You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/migrate/migration-test-run.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ai-usage: ai-assisted
9
9
ms.author: chcomley
10
10
author: chcomley
11
11
monikerRange: '<= azure-devops'
12
-
ms.date: 04/04/2025
12
+
ms.date: 11/17/2025
13
13
ms.custom: sfi-image-nochange
14
14
---
15
15
@@ -185,7 +185,7 @@ Azure DevOps Services is available in several [Azure geographical locations](htt
185
185
| United Kingdom | United Kingdom South | UKS|
186
186
| Australia | Australia East | EAU |
187
187
| South America | Brazil South | SBR |
188
-
| Asia Pacific |South India | MA |
188
+
| Asia Pacific |Central India | MA |
189
189
| Asia Pacific | Southeast Asia (Singapore) | SEA |
190
190
| Canada | Central Canada | CC |
191
191
@@ -258,7 +258,7 @@ If Microsoft Entra Connect isn't configured, all users in the identity map log f
258
258
259
259
Running a migration with all historical identities has consequences that need to be considered carefully. Only teams with a few users and for which the cost of setting up Microsoft Entra Connect is deemed too high should consider.
260
260
261
-
To migration all identities as historical, follow the steps outlined in later sections. When you queue a migration, the identity used to queue the migration is bootstrapped into the organization as the organization owner. All other users are imported as historical. Organization owners can then [add the users back in](../organizations/accounts/add-organization-users.md?toc=/azure/devops/organizations/accounts/toc.json&bc=/azure/devops/organizations/accounts/breadcrumb/toc.json) by using their Microsoft Entra identity. The added users are treated as new users. They don't* own any of their history, and there's no way to reparent this history to the Microsoft Entra identity. However, users can still look up their premigration history by searching for their `\<domain>\<Active Directory username>`.
261
+
To migration all identities as historical, follow the steps outlined in later sections. When you queue a migration, the identity used to queue the migration is bootstrapped into the organization as the organization owner. All other users are imported as historical. Organization owners can then [add the users back in](../organizations/accounts/add-organization-users.md?toc=/azure/devops/organizations/accounts/toc.json&bc=/azure/devops/organizations/accounts/breadcrumb/toc.json) by using their Microsoft Entra identity. The added users are treated as new users. They don't own any of their history, and there's no way to reparent this history to the Microsoft Entra identity. However, users can still look up their premigration history by searching for their `\<domain>\<Active Directory username>`.
262
262
263
263
The Data Migration Tool displays a warning if it detects the complete historical identities scenario. If you decide to go down this migration path, you need to consent in the tool to the limitations.
264
264
@@ -439,7 +439,7 @@ Azure DevOps Services is available in multiple [geographical locations](https://
439
439
| United Kingdom | United Kingdom South |
440
440
| Australia East | Australia East |
441
441
| Brazil South | Brazil South |
442
-
| India South | India South |
442
+
| India Central | India Central |
443
443
| Canada Central | Canada Central |
444
444
| Asia Pacific (Singapore) | Asia Pacific (Singapore) |
445
445
@@ -513,7 +513,7 @@ Your team is now ready to begin the process of running a migration. We recommend
513
513
514
514
> [!NOTE]
515
515
> - If you need to repeat a completed production-run migration for a collection, such as due to a rollback, contact Azure DevOps Services [Customer Support](https://azure.microsoft.com/support/devops/) before you queue another migration.
516
-
- Azure administrators can prevent users from creating new Azure DevOps organizations. If the Microsoft Entra tenant policy is turned on, your migration fails to finish. Before you begin, verify that the policy isn't set or that there's an exception for the user that is performing the migration. For more information, see [Restrict organization creation via Microsoft Entra tenant policy](../organizations/accounts/azure-ad-tenant-policy-restrict-org-creation.md).
516
+
- Azure administrators can prevent users from creating new Azure DevOps organizations. If the Microsoft Entra tenant policy is turned on, your migration fails to finish. Before you begin, verify that the policy isn't set or that there's an exception for the user that's performing the migration. For more information, see [Restrict organization creation via Microsoft Entra tenant policy](../organizations/accounts/azure-ad-tenant-policy-restrict-org-creation.md).
517
517
- Azure DevOps Services doesn't support per-pipeline retention policies, and they aren't carried over to the hosted version.
@@ -111,7 +111,7 @@ When a user has a direct assignment and a group rule grants a higher access leve
111
111
112
112
#### Q: How do Visual Studio Subscriptions work with group rules?
113
113
114
-
A: Visual Studio Subscribers are always directly assigned via the [Visual Studio Admin Portal](https://manage.visualstudio.com/) and take precedence in Azure DevOps over access levels assigned directly or via group rules. When you view these users from the Users Hub, the License Source always shows as Direct. The only exception is Visual Studio Professional subscribers who are assigned Basic + Test Plans. Since Basic + Test Plans provides more access in Azure DevOps, it takes precedence over a Visual Studio Professional subscription. You can't configure a group rule to assign GitHub Enterprise access because GitHub assigns that license directly through its portal.
114
+
A: Visual Studio Subscribers are always directly assigned via the [Visual Studio Admin Portal](https://manage.visualstudio.com/) and take precedence in Azure DevOps over access levels assigned directly or via group rules. When you view these users from the Users Hub, the License Source always shows as Direct. The only exception is Visual Studio Professional subscribers who are assigned Basic + Test Plans. Since Basic + Test Plans provides more access in Azure DevOps, it takes precedence over a Visual Studio Professional subscription. You can't configure a group rule to assign Visual Studio subscription access because Visual Studio assigns that license directly through its portal.
115
115
116
116
#### Q: How do GitHub Enterprise licenses work with group rules?
> - Azure DevOps applies resources granted by group rules to all members of the configured group. However, access and permissions take effect only after the user signs in to the organization for the first time.
12
-
> - Changes made to **project readers** through group rules don't persist. To adjust project readers, consider alternative methods such as [direct assignment](../change-access-levels.md) or [custom security groups](../add-remove-manage-user-group-security-group.md).
13
12
> - Regularly review the rules listed on the **Group rules** tab of the **Users** page. Changes to Microsoft Entra ID group membership appear during the next group rule re-evaluation, which occurs:
0 commit comments