which means that once the Microsoft Authenticator has scanned the QR code, it will contact the VC Request service directly and not your application directly. Your application will get a callback from the VC Request service via the callback.

{
    "requestId": "799f23ea-524a-45af-99ad-cf8e5018814e",
    "url": "openid-vc://vc?request_uri=https://beta.did.msidentity.com/v1.0/abc/verifiablecredentials/request/178319f7-20be-4945-80fb-7d52d47ae82e",
    "expiry": 1622227690,
    "qrCode": "data:image/png;base64,iVBORw0KGgoA<SNIP>"
}

Issuance Callback

In your callback endpoint, you will get a callback with the below message when the QR code is scanned. This callback is typically used to modify the UI, hide the QR code to prevent scanning again and show the pincode to use when the user wants to accept the Verifiable Credential.

{
  "requestStatusCode": "request_retrieved",
  "requestId": "9463da82-e397-45b6-a7a2-2c4223b9fdd0",
  "state": "...what you passed as the state value..."
}

Once the VC is issued, you get a second callback which contains information if the issuance of the verifiable credential to the user was succesful or not.

This callback is typically used to notify the user on the issuance website the process is completed and continue with whatever the website needs or wants the user to do.

Successful Issuance flow response

{
  "requestStatus": "issuance_successful",
  "requestId": "9463da82-e397-45b6-a7a2-2c4223b9fdd0",
  "state": "...what you passed as the state value..."
}

Unuccesful Issuance flow response

{
  "requestStatus":"issuance_failed",
  "requestId":"9463da82-e397-45b6-a7a2-2c4223b9fdd0", 
  "state": "...what you passed as the state value...",
  "error": {
      "code":"IssuanceFlowFailed",
      "message":"issuance_service_error",
    }
}

When the issuance fails this can be caused by several reasons. The following details are currently provided in the error part of the response:

Message Definition
fetch_contract_error The user has canceled the flow
issuance_service_error VC Issuance service was not able to validate requirements / something went wrong on Microsoft AAD VC Issuance service side.
unspecified_error Something went wrong that doesn’t fall into this bucket

Changes from public preview

  • renamed issuers to verifiedCredentialsData to have a more meaningful name
  • renamed code to requestStatusCode to differentiate it with http status code
  • added domainValidation object containing link domain validation fields
  • added credentialState containing the vc status information
    • isExpired: true if the card is expired, false by default
    • revocationStatus: evolvable enum containing the revocation status

Verification

Verification JSON structure

To call the VC Request API to start the verification process, the application creates a JSON structure like below. Since the WebApp asks the user to present a VC, the request is also called presentation request.

{
  "authority": "did:ion: did-of-the-Verifier",
  "includeQRCode": true,
  "registration": {
    "clientName": "the verifier's client name",
    "purpose": "the purpose why the verifier asks for a VC"
  },
  "callback": {
    "url": "https://contoso.com/api/verifier/presentationCallback",
    "state": "you pass your state here to correlate it when you get the callback",
    "headers": {
      "api-key": "API key to help protect your callback API"
    }
  },
  
  "includeReceipt": false,
  "requestedCredentials": [
    {
      "type": "your credentialType",
      "purpose": "the purpose why the verifier asks for a VC",
      "acceptedIssuers": [ "did:ion: ...of the Issuer" ]
    },
    "configuration": {
      "validation": {
        "allowRevoked": true,
        "validateLinkedDomain": true
      }
    } 
  ]
}

Much of the data is the same in this JSON structure, but some differences needs explaining.

  • authority vs acceptedIssuers - The Verifier and the Issuer may be two different entities. For example, the Verifier might be a online service, like a car rental service, while the DID it is asking for is the issuing entity for drivers licenses. Note that acceptedIssuers is a collection of DIDs, which means you can ask for multiple VCs from the user coming from different trusted issuers.
  • requestedCredentials - please also note that the requestedCredentials is a collection too, which means you can ask to create a presentation request that contains multiple DIDs.
  • includeReceipt - if set to true, the presentation_verified callback will contain the receipt element.

Verification Callback

In your callback endpoint, you will get a callback with the below message when the QR code is scanned.

When the QR code is scanned, you get a short callback like this.

{
  "code":"request_retrieved",
  "requestId":"c18d8035-3fc8-4c27-a5db-9801e6232569", 
  "state": "...what you passed as the state value..."
}

Once the VC is verified, you get a second, more complete, callback which contains all the details on what whas presented by the user.

{
  "code":"presentation_verified",
  "requestId":"c18d8035-3fc8-4c27-a5db-9801e6232569",
  "state": "...what you passed as the state value...",
  "subject": "did:ion: ... of the VC holder...",
  "verifiedCredentialsData": [
    {
      "type": [
      "VerifiableCredential",
      "VerifiedCredentialExpert"
      ],
      "issuer": "did:ion of the issuer of this verifiable credential ",
      "claims": {
          "lastName":"Bowen",
          "firstName":"Megan" 
      },
      "credentialState": {
        "isExpired": true,
        "revocationStatus": "VALID/REVOKED/UNKNOWN"
      },
      "domainValidation": {
        "url": "https://contoso.com/",
      }
    }
  ],
  "receipt":{
      "id_token": "...JWT Token of VC..."
    }
  }
}

Some notable attributes in the message:

  • claims - parsed claims from the VC
  • receipt.id_token - the ID token of the presentation, this is the full presentation Authenticator has send to the Request service. Great for debugging and also to retrieve information not available in the payload. To keep the responses small the receipt property in the request should be set to false.

Changes from public preview

  • Removed the presentation object because this endpoint will only handle presentation requests.
  • added the configuration object, which is used to specify additional behavioural configuration for the endpoint. It contain configuration for the validation, but in the future it could be extended to configure other portions of the flow.

Setup

Before you can run any of these samples make sure your environment is setup correctly. You can follow the setup instructions here

Resources

For more information, see MSAL.NET's conceptual documentation:

About

A code sample demonstrating how to use Azure Active Directory's preview functionality to issue and consume verifiable credentials.

Resources

License

Code of conduct

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C# 58.5%
  • HTML 25.2%
  • PowerShell 13.9%
  • CSS 1.8%
  • Other 0.6%