You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -44,7 +44,7 @@ Each policy has its own unique allowlist. To exempt a user from all policies, th
44
44
45
45
Azure DevOps Administrators can restrict users from creating global PATs, which can be used in all accessible organizations rather than a single organization. When this policy is enabled, new PATs must be associated with specific Azure DevOps organizations. By default, this policy is set to *off*.
46
46
47
-
1. Sign in to your organization (```https://dev.azure.com/{yourorganization}```).
47
+
1. Sign in to your organization (```https://dev.azure.com/{Your_Organization}```).
@@ -85,30 +85,31 @@ Azure DevOps Administrators can define the maximum lifespan of a PAT, specifying
85
85
## Restrict personal access token creation (organization policy)
86
86
87
87
> [!NOTE]
88
-
> This policy is in public preview.
88
+
> - This policy is in public preview.
89
+
> - This policy is only available for Microsoft Entra-backed organizations.
89
90
90
-
Project Collection Administrators are able to control who can create and regenerate PATs in the organizations they manage. For existing organizations, this policy is set to *off*. Once this policy is in public preview, by default, this policy is set to *on*. Existing PATs will continue working until the PAT's expiration date.
91
+
Project Collection Administrators are able to control who can create and regenerate PATs in the organizations they manage. For existing organizations, this policy is set to *off*. Once this policy is in public preview, by default, this policy is set to *on*. Existing PATs continue working until the PAT's expiration date.
91
92
92
93
> [!TIP]
93
94
> Combine this policy with a short duration set for the "Set maximum lifespan for new PATs" policy to drive down PAT usage in your organization.
94
95
95
96
The policy also blocks global PAT usage in the organization. Global PAT users must be added to the allowlist to continue to use their global PAT in the organization.
96
97
97
-
1. Sign in to your organization (```https://dev.azure.com/{yourorganization}```).
98
+
1. Sign in to your organization (```https://dev.azure.com/{Your_Organization}```).
3. Select **Policies**, find the *Restrict personal access token (PAT) creation* policy.
102
103
103
104
:::image type="content" source="media/disable-pat-policy/disable-pat-policy.png" alt-text="Screenshot of toggle moved to on position and subpolicies checked for Restrict personal access token creation policy.":::
104
105
105
-
4. If your organization members regularly make use of packaging PATs, select the *Allow creation of PAT with packaging scope only* checkbox. Common packaging scenarios have not fully moved to Entra-based authentication, and may still rely on PATs. If this policy is enabled, users not on the allowlist will see only packaging scopes available to them on their "Personal access tokens" page.
106
+
4. If your organization members regularly use packaging PATs, select the *Allow creation of PAT with packaging scope only* checkbox. Many packaging scenarios still rely on PATs and haven't fully transitioned to Microsoft Entra-based authentication. When this policy is enabled, users who aren't on the allowlist have access only to packaging scopes on their "Personal access tokens" page.
106
107
107
108
:::image type="content" source="media/disable-pat-policy/disable-pat-packaging-only.png" alt-text="Screenshot of packaging scopes available only on the user's Create a new personal access token modal.":::
108
109
109
110
6. If any Microsoft Entra users or groups require continued access to PATs, add them to the allowlist by selecting *Manage* and searching for the user or group in the dropdown. Once allowlist updates are complete, select the checkbox next to *Allow creation of PAT of any scope for selected Microsoft Entra users and groups*.
110
111
111
-
7. Move the toggle to *on* in order for the restriction policy to apply. Selected subpolicies won't apply until the toggle is on.
112
+
7. Move the toggle to *on* in order for the restriction policy to apply. Selected subpolicies don't apply until the toggle is on.
112
113
113
114
## Revoke leaked PATs automatically (tenant policy)
@@ -70,7 +70,7 @@ Use your PAT anywhere your user credentials are required for authentication in A
70
70
71
71
### Notifications
72
72
73
-
During the lifespan of a PAT, users receive two notifications: at time of creation and three days before expiration.
73
+
During a PAT's lifespan, users receive two notifications: one when the PAT is created and another seven days before it expires.
74
74
75
75
After you create a PAT, you might receive a notification similar to the following example. This notification serves as confirmation that your PAT was successfully added to your organization.
76
76
@@ -148,8 +148,8 @@ Do the following steps to:
148
148
149
149
You can revoke a PAT at any time for these and other reasons:
150
150
151
-
- Revoke a PAT if you suspect it's compromised.
152
-
- Revoke a PAT when it's no longer needed.
151
+
- Revoke a PAT if you suspect it is compromised.
152
+
- Revoke a PAT when it is no longer needed.
153
153
- Revoke a PAT to enforce security policies or compliance requirements.
154
154
155
155
1. From your home page, open user settings :::image type="icon" source="../../media/icons/user-settings-gear.png" border="false"::: and select **Personal access tokens**.
@@ -200,6 +200,7 @@ If you're using a PAT issued before that data, regenerate your PAT. If you integ
200
200
* Keep PAT lifespans short (weekly is ideal, even shorter is better).
201
201
202
202
### Managing PATs
203
+
203
204
***Don't share your PATs!**
204
205
***Store your PATs in a secure key management solution**, like [Azure KeyVault](/azure/key-vault/general/overview).
205
206
* Regularly rotate or regenerate your PATs via UI or PAT Lifecycle Management APIs.
0 commit comments