Skip to main content

Instance configuration

The following configuration settings can be administered for each instance of the Verified Orchestration platform.

These settings are controlled via the Configuration page in Composer.

To change settings, you will need to be a member of the Instance admin user role.

CORS origins

If you are accessing the Verified Orchestration API or OIDC endpoint from a web application, CORS origins will need to be configured against each instance (sandbox and production).

  • Subdomains can be matched using a regular expression; e.g. ^https://([a-z0-9]+[.])*yourcompany\.com$
  • For your sandbox, you may want to allow local development origins e.g. ^http(s?)://localhost(:\d+)?$

Additional tenant IDs

If you want to allow the users from the tenants other than your home tenant to access the Verified Orchestration API, those tenant IDs will need to be configured against each instance (sandbox and production).

Application labels

As you onboard applications, you can supply user-friendly labels, helping users to understand which apps are issuing or requesting presentation of credentials.

To supply a label for an app, provide the app's object ID from the Enterprise Apps list in the Azure Portal, along with the label.

Example application label mapping:

App object ID (OID)Label
00000000-0000-0000-0000-000000000000Your app name

Identity issuer labels

You may integrate several identity providers as a source of issuee identity data. Identities are uniquely identified by the issuer and identifier fields. We recommend you standardise use of the issuer field across different applications to avoid duplicate representations of the same identity. We recommend using the tenant ID or iss (issuer) claim from JWTs for the issuer field.

To supply a label for an identity issuer, provide the issuer's identifier along with the label.

Note: your home tenant is automatically labelled.

Example issuer label mapping:

IssuerLabel
00000000-0000-0000-0000-000000000000Tenant label
https://b2cinstanceb2clogin.com/00000000-0000-0000-0000-000000000000/v2.0/B2C label

GraphQL security settings

The Verified Orchestration API uses GraphQL for querying and mutating data. To ensure the API is not misused, the following security settings are configured out of the box with sensible defaults. However, these settings can be adjusted to suit your requirements.

RuleDefaultDescription
Max Aliases30Limit the number of aliases in a GraphQL document.
Max Depth12Limit the depth of a GraphQL document.
Max Directives50Limit the number of directives in a GraphQL document.
Max Tokens2500Limit the number of tokens in a GraphQL document.

If you need to adjust GraphQL security settings, please contact the Verified Orchestration team to make changes on your behalf.