Skip to content

Commit 3c2167d

Browse files
Merge pull request #8563 from MicrosoftDocs/main
Auto Publish – main to live - 2025-11-12 22:00 UTC
2 parents 33023b4 + 9894cad commit 3c2167d

File tree

3 files changed

+404
-453
lines changed

3 files changed

+404
-453
lines changed

docs/boards/backlogs/work-item-template.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -144,10 +144,15 @@ Use the following procedure to create a work item template through the web porta
144144

145145
:::image type="content" source="media/wi-templates-new-template.png" alt-text="Screenshot showing how to add a new template for the Bug work item type.":::
146146

147+
> [!NOTE]
148+
> If you plan to use markdown in a large text field, you can add `<br>` tags to manage line breaks and ensure the markdown renders correctly.
149+
147150
1. In the **New Template** dialog, enter a **Name** for the template (required) and optionally add fields with any necessary values.
148151

149152
1. Select **Save**. The **Copy link** option becomes available. You can use this URL to create work items based on the template.
150153

154+
155+
151156
### Edit, delete, copy link, or create copy
152157

153158
After you have a saved template, you can edit or delete the template, create a sharable link to the template, or create a copy of the template.

docs/organizations/security/namespace-reference.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: reference
88
ms.author: chcomley
99
author: chcomley
1010
monikerRange: '<= azure-devops'
11-
ms.date: 06/23/2025
11+
ms.date: 11/12/2025
1212
---
1313

1414
# Security namespace and permission reference for Azure DevOps
@@ -26,7 +26,7 @@ This article describes the valid security namespaces, lists the associated permi
2626
Each family of resources, such as work items or Git repositories, is secured through a unique namespace. Each security namespace contains zero or more ACLs. An ACL includes a token, an inherit flag, and a set of zero or more access control entries (ACEs). Each ACE consists of an identity descriptor, an allowed permissions bitmask, and a denied permissions bitmask. Tokens are arbitrary strings representing resources in Azure DevOps.
2727

2828
> [!NOTE]
29-
> Namespaces and tokens are valid for all versions of Azure DevOps. Those listed here are valid for Azure DevOps 2019 and later versions. Namespaces are subject to change over time. To get the latest list of namespaces, exercise one of the command line tools or REST API. Some namespaces have been deprecated as listed in the [Deprecated and read-only namespaces](#deprecated-namespaces) section later in this article. For more information, see [Security namespaces query](/rest/api/azure/devops/security/security-namespaces/query)
29+
> Namespaces and tokens are valid for all versions of Azure DevOps. Those listed here are valid for Azure DevOps 2019 and later versions. Namespaces are subject to change over time. To get the latest list of namespaces, exercise one of the command line tools or REST API. Some namespaces are deprecated as listed in the [Deprecated and read-only namespaces](#deprecated-namespaces) section later in this article. For more information, see [Security namespaces query](/rest/api/azure/devops/security/security-namespaces/query)
3030
3131
## Permission management tools
3232

@@ -57,7 +57,7 @@ A security namespace can be either hierarchical or flat. In a hierarchical names
5757
Tokens in a hierarchical namespace either have a fixed length for each path part, or variable length.
5858
If the tokens have variable-length path parts, then a separator character is used to distinguish where one path part ends and another begins.
5959

60-
Security tokens are case-insensitive. Example of tokens for different namespaces are provided in the following sections.
60+
Security tokens are case-insensitive. Examples of tokens for different namespaces are provided in the following sections.
6161

6262
## Object-level namespaces and permissions
6363

@@ -264,7 +264,7 @@ The following table describes the namespaces that manage object-level permission
264264
<br/>
265265
**Token format for metaTask-level permissions**: `PROJECT_ID/METATASK_ID`
266266
<br/><br/>
267-
If MetaTask has parentTaskId, then the Security token looks like the following example:
267+
If MetaTask has `parentTaskId`, then the Security token looks like the following example:
268268
<br/>
269269
**Token Format**: `PROJECT_ID/PARENT_TASK_ID/METATASK_ID`
270270
<br/><br/>
@@ -353,7 +353,7 @@ The following table describes the namespaces that manage object-level permission
353353

354354
## Project-level namespaces and permissions
355355

356-
The following table describes the namespaces that manage project-level permissions. Most of the listed permissions are managed through the [web portal admin context](change-project-level-permissions.md). Project Administrators are granted all project-level permissions, while other project-level groups have specific permission assignments.
356+
The following table describes the namespaces that manage project-level permissions. Most of the listed permissions are managed through the [web portal admin context](change-project-level-permissions.md). Project Administrators have all project-level permissions, while other project-level groups have specific permission assignments.
357357

358358
---
359359
:::row:::
@@ -741,7 +741,7 @@ The following table describes the security namespaces and permissions used to ma
741741
:::column span="2":::
742742
Manages permissions to create and manage Environments. By default, the following permissions are assigned:
743743
- **Reader** role (`View` permissions only) to all members of the Project Valid Users group
744-
- **Creator** role (`View`, `Use`, and `Create` permissions) to all members of the Contributor group
744+
- **User** role (`View`, `Use`, and `Create` permissions) to all members of the Contributor group
745745
- **Creator** role (`View`, `Use`, and `Create` permissions) to all members of the Project Administrators group
746746
- **Administrator** role (all permissions) to the user who created a specific Environment.<br/><br/>
747747
**ID:** `83d4c2e6-e57d-4d6e-892b-b87222b7ad20`
@@ -779,7 +779,7 @@ The following table describes the security namespaces and permissions used to ma
779779
:::column span="2":::
780780
Manages permissions to create and manage library items, which include secure files and variable groups. Role memberships for individual items are automatically inherited from the Library. By default, the following permissions are assigned:
781781
- **Reader** role (`View` permissions only) to all members of the Project Valid Users group and the Project Collection Build Service account
782-
- **Creator** role (`View`, `Use`, and `Create` permissions) to all members of the Contributors group
782+
- **User** role (`View`, `Use`, and `Create` permissions) to all members of the Contributors group
783783
- **Creator** role (`View`, `Use`, `Create`, and `Owner` permissions) to the member who created the library item
784784
- **Administrator** role (all permissions) to members of the Build Administrators, Project Administrators, and Release Administrators groups.
785785
For more information, see [Library asset security roles](../../pipelines/library/index.md).<br/><br/>

0 commit comments

Comments
 (0)