Skip to content

Commit 5b7eef9

Browse files
authored
Update use-personal-access-tokens-to-authenticate.md
1 parent 151bcd8 commit 5b7eef9

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/organizations/accounts/use-personal-access-tokens-to-authenticate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -269,7 +269,7 @@ To rotate your PAT, do the following steps:
269269
270270
### Q: How long do expired, revoked, or inactive PATs remain visible in the Azure DevOps token list?
271271
272-
A: PATs that are expired or revoked can no longer be used or regenerated. However, they remain visible in your PAT list for audit and reference purposes. These inactive tokens typically stay visible for several months after expiration or revocation before being automatically removed from the display. This visibility helps you track your token history and ensure proper cleanup of unused credentials.
272+
A: PATs that are expired or revoked can no longer be used or regenerated. These inactive tokens stay visible for several months after expiration or revocation before being automatically removed from the display.
273273
274274
### Q: I see a "Need admin approval" pop-up when I try to use a Microsoft Entra app to call the PAT Lifecycle Management APIs.
275275
A: Your tenant's security policies require admin consent before applications can access organization resources in the organization. Reach out to your tenant administrator.

0 commit comments

Comments
 (0)