You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### Why do I have to choose between a "work or school account" and my "personal account"?
1
+
### Q: Why do I have to choose between a "work or school account" and my "personal account"?
2
2
3
-
You have to choose between a "work or school account" and your "personal account" when you sign in with an email address (for example, [email protected]) shared by both accounts. Although both identities use the same sign-in address, they're separate and have different profiles, security settings, and permissions.
3
+
A: You have to choose between a "work or school account" and your "personal account" when you sign in with an email address (for example, [email protected]) shared by both accounts. Although both identities use the same sign-in address, they're separate and have different profiles, security settings, and permissions.
Copy file name to clipboardExpand all lines: docs/includes/qa-why-cant-sign-in-msa-azuread-account.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
-
### Why can't I sign in after I select "personal Microsoft account" or "work or school account"?
1
+
### Q: Why can't I sign in after I select "personal Microsoft account" or "work or school account"?
2
2
3
-
If your sign-in address is shared by both your personal Microsoft account and your work or school account, but the selected identity doesn't have access, you can't sign in. Although both identities use the same sign-in address, they're separate and have different profiles, security settings, and permissions.
3
+
A: If your sign-in address is shared by both your personal Microsoft account and your work or school account, but the selected identity doesn't have access, you can't sign in. Although both identities use the same sign-in address, they're separate and have different profiles, security settings, and permissions.
4
4
Sign out completely from Azure DevOps by completing the following steps. Closing your browser might not sign you out completely. Sign in again and select your other identity:
5
5
6
6
1. Close all browsers, including browsers that aren't running Azure DevOps.
Copy file name to clipboardExpand all lines: docs/organizations/accounts/faq-user-and-permissions-management.yml
+21-11Lines changed: 21 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ metadata:
9
9
ms.topic: faq
10
10
ms.author: chcomley
11
11
author: chcomley
12
-
ms.date: 06/16/2025
12
+
ms.date: 06/27/2025
13
13
monikerRange: '<= azure-devops'
14
14
title: User and permissions management FAQs
15
15
summary: |
@@ -51,7 +51,8 @@ sections:
51
51
answer: |
52
52
A: They might need a different [access level](../security/access-levels.md#supported-access-levels) assigned, in addition to permissions granted through security groups. For example, [Stakeholder access](../security/stakeholder-access.md) access level provides partial support to select features, allowing users to view and modify work items, but not to use all features.
53
53
54
-
- question: I accidentally removed my permissions and am unable to grant them again. What should I do?
54
+
- question: |
55
+
Q: I accidentally removed my permissions and am unable to grant them again. What should I do?
55
56
answer: |
56
57
A: The only way to resolve this scenario is to [Request an increase in permission levels](../security/request-changes-permissions.md).
57
58
@@ -108,29 +109,38 @@ sections:
108
109

109
110
110
111
- question: |
111
-
Q: Are users using GitHub Enterprise Server detected as having GitHub Enterprise?
112
+
Q: How are GitHub Enterprise users detected?
112
113
answer: |
113
-
A: No, only GitHub Enterprise cloud users are detected in Azure DevOps. Customers using GitHub Server can [sync license usage between GitHub Enterprise Server and GitHub Enterprise Cloud](https://docs.github.com/[email protected]/billing/managing-your-license-for-github-enterprise/syncing-license-usage-between-github-enterprise-server-and-github-enterprise-cloud).
114
+
A: Azure DevOps automatically checks if a user has GitHub Enterprise when the user signs in. It can take up to 24 hours for their access level to change to GitHub Enterprise. There are no charges for a user with the GitHub Enterprise access level.
114
115
115
116
- question: |
116
117
Q: What kind of access do GitHub Enterprise users get in Azure DevOps?
117
118
answer: |
118
119
A: Basic access, which includes all features except Test Plans. For more information, see [Pricing for Azure DevOps](https://azure.microsoft.com/pricing/details/devops/azure-devops-services/)
119
120
120
121
- question: |
121
-
Q: How are GitHub Enterprise users detected?
122
+
Q: What if a GitHub Enterprise user needs access to Test Plans?
122
123
answer: |
123
-
A: Azure DevOps automatically checks if a user has GitHub Enterprise when the user signs in. It can take up to 24 hours for their access level to change to GitHub Enterprise. There are no charges for a user with the GitHub Enterprise access level.
124
+
A: GitHub Enterprise users who need access to Test Plans can be assigned the Basic + Test Plans access level.
124
125
125
126
- question: |
126
-
Q: What access level should I select if a user has a GitHub Enterprise license?
127
+
Q: What happens when a GitHub Enterprise license is no longer detected?
127
128
answer: |
128
-
A: If you know a user has a GitHub Enterprise license, the best option to choose is Stakeholder, to avoid any charges for Basic before the user signs in for the first time
129
+
A: When a user no longer has GitHub Enterprise, they're treated like a new user.
130
+
- Your organization's default access level, whether Basic or Basic + Test Plans, gets assigned automatically.
131
+
- If your organization established Group Rules, the user receives the access specified for their Microsoft Entra group. Group rule reevaluation occurs every 24 hours, so they might initially have Stakeholder access before receiving group rule access.
132
+
133
+
Otherwise, users who no longer have access through GitHub Enterprise maintain Stakeholder access until an administrator assigns them paid access.
134
+
135
+
- question: |
136
+
Q: Are users using GitHub Enterprise Server detected as having GitHub Enterprise?
