|
| 1 | +--- |
| 2 | +title: Publish Apps to Azure DevOps from App Builder + Microsoft Account Type Requirements |
| 3 | +_description: Learn how to publish applications to Azure DevOps directly from App Builder and understand how different Microsoft account types impact authentication and access. |
| 4 | +_keywords: App Builder, Azure DevOps, Azure Integration, Infragistics |
| 5 | +--- |
| 6 | + |
| 7 | +# Publishing Apps to Azure DevOps from App Builder |
| 8 | + |
| 9 | +The **Azure DevOps integration** in App Builder allows you to publish generated source code (Angular, React, Blazor, or Web Components) directly to your DevOps repositories. This streamlines handoff to development teams and fits naturally into your existing CI/CD workflows. |
| 10 | + |
| 11 | +Before you begin, it's important to understand how **Microsoft account types** affect authentication and what steps are required to enable access — [see the section below](#how-microsoft-account-types-impact-authentication) for details. |
| 12 | + |
| 13 | +## Connect to Your Existing Azure DevOps Project |
| 14 | + |
| 15 | +1. In App Builder, click the **Publish** button. |
| 16 | +2. Select **Azure DevOps** as the target platform. |
| 17 | +3. Authenticate with your Microsoft account. |
| 18 | +4. After successful login and MFA (if enabled), your Azure DevOps **organizations**, **projects**, and **repositories** will be listed for selection. |
| 19 | + |
| 20 | +> Your credentials are securely verified. App Builder only requests permissions required for publishing. |
| 21 | +
|
| 22 | + |
| 23 | +## Create a Repo for the App from App Builder |
| 24 | + |
| 25 | +If no repository exists yet: |
| 26 | + |
| 27 | +1. Choose your **organization** and **project**. |
| 28 | +2. Click **Create Repository**. |
| 29 | +3. Define the repository name and visibility (private/public – visibility depends on project settings). |
| 30 | +4. The repo is created and initialized for publishing. |
| 31 | + |
| 32 | +## Publish/Push the Code to the Repo |
| 33 | + |
| 34 | +1. Click **Publish** to generate and push your app’s source code. |
| 35 | +2. The initial publish populates the default branch (`main`) with your generated files. |
| 36 | +3. A status indicator confirms successful publishing. |
| 37 | + |
| 38 | +## Automatic CI Build |
| 39 | + |
| 40 | +Azure DevOps supports build pipelines that can be triggered on push: |
| 41 | + |
| 42 | +1. Ensure a pipeline is created and linked to the repo. |
| 43 | +2. App Builder triggers the build automatically when code is pushed. |
| 44 | +3. Monitor build status from within Azure DevOps. |
| 45 | + |
| 46 | +## Pull Requests for Follow-up Changes |
| 47 | + |
| 48 | +For subsequent publishes: |
| 49 | + |
| 50 | +1. App Builder creates a **feature branch** with a unique name. |
| 51 | +2. A **Pull Request (PR)** is automatically generated. |
| 52 | +3. The build pipeline runs on the PR to validate the changes. |
| 53 | +4. You can review code diffs before merging. |
| 54 | + |
| 55 | +> This workflow ensures code quality and team collaboration. |
| 56 | +
|
| 57 | +## Deploy as Live App (Coming Soon) |
| 58 | + |
| 59 | +Soon, you’ll be able to deploy your app to **Azure Web Apps** directly from App Builder. |
| 60 | + |
| 61 | +- Will support both **standard** and **static web apps** |
| 62 | +- Simplifies deployment for customer demos and staging environments |
| 63 | + |
| 64 | +# How Microsoft Account Types Impact Authentication |
| 65 | + |
| 66 | +When connecting Azure DevOps to App Builder, authentication is handled via Microsoft Entra ID (formerly Azure Active Directory). Account type directly impacts the success of this connection. |
| 67 | + |
| 68 | +## Supported Microsoft Account Types |
| 69 | + |
| 70 | +### Work or School Accounts (Azure AD) |
| 71 | + |
| 72 | +- Examples: `user@company.com`, `user@tenant.onmicrosoft.com` |
| 73 | +- Fully supported |
| 74 | +- Require no additional setup in most cases |
| 75 | +- Can grant necessary access based on organizational policy |
| 76 | + |
| 77 | +### Personal Microsoft Accounts |
| 78 | + |
| 79 | +- Examples: `user@outlook.com`, `user@hotmail.com` |
| 80 | +- Not supported directly due to Azure DevOps access policies |
| 81 | +- Will result in an authentication error (e.g., `AADSTS500202`) |
| 82 | +- **Workaround**: |
| 83 | + - Add the user as a **guest** to your Azure AD tenant, or |
| 84 | + - Convert the personal account into a **work account** |
| 85 | + |
| 86 | +## Domain Verification & Account Classification |
| 87 | + |
| 88 | +The domain associated with your email address determines how Microsoft classifies the account. |
| 89 | + |
| 90 | +| **Email Address** | **Domain Status** | **Account Type** | **Authentication Support** | |
| 91 | +|------------------------------|-----------------------|------------------|----------------------------------------| |
| 92 | +| `user@company.com` | Verified | Work | ✅ Works out-of-box | |
| 93 | +| `user@tenant.onmicrosoft.com`| Built-in Azure domain | Work | ✅ Works out-of-box | |
| 94 | +| `user@outlook.com` | N/A | Personal | ❌ Not supported | |
| 95 | +| `user@mydomain.com` | Unverified | Personal | ❌ Not supported unless domain verified | |
| 96 | + |
| 97 | +### How to Verify a Domain |
| 98 | + |
| 99 | +1. Go to **Microsoft Entra ID** > **Custom domain names** |
| 100 | +2. Add your domain |
| 101 | +3. Follow DNS steps to add a **TXT record** to your domain registrar |
| 102 | + |
| 103 | + |
| 104 | +## Best Practices for Organizations |
| 105 | + |
| 106 | +To ensure smooth integration and avoid authentication issues: |
| 107 | + |
| 108 | +- ✅ Use **work or school accounts** associated with Azure AD |
| 109 | +- ✅ **Verify your domains** in Microsoft Entra ID |
| 110 | +- ✅ Configure **Azure DevOps** to use your Azure AD directory |
| 111 | +- ✅ Ensure a **service principal** is registered for DevOps access |
| 112 | +- ⚠ For personal accounts: |
| 113 | + - Invite them as **guests** in your tenant |
| 114 | + - Or provision a **work account** for development activities |
0 commit comments