You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/boards/backlogs/work-item-template.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -144,10 +144,15 @@ Use the following procedure to create a work item template through the web porta
144
144
145
145
:::image type="content" source="media/wi-templates-new-template.png" alt-text="Screenshot showing how to add a new template for the Bug work item type.":::
146
146
147
+
> [!NOTE]
148
+
> If you plan to use markdown in a large text field, you can add `<br>` tags to manage line breaks and ensure the markdown renders correctly.
149
+
147
150
1. In the **New Template** dialog, enter a **Name** for the template (required) and optionally add fields with any necessary values.
148
151
149
152
1. Select **Save**. The **Copy link** option becomes available. You can use this URL to create work items based on the template.
150
153
154
+
155
+
151
156
### Edit, delete, copy link, or create copy
152
157
153
158
After you have a saved template, you can edit or delete the template, create a sharable link to the template, or create a copy of the template.
Copy file name to clipboardExpand all lines: docs/organizations/security/namespace-reference.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.topic: reference
8
8
ms.author: chcomley
9
9
author: chcomley
10
10
monikerRange: '<= azure-devops'
11
-
ms.date: 06/23/2025
11
+
ms.date: 11/12/2025
12
12
---
13
13
14
14
# Security namespace and permission reference for Azure DevOps
@@ -26,7 +26,7 @@ This article describes the valid security namespaces, lists the associated permi
26
26
Each family of resources, such as work items or Git repositories, is secured through a unique namespace. Each security namespace contains zero or more ACLs. An ACL includes a token, an inherit flag, and a set of zero or more access control entries (ACEs). Each ACE consists of an identity descriptor, an allowed permissions bitmask, and a denied permissions bitmask. Tokens are arbitrary strings representing resources in Azure DevOps.
27
27
28
28
> [!NOTE]
29
-
> Namespaces and tokens are valid for all versions of Azure DevOps. Those listed here are valid for Azure DevOps 2019 and later versions. Namespaces are subject to change over time. To get the latest list of namespaces, exercise one of the command line tools or REST API. Some namespaces have been deprecated as listed in the [Deprecated and read-only namespaces](#deprecated-namespaces) section later in this article. For more information, see [Security namespaces query](/rest/api/azure/devops/security/security-namespaces/query)
29
+
> Namespaces and tokens are valid for all versions of Azure DevOps. Those listed here are valid for Azure DevOps 2019 and later versions. Namespaces are subject to change over time. To get the latest list of namespaces, exercise one of the command line tools or REST API. Some namespaces are deprecated as listed in the [Deprecated and read-only namespaces](#deprecated-namespaces) section later in this article. For more information, see [Security namespaces query](/rest/api/azure/devops/security/security-namespaces/query)
30
30
31
31
## Permission management tools
32
32
@@ -57,7 +57,7 @@ A security namespace can be either hierarchical or flat. In a hierarchical names
57
57
Tokens in a hierarchical namespace either have a fixed length for each path part, or variable length.
58
58
If the tokens have variable-length path parts, then a separator character is used to distinguish where one path part ends and another begins.
59
59
60
-
Security tokens are case-insensitive. Example of tokens for different namespaces are provided in the following sections.
60
+
Security tokens are case-insensitive. Examples of tokens for different namespaces are provided in the following sections.
61
61
62
62
## Object-level namespaces and permissions
63
63
@@ -264,7 +264,7 @@ The following table describes the namespaces that manage object-level permission
264
264
<br/>
265
265
**Token format for metaTask-level permissions**: `PROJECT_ID/METATASK_ID`
266
266
<br/><br/>
267
-
If MetaTask has parentTaskId, then the Security token looks like the following example:
267
+
If MetaTask has `parentTaskId`, then the Security token looks like the following example:
@@ -353,7 +353,7 @@ The following table describes the namespaces that manage object-level permission
353
353
354
354
## Project-level namespaces and permissions
355
355
356
-
The following table describes the namespaces that manage project-level permissions. Most of the listed permissions are managed through the [web portal admin context](change-project-level-permissions.md). Project Administrators are granted all project-level permissions, while other project-level groups have specific permission assignments.
356
+
The following table describes the namespaces that manage project-level permissions. Most of the listed permissions are managed through the [web portal admin context](change-project-level-permissions.md). Project Administrators have all project-level permissions, while other project-level groups have specific permission assignments.
357
357
358
358
---
359
359
:::row:::
@@ -741,7 +741,7 @@ The following table describes the security namespaces and permissions used to ma
741
741
:::column span="2":::
742
742
Manages permissions to create and manage Environments. By default, the following permissions are assigned:
743
743
- **Reader** role (`View` permissions only) to all members of the Project Valid Users group
744
-
- **Creator** role (`View`, `Use`, and `Create` permissions) to all members of the Contributor group
744
+
- **User** role (`View`, `Use`, and `Create` permissions) to all members of the Contributor group
745
745
- **Creator** role (`View`, `Use`, and `Create` permissions) to all members of the Project Administrators group
746
746
- **Administrator** role (all permissions) to the user who created a specific Environment.<br/><br/>
747
747
**ID:**`83d4c2e6-e57d-4d6e-892b-b87222b7ad20`
@@ -779,7 +779,7 @@ The following table describes the security namespaces and permissions used to ma
779
779
:::column span="2":::
780
780
Manages permissions to create and manage library items, which include secure files and variable groups. Role memberships for individual items are automatically inherited from the Library. By default, the following permissions are assigned:
781
781
- **Reader** role (`View` permissions only) to all members of the Project Valid Users group and the Project Collection Build Service account
782
-
- **Creator** role (`View`, `Use`, and `Create` permissions) to all members of the Contributors group
782
+
- **User** role (`View`, `Use`, and `Create` permissions) to all members of the Contributors group
783
783
- **Creator** role (`View`, `Use`, `Create`, and `Owner` permissions) to the member who created the library item
784
784
- **Administrator** role (all permissions) to members of the Build Administrators, Project Administrators, and Release Administrators groups.
785
785
For more information, see [Library asset security roles](../../pipelines/library/index.md).<br/><br/>
0 commit comments