Skip to content

Commit 6090365

Browse files
Add general feature
1 parent 931fb1f commit 6090365

File tree

2 files changed

+7
-2
lines changed

2 files changed

+7
-2
lines changed

release-notes/2025/includes/general/sprint-257-update-links.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,4 +9,5 @@ ms.topic: include
99
- [Restrict Personal Access Token (PAT) Creation Organization Policy now in Public Preview](#restrict-personal-access-token-pat-creation-organization-policy-now-in-public-preview)
1010
- [Removal of expired Azure DevOps OAuth Apps](#removal-of-expired-azure-devops-oauth-apps)
1111
- [Azure DevOps login flow no longer relies on Azure Resource Manager audience](#azure-devops-login-flow-no-longer-relies-on-azure-resource-manager-audience)
12-
- [New Microsoft Entra OAuth scopes](#new-microsoft-entra-oauth-scopes)
12+
- [New Microsoft Entra OAuth scopes](#new-microsoft-entra-oauth-scopes)
13+
- [Request Access URL availability](request-access-url-availability)

release-notes/2025/includes/general/sprint-257-update.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,4 +28,8 @@ There remain a couple of notable exceptions. The following ​user groups may ne
2828
2. Service Connection creators require continued access to ARM for ARM role assignment and updates to MSIs.
2929

3030
### New Microsoft Entra OAuth scopes
31-
Azure DevOps has introduced two new Microsoft Entra OAuth scopes, vso.pats and vso.pats_manage to enhance security and control over personal access token (PAT) lifecycle management APIs. These scopes are now required for delegated flows that involve PAT creation and management, replacing the previously broad user_impersonation scope. This change enables app owners to reduce the permissions needed by their app to access PAT APIs. Downscope your `user_impersonation` apps to the minimum scopes needed today!
31+
Azure DevOps has introduced two new Microsoft Entra OAuth scopes, vso.pats and vso.pats_manage to enhance security and control over personal access token (PAT) lifecycle management APIs. These scopes are now required for delegated flows that involve PAT creation and management, replacing the previously broad user_impersonation scope. This change enables app owners to reduce the permissions needed by their app to access PAT APIs. Downscope your `user_impersonation` apps to the minimum scopes needed today!
32+
33+
### Request Access URL availability
34+
35+
Azure DevOps administrators can disable the [**Request Access**](/azure/devops/organizations/accounts/disable-request-access-policy?view=azure-devops) policy and provide a URL for users to request access to an organization or project. This URL, previously available only to new users, is now also shown to existing users on the 404 page. To maintain confidentiality, the request access URL is displayed regardless of the project's existence.

0 commit comments

Comments
 (0)