137
+
answer: |
138
+
A: No, only GitHub Enterprise cloud users are detected in Azure DevOps. Customers using GitHub Server can [sync license usage between GitHub Enterprise Server and GitHub Enterprise Cloud](https://docs.github.com/[email protected]/billing/managing-your-license-for-github-enterprise/syncing-license-usage-between-github-enterprise-server-and-github-enterprise-cloud).
129
139
130
140
- question: |
131
-
Q: What if a GitHub Enterprise user needs access to Test Plans?
141
+
Q: What access level should I select if a user has a GitHub Enterprise license?
132
142
answer: |
133
-
A: GitHub Enterprise users who need access to Test Plans can be assigned the Basic + Test Plans access level.
143
+
A: If you know a user has a GitHub Enterprise license, the best option to choose is Stakeholder, to avoid any charges for Basic before the user signs in for the first time
134
144
135
145
- question: |
136
146
Q: What if a GitHub Enterprise user also has a Visual Studio subscription?
@@ -382,7 +392,7 @@ sections:
382
392
- question: |
383
393
Q: Why don't users appear or disappear promptly in Azure DevOps after I add or delete them in the Users hub?
384
394
answer: |
385
-
A: If you experience delays finding new users or gettings deleted users promptly removed from Azure DevOps (for example, in drop-down lists and groups) after you add or delete users, [file a problem report on Developer Community](https://go.microsoft.com/fwlink/?LinkId=820594) so we can investigate.
395
+
A: If you experience delays finding new users or getting deleted users promptly removed from Azure DevOps (for example, in drop-down lists and groups) after you add or delete users, [file a problem report on Developer Community](https://go.microsoft.com/fwlink/?LinkId=820594) so we can investigate.
You can revoke a PAT at any time for these and other reasons:
150
150
151
-
- Revoke a PAT if you suspect it is compromised.
152
-
- Revoke a PAT when it is no longer needed.
153
-
- Revoke a PAT to enforce security policies or compliance requirements.
151
+
-**Security breach**: Revoke a PAT immediately if you suspect it is compromised, leaked, or exposed in logs or public repositories.
152
+
-**No longer needed**: Revoke a PAT when the project, service, or integration it was created for is complete or discontinued.
153
+
-**Policy compliance**: Revoke a PAT to enforce security policies, compliance requirements, or organizational token rotation schedules.
154
+
-**User changes**: Revoke a PAT when a team member leaves the organization or changes roles and no longer needs access.
155
+
-**Scope reduction**: Revoke and recreate a PAT with reduced permissions when you need to limit its access capabilities.
156
+
-**Regular maintenance**: Revoke a PAT as part of routine security hygiene and token lifecycle management.
157
+
158
+
Do the following steps to revoke a PAT:
154
159
155
160
1. From your home page, open user settings :::image type="icon" source="../../media/icons/user-settings-gear.png" border="false"::: and select **Personal access tokens**.
156
161
@@ -255,19 +260,22 @@ A: All PATs are associated with the user identity that created it. Applications
255
260
In Azure DevOps, you can generate access tokens that aren't linked to a specific user by using Microsoft Entra tokens issued by an [application service principal or managed identity](../../integrate/get-started/authentication/service-principal-managed-identity.md). For pipelines, use [service connections](../../pipelines/library/service-endpoints.md) to securely authenticate and authorize automated tasks without relying on user-specific credentials.
256
261
257
262
### Q: How can I regenerate/rotate PATs through the API? I saw that option in the UI, but I don’t see a similar method in the API.
258
-
The 'Regenerate' functionality available in the UI actually accomplishes a few actions, which can be replicated through API.
263
+
A: The 'Regenerate' functionality available in the UI actually accomplishes a few actions, which can be replicated through API.
259
264
260
265
To rotate your PAT, do the following steps:
261
266
1. See PAT metadata with a **GET** call,
262
267
2. Create a new PAT with the old PAT ID using a **POST** call,
263
268
3. Revoke the old PAT using a **DELETE** call.
264
269
270
+
### Q: How long do expired, revoked, or inactive PATs remain visible in the Azure DevOps token list?
271
+
272
+
A: PATs that are expired or revoked can no longer be used or regenerated. These inactive tokens stay visible for several months after expiration or revocation before being automatically removed from the display.
273
+
265
274
### Q: I see a "Need admin approval" pop-up when I try to use a Microsoft Entra app to call the PAT Lifecycle Management APIs.
266
-
Your tenant's security policies require admin consent before applications can access organization resources in the organization. Reach out to your tenant administrator.
275
+
A: Your tenant's security policies require admin consent before applications can access organization resources in the organization. Reach out to your tenant administrator.
267
276
268
277
### Q: Can I use a service principal to create or manage PATs?
269
-
No, personal access tokens belong to a user identity. Microsoft Entra [service principals or managed identities](../../integrate/get-started/authentication/service-principal-managed-identity.md) are able to generate short-lived Microsoft Entra tokens that can be used in most places where a PAT is accepted. Learn more about [our efforts to reduce PAT usage across Azure DevOps](https://devblogs.microsoft.com/devops/reducing-pat-usage-across-azure-devops/) and explore replacing PATs with Microsoft Entra tokens.
270
-
278
+
A: No, PATs belong to a user identity. Microsoft Entra [service principals or managed identities](../../integrate/get-started/authentication/service-principal-managed-identity.md) can generate short-lived Microsoft Entra tokens that you can use in most places where a PAT is accepted. Learn more about [our efforts to reduce PAT usage across Azure DevOps](https://devblogs.microsoft.com/devops/reducing-pat-usage-across-azure-devops/) and explore replacing PATs with Microsoft Entra tokens.
0 commit comments