Примітка
Доступ до цієї сторінки потребує авторизації. Можна спробувати ввійти або змінити каталоги.
Доступ до цієї сторінки потребує авторизації. Можна спробувати змінити каталоги.
Our Identity Verification (IDV) partner network extends Microsoft Entra Verified ID capabilities to help you build seamless end-user experiences. With Verified ID, you can integrate with IDV partners to enable scenarios like remote onboarding with government ID checks using identity verification and proofing services. The diagram shows a low-level workflow of how all parties interact with each other in a remote onboarding scenario. This integration pattern could be used as a reference.
The following section covers a set of steps that IDVs can use for setting up issuance flows and by customers for verifying IDV Verified IDs.
Issuer flow
Identity Verification (IDV) partners are Independent Software vendors (ISVs) who can use Verified ID Request Service REST API to issue Verified IDs. The steps required by an IDV to function as an issuer are as follows:
Set up Microsoft Entra Verified ID Service: using Quick setup or Advanced setup instructions.
Note
For a multi-tenant model, IDV should explore setting up dedicated authorities if there is a 1:1 relationship required with the customer. Refer to the Admin API section of the docs for creating authorities.
Set up a credential definition that defines what type of credentials you'll issue from the service – Custom Credential. Based on the scenario, select between ID token (for Open ID connect attestations from providers) or ID token hint (ISVs to use REST APIs to get the required attestations), self issued (user provided input), presentation or multiple attestations.
Make sure to publish the credential in the Verified ID network if this credential is for general purpose consumption. If this credential was created for a specific customer, then skip this step. To publish the credential in the Verified ID network, select Issue a credential option under Manage and then select Publish credential to Verified ID network checkbox. You could also use Admin APIs to set “availableInVcDirectory" to true for the credential.
IDV must configure an offer or customer jumpstart URL for the user journey and integrates it in customer’s relying party application. Refer step5 in the diagram as an example.
The end user starts the journey on the relying party application – in the example above, Contoso’s onboarding portal asks the user to prove their identity. If the user already has the required Verified ID for onboarding, they'll follow steps 1 through 4 in the diagram. If the user doesn’t have the required Verified ID, user has to launch the IDV offer URL from onboarding application to initiate the identity verification process. The IDV and customer relying party need to build this redirection model. The IDV needs to identify that the user is coming to the IDV portal from a registered organization and isn't a SPAM request. The relying party needs to generate a “one-time” use url with a JWT token, for example:
https://idvpartner.com/contoso/?token=jwt_token
Note that the JWT token is signed with customer's relying party private key and the public key is shared with the IDV via an endpoint or via a scheduled process. The IDV needs to ensure that for the kickstart journey, it uses attributes from the JWT like org ID, request ID, mscv ID, and expiry. Note that mscv is preferred for end-to-end troubleshooting. An example of the JWT could be as follows:
Header: Algorithm and Token type
{ "alg": "RS256", "typ": "JWT" }
PAYLOAD: DATA
{ "OrgId": "", "RequestId": "", "exp": 1684986555, "redirectUrl": "https://customerRPurl" }
Upon successful completion, IDV kicks off Verified ID issuance flow and issues a Verified ID. At this point, user is presented with a deep link or QR code to Add Card in Microsoft Authenticator application. The IDV website receives a successful issuance callback from Verified ID service.
Note
IDV partner must provide or build the required web experience where the identity of the user can be proofed in any way necessary as agreed between the relying party application and IDV partner. When the process is completed a list of values are collected according to the Verified ID Credential Type. These values (as “claims” parameter) are passed as part of the Verified ID issuance request API call. If the IDV is building this journey on a webapp, IDV needs to render it as a QR code or deep link. For further details, refer to Specify the Request Service REST API issuance request.
IDV redirects the user back to the customer’s relying party application.
For the remainder of the steps in the diagram (that is, from steps 14 to 16), user is asked to present Verified ID with FaceCheck. On successful presentation, user is onboarded to the system.
Note
Customer must work with IDV partner to setup the required IDV onboarding steps that include organization onboarding, billing contracts and other required pre-requisites.
Verifier flow
Application developers can use Verified ID issued by IDVs for the verification flows in their applications. Refer planning a verification solution document for planning details. The steps required to setup verification are as follows:
Set up Microsoft Entra Verified ID Service: using Quick setup or Advanced setup instructions.
If you have details like VCType and did from the IDV partner, then you can use the payload reference from Presentation Request API section to verify Verified IDs issued by Identity verification partners (IDVs).
Customers can also generate the presentation request API payload using the following steps:
- Go to Microsoft Entra admin center -> Verified ID.
- Select Create Verification Request tab
- Choose Select first user.
- Look for the respective IDV in the Search/select issuers drop-down menu by typing their name for example woodgrove.com.
- Select the credential type that your application requires from the IDV for verification. This is also referred as VCType in Presentation Request API payload.
- Select Add and then select Review.
- Download the request body and Copy/paste POST API request URL.
- Developers now have the request URL and body from their tenant admin and can follow these steps to update your application or website. To request Verified IDs from your users, include the request URL and body in your application or website.
Note
Refer Microsoft Entra Verified ID GitHub repository for sample applications https://aka.ms/vcsample
- Be sure to replace the values for the URL, state, and api-key with your respective values.
- Grant permissions to your app to obtain access token for the Verified ID service request service principal.
To test the user flow, you could always deploy one of the sample applications in your Azure App service environment, using sample apps documentation.
Partner list
The following table showcases the list of Verified ID IDV partners. If you're an IDV partner seeking to get listed in this gallery, submit your solution details using the self-submission form: https://aka.ms/VIDCertifiedPartnerForm.
IDV partner | Description | Integration walkthroughs |
---|---|---|
![]() |
AU10TIX improves Verifiability While Protecting Privacy For Businesses, Employees, Contractors, Vendors, And Customers. | Configure Verified ID by AU10TIX as your Identity Verification Partner. |
![]() |
LexisNexis risk solutions Verifiable credentials enable faster onboarding for employees, students, citizens, or others to access services. | Configure Verified ID by LexisNexis Risk Solutions as your Identity Verification Partner. |
![]() |
Vu verifiable credentials with just a selfie and your ID. | Configure Verified ID by VU Identity Card as your Identity Verification Partner |
![]() |
Start issuing and accepting verifiable credentials in minutes. With verifiable credentials and Onfido you can verify a person’s identity while respecting privacy. Digitally validate information on a person’s ID or their biometrics. | * |
![]() |
Jumio is helping to support a new form of digital identity by Microsoft based on verifiable credentials and decentralized identifiers standards to let consumers verify once and use everywhere. | * |
![]() |
Idemia Integration with Verified ID enables “Verify once, use everywhere” functionality. | Configure Verified ID by IDEMIA as your identity verification partner |
![]() |
Clear Collaborates with Microsoft to Create More Secure Digital Experience Through Verification Credential. | * |
* - no documentation available yet
Next steps
Select a partner in the tables mentioned to learn how to integrate their solution with your application. Learn more
- Microsoft Entra Verified ID demo website: https://aka.ms/vcdemo
- GitHub samples: https://aka.ms/vcsample
- Identity Challenge Demo with FaceCheck: https://aka.ms/facecheckdemo
- Specification for the Microsoft correlation vector mscv: this is a protocol for tracing and correlation of events through a distributed system based on a lightweight vector clock.