Skip to content

Commit 411e634

Browse files
Merge pull request #8577 from MicrosoftDocs/main
Auto Publish – main to live - 2025-11-17 18:00 UTC
2 parents a04675a + 0b1f679 commit 411e634

File tree

3 files changed

+8
-9
lines changed

3 files changed

+8
-9
lines changed

docs/migrate/migration-test-run.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ai-usage: ai-assisted
99
ms.author: chcomley
1010
author: chcomley
1111
monikerRange: '<= azure-devops'
12-
ms.date: 04/04/2025
12+
ms.date: 11/17/2025
1313
ms.custom: sfi-image-nochange
1414
---
1515

@@ -185,7 +185,7 @@ Azure DevOps Services is available in several [Azure geographical locations](htt
185185
| United Kingdom | United Kingdom South | UKS|
186186
| Australia | Australia East | EAU |
187187
| South America | Brazil South | SBR |
188-
| Asia Pacific | South India | MA |
188+
| Asia Pacific | Central India | MA |
189189
| Asia Pacific | Southeast Asia (Singapore) | SEA |
190190
| Canada | Central Canada | CC |
191191

@@ -258,7 +258,7 @@ If Microsoft Entra Connect isn't configured, all users in the identity map log f
258258

259259
Running a migration with all historical identities has consequences that need to be considered carefully. Only teams with a few users and for which the cost of setting up Microsoft Entra Connect is deemed too high should consider.
260260

261-
To migration all identities as historical, follow the steps outlined in later sections. When you queue a migration, the identity used to queue the migration is bootstrapped into the organization as the organization owner. All other users are imported as historical. Organization owners can then [add the users back in](../organizations/accounts/add-organization-users.md?toc=/azure/devops/organizations/accounts/toc.json&bc=/azure/devops/organizations/accounts/breadcrumb/toc.json) by using their Microsoft Entra identity. The added users are treated as new users. They don't* own any of their history, and there's no way to reparent this history to the Microsoft Entra identity. However, users can still look up their premigration history by searching for their `\<domain>\<Active Directory username>`.
261+
To migration all identities as historical, follow the steps outlined in later sections. When you queue a migration, the identity used to queue the migration is bootstrapped into the organization as the organization owner. All other users are imported as historical. Organization owners can then [add the users back in](../organizations/accounts/add-organization-users.md?toc=/azure/devops/organizations/accounts/toc.json&bc=/azure/devops/organizations/accounts/breadcrumb/toc.json) by using their Microsoft Entra identity. The added users are treated as new users. They don't own any of their history, and there's no way to reparent this history to the Microsoft Entra identity. However, users can still look up their premigration history by searching for their `\<domain>\<Active Directory username>`.
262262

263263
The Data Migration Tool displays a warning if it detects the complete historical identities scenario. If you decide to go down this migration path, you need to consent in the tool to the limitations.
264264

@@ -439,7 +439,7 @@ Azure DevOps Services is available in multiple [geographical locations](https://
439439
| United Kingdom | United Kingdom South |
440440
| Australia East | Australia East |
441441
| Brazil South | Brazil South |
442-
| India South | India South |
442+
| India Central | India Central |
443443
| Canada Central | Canada Central |
444444
| Asia Pacific (Singapore) | Asia Pacific (Singapore) |
445445

@@ -513,7 +513,7 @@ Your team is now ready to begin the process of running a migration. We recommend
513513

514514
> [!NOTE]
515515
> - If you need to repeat a completed production-run migration for a collection, such as due to a rollback, contact Azure DevOps Services [Customer Support](https://azure.microsoft.com/support/devops/) before you queue another migration.
516-
- Azure administrators can prevent users from creating new Azure DevOps organizations. If the Microsoft Entra tenant policy is turned on, your migration fails to finish. Before you begin, verify that the policy isn't set or that there's an exception for the user that is performing the migration. For more information, see [Restrict organization creation via Microsoft Entra tenant policy](../organizations/accounts/azure-ad-tenant-policy-restrict-org-creation.md).
516+
- Azure administrators can prevent users from creating new Azure DevOps organizations. If the Microsoft Entra tenant policy is turned on, your migration fails to finish. Before you begin, verify that the policy isn't set or that there's an exception for the user that's performing the migration. For more information, see [Restrict organization creation via Microsoft Entra tenant policy](../organizations/accounts/azure-ad-tenant-policy-restrict-org-creation.md).
517517
- Azure DevOps Services doesn't support per-pipeline retention policies, and they aren't carried over to the hosted version.
518518

519519
### Considerations for rollback plans

docs/organizations/accounts/assign-access-levels-by-group-membership.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.subservice: azure-devops-organizations
77
ms.topic: how-to
88
ms.author: chcomley
99
author: chcomley
10-
ms.date: 11/14/2025
10+
ms.date: 11/17/2025
1111
monikerRange: 'azure-devops'
1212
---
1313

@@ -111,7 +111,7 @@ When a user has a direct assignment and a group rule grants a higher access leve
111111

112112
#### Q: How do Visual Studio Subscriptions work with group rules?
113113

114-
A: Visual Studio Subscribers are always directly assigned via the [Visual Studio Admin Portal](https://manage.visualstudio.com/) and take precedence in Azure DevOps over access levels assigned directly or via group rules. When you view these users from the Users Hub, the License Source always shows as Direct. The only exception is Visual Studio Professional subscribers who are assigned Basic + Test Plans. Since Basic + Test Plans provides more access in Azure DevOps, it takes precedence over a Visual Studio Professional subscription. You can't configure a group rule to assign GitHub Enterprise access because GitHub assigns that license directly through its portal.
114+
A: Visual Studio Subscribers are always directly assigned via the [Visual Studio Admin Portal](https://manage.visualstudio.com/) and take precedence in Azure DevOps over access levels assigned directly or via group rules. When you view these users from the Users Hub, the License Source always shows as Direct. The only exception is Visual Studio Professional subscribers who are assigned Basic + Test Plans. Since Basic + Test Plans provides more access in Azure DevOps, it takes precedence over a Visual Studio Professional subscription. You can't configure a group rule to assign Visual Studio subscription access because Visual Studio assigns that license directly through its portal.
115115

116116
#### Q: How do GitHub Enterprise licenses work with group rules?
117117

docs/organizations/security/includes/note-group-rules.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,12 @@ ms.subservice: azure-devops-security
33
ms.author: chcomley
44
author: chcomley
55
ms.topic: include
6-
ms.date: 11/12/2025
6+
ms.date: 11/17/2025
77
---
88

99

1010
> [!NOTE]
1111
> - Azure DevOps applies resources granted by group rules to all members of the configured group. However, access and permissions take effect only after the user signs in to the organization for the first time.
12-
> - Changes made to **project readers** through group rules don't persist. To adjust project readers, consider alternative methods such as [direct assignment](../change-access-levels.md) or [custom security groups](../add-remove-manage-user-group-security-group.md).
1312
> - Regularly review the rules listed on the **Group rules** tab of the **Users** page. Changes to Microsoft Entra ID group membership appear during the next group rule re-evaluation, which occurs:
1413
> - On-demand when you trigger it manually
1514
> - Automatically when you modify a group rule

0 commit comments

Comments
 (0)