Skip to content

Commit 6c6cb73

Browse files
committed
bug fixes
1 parent 90809c1 commit 6c6cb73

File tree

2 files changed

+15
-13
lines changed

2 files changed

+15
-13
lines changed

docs/organizations/accounts/manage-pats-with-policies-for-administrators.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,11 +7,11 @@ ms.topic: how-to
77
ms.author: chcomley
88
author: chcomley
99
ai-usage: ai-assisted
10-
ms.date: 10/24/2024
10+
ms.date: 06/12/2025
1111
monikerRange: 'azure-devops'
1212
---
1313

14-
# Manage personal access tokens using policies (for admins)
14+
# Manage personal access tokens using policies (for administrators)
1515

1616
[!INCLUDE [version-eq-azure-devops](../../includes/version-eq-azure-devops.md)]
1717

@@ -27,7 +27,7 @@ Existing PATs, created through both the UI and APIs, remain valid for the rest o
2727

2828
| Category | Requirements |
2929
|--------------|-------------|
30-
|**Entra Tenant**| Your organization is [linked to a Microsoft Entra tenant](connect-organization-to-azure-ad.md).|
30+
|**Microsoft Entra tenant**| Your organization is [linked to a Microsoft Entra tenant](connect-organization-to-azure-ad.md).|
3131
|**Permissions**| <ul><li>Org-level policies: [Project Collection Administrator](../security/look-up-project-collection-administrators.md)</li><li>Tenant-level policies: [Azure DevOps Administrator](../security/look-up-azure-devops-administrator.md)</li></ul>|
3232

3333

@@ -44,7 +44,7 @@ Each policy has its own unique allowlist. To exempt a user from all policies, th
4444

4545
Azure DevOps Administrators can restrict users from creating global PATs, which can be used in all accessible organizations rather than a single organization. When this policy is enabled, new PATs must be associated with specific Azure DevOps organizations. By default, this policy is set to *off*.
4646

47-
1. Sign in to your organization (```https://dev.azure.com/{yourorganization}```).
47+
1. Sign in to your organization (```https://dev.azure.com/{Your_Organization}```).
4848

4949
2. Select ![gear icon](../../media/icons/gear-icon.png) **Organization settings**.
5050

@@ -85,30 +85,31 @@ Azure DevOps Administrators can define the maximum lifespan of a PAT, specifying
8585
## Restrict personal access token creation (organization policy)
8686

8787
> [!NOTE]
88-
> This policy is in public preview.
88+
> - This policy is in public preview.
89+
> - This policy is only available for Microsoft Entra-backed organizations.
8990
90-
Project Collection Administrators are able to control who can create and regenerate PATs in the organizations they manage. For existing organizations, this policy is set to *off*. Once this policy is in public preview, by default, this policy is set to *on*. Existing PATs will continue working until the PAT's expiration date.
91+
Project Collection Administrators are able to control who can create and regenerate PATs in the organizations they manage. For existing organizations, this policy is set to *off*. Once this policy is in public preview, by default, this policy is set to *on*. Existing PATs continue working until the PAT's expiration date.
9192

9293
> [!TIP]
9394
> Combine this policy with a short duration set for the "Set maximum lifespan for new PATs" policy to drive down PAT usage in your organization.
9495
9596
The policy also blocks global PAT usage in the organization. Global PAT users must be added to the allowlist to continue to use their global PAT in the organization.
9697

97-
1. Sign in to your organization (```https://dev.azure.com/{yourorganization}```).
98+
1. Sign in to your organization (```https://dev.azure.com/{Your_Organization}```).
9899

99100
2. Select ![gear icon](../../media/icons/gear-icon.png) **Organization settings**.
100101

101102
3. Select **Policies**, find the *Restrict personal access token (PAT) creation* policy.
102103

103104
:::image type="content" source="media/disable-pat-policy/disable-pat-policy.png" alt-text="Screenshot of toggle moved to on position and subpolicies checked for Restrict personal access token creation policy.":::
104105

105-
4. If your organization members regularly make use of packaging PATs, select the *Allow creation of PAT with packaging scope only* checkbox. Common packaging scenarios have not fully moved to Entra-based authentication, and may still rely on PATs. If this policy is enabled, users not on the allowlist will see only packaging scopes available to them on their "Personal access tokens" page.
106+
4. If your organization members regularly use packaging PATs, select the *Allow creation of PAT with packaging scope only* checkbox. Many packaging scenarios still rely on PATs and haven't fully transitioned to Microsoft Entra-based authentication. When this policy is enabled, users who aren't on the allowlist have access only to packaging scopes on their "Personal access tokens" page.
106107

107108
:::image type="content" source="media/disable-pat-policy/disable-pat-packaging-only.png" alt-text="Screenshot of packaging scopes available only on the user's Create a new personal access token modal.":::
108109

109110
6. If any Microsoft Entra users or groups require continued access to PATs, add them to the allowlist by selecting *Manage* and searching for the user or group in the dropdown. Once allowlist updates are complete, select the checkbox next to *Allow creation of PAT of any scope for selected Microsoft Entra users and groups*.
110111

111-
7. Move the toggle to *on* in order for the restriction policy to apply. Selected subpolicies won't apply until the toggle is on.
112+
7. Move the toggle to *on* in order for the restriction policy to apply. Selected subpolicies don't apply until the toggle is on.
112113

113114
## Revoke leaked PATs automatically (tenant policy)
114115

docs/organizations/accounts/use-personal-access-tokens-to-authenticate.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: d980d58e-4240-47c7-977c-baaa7028a1d8
99
ms.topic: how-to
1010
ms.author: chcomley
1111
author: chcomley
12-
ms.date: 06/09/2025
12+
ms.date: 06/12/2025
1313
monikerRange: '<= azure-devops'
1414
---
1515

@@ -70,7 +70,7 @@ Use your PAT anywhere your user credentials are required for authentication in A
7070
7171
### Notifications
7272

73-
During the lifespan of a PAT, users receive two notifications: at time of creation and three days before expiration.
73+
During a PAT's lifespan, users receive two notifications: one when the PAT is created and another seven days before it expires.
7474

7575
After you create a PAT, you might receive a notification similar to the following example. This notification serves as confirmation that your PAT was successfully added to your organization.
7676

@@ -148,8 +148,8 @@ Do the following steps to:
148148

149149
You can revoke a PAT at any time for these and other reasons:
150150

151-
- Revoke a PAT if you suspect it's compromised.
152-
- Revoke a PAT when it's no longer needed.
151+
- Revoke a PAT if you suspect it is compromised.
152+
- Revoke a PAT when it is no longer needed.
153153
- Revoke a PAT to enforce security policies or compliance requirements.
154154

155155
1. From your home page, open user settings :::image type="icon" source="../../media/icons/user-settings-gear.png" border="false"::: and select **Personal access tokens**.
@@ -200,6 +200,7 @@ If you're using a PAT issued before that data, regenerate your PAT. If you integ
200200
* Keep PAT lifespans short (weekly is ideal, even shorter is better).
201201

202202
### Managing PATs
203+
203204
* **Don't share your PATs!**
204205
* **Store your PATs in a secure key management solution**, like [Azure KeyVault](/azure/key-vault/general/overview).
205206
* Regularly rotate or regenerate your PATs via UI or PAT Lifecycle Management APIs.

0 commit comments

Comments
 (0)