Skip to content

Commit 7f9d893

Browse files
committed
Merged main into live
2 parents 55537b0 + e3a7f8a commit 7f9d893

File tree

4 files changed

+41
-23
lines changed

4 files changed

+41
-23
lines changed
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
### Why do I have to choose between a "work or school account" and my "personal account"?
1+
### Q: Why do I have to choose between a "work or school account" and my "personal account"?
22

3-
You have to choose between a "work or school account" and your "personal account" when you sign in with an email address (for example, [email protected]) shared by both accounts. Although both identities use the same sign-in address, they're separate and have different profiles, security settings, and permissions.
3+
A: You have to choose between a "work or school account" and your "personal account" when you sign in with an email address (for example, [email protected]) shared by both accounts. Although both identities use the same sign-in address, they're separate and have different profiles, security settings, and permissions.
44

docs/includes/qa-why-cant-sign-in-msa-azuread-account.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
### Why can't I sign in after I select "personal Microsoft account" or "work or school account"?
1+
### Q: Why can't I sign in after I select "personal Microsoft account" or "work or school account"?
22

3-
If your sign-in address is shared by both your personal Microsoft account and your work or school account, but the selected identity doesn't have access, you can't sign in. Although both identities use the same sign-in address, they're separate and have different profiles, security settings, and permissions.
3+
A: If your sign-in address is shared by both your personal Microsoft account and your work or school account, but the selected identity doesn't have access, you can't sign in. Although both identities use the same sign-in address, they're separate and have different profiles, security settings, and permissions.
44
Sign out completely from Azure DevOps by completing the following steps. Closing your browser might not sign you out completely. Sign in again and select your other identity:
55

66
1. Close all browsers, including browsers that aren't running Azure DevOps.

docs/organizations/accounts/faq-user-and-permissions-management.yml

Lines changed: 21 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ metadata:
99
ms.topic: faq
1010
ms.author: chcomley
1111
author: chcomley
12-
ms.date: 06/16/2025
12+
ms.date: 06/27/2025
1313
monikerRange: '<= azure-devops'
1414
title: User and permissions management FAQs
1515
summary: |
@@ -51,7 +51,8 @@ sections:
5151
answer: |
5252
A: They might need a different [access level](../security/access-levels.md#supported-access-levels) assigned, in addition to permissions granted through security groups. For example, [Stakeholder access](../security/stakeholder-access.md) access level provides partial support to select features, allowing users to view and modify work items, but not to use all features.
5353
54-
- question: I accidentally removed my permissions and am unable to grant them again. What should I do?
54+
- question: |
55+
Q: I accidentally removed my permissions and am unable to grant them again. What should I do?
5556
answer: |
5657
A: The only way to resolve this scenario is to [Request an increase in permission levels](../security/request-changes-permissions.md).
5758
@@ -108,29 +109,38 @@ sections:
108109
![Screenshot shows GitHub Enterprise listed as user's access level in Organization settings, Users page.](media/faq/github-enterprise.png)
109110
110111
- question: |
111-
Q: Are users using GitHub Enterprise Server detected as having GitHub Enterprise?
112+
Q: How are GitHub Enterprise users detected?
112113
answer: |
113-
A: No, only GitHub Enterprise cloud users are detected in Azure DevOps. Customers using GitHub Server can [sync license usage between GitHub Enterprise Server and GitHub Enterprise Cloud](https://docs.github.com/[email protected]/billing/managing-your-license-for-github-enterprise/syncing-license-usage-between-github-enterprise-server-and-github-enterprise-cloud).
114+
A: Azure DevOps automatically checks if a user has GitHub Enterprise when the user signs in. It can take up to 24 hours for their access level to change to GitHub Enterprise. There are no charges for a user with the GitHub Enterprise access level.
114115
115116
- question: |
116117
Q: What kind of access do GitHub Enterprise users get in Azure DevOps?
117118
answer: |
118119
A: Basic access, which includes all features except Test Plans. For more information, see [Pricing for Azure DevOps](https://azure.microsoft.com/pricing/details/devops/azure-devops-services/)
119120
120121
- question: |
121-
Q: How are GitHub Enterprise users detected?
122+
Q: What if a GitHub Enterprise user needs access to Test Plans?
122123
answer: |
123-
A: Azure DevOps automatically checks if a user has GitHub Enterprise when the user signs in. It can take up to 24 hours for their access level to change to GitHub Enterprise. There are no charges for a user with the GitHub Enterprise access level.
124+
A: GitHub Enterprise users who need access to Test Plans can be assigned the Basic + Test Plans access level.
124125
125126
- question: |
126-
Q: What access level should I select if a user has a GitHub Enterprise license?
127+
Q: What happens when a GitHub Enterprise license is no longer detected?
127128
answer: |
128-
A: If you know a user has a GitHub Enterprise license, the best option to choose is Stakeholder, to avoid any charges for Basic before the user signs in for the first time
129+
A: When a user no longer has GitHub Enterprise, they're treated like a new user.
130+
- Your organization's default access level, whether Basic or Basic + Test Plans, gets assigned automatically.
131+
- If your organization established Group Rules, the user receives the access specified for their Microsoft Entra group. Group rule reevaluation occurs every 24 hours, so they might initially have Stakeholder access before receiving group rule access.
132+
133+
Otherwise, users who no longer have access through GitHub Enterprise maintain Stakeholder access until an administrator assigns them paid access.
134+
135+
- question: |
136+
Q: Are users using GitHub Enterprise Server detected as having GitHub Enterprise?
137+
answer: |
138+
A: No, only GitHub Enterprise cloud users are detected in Azure DevOps. Customers using GitHub Server can [sync license usage between GitHub Enterprise Server and GitHub Enterprise Cloud](https://docs.github.com/[email protected]/billing/managing-your-license-for-github-enterprise/syncing-license-usage-between-github-enterprise-server-and-github-enterprise-cloud).
129139
130140
- question: |
131-
Q: What if a GitHub Enterprise user needs access to Test Plans?
141+
Q: What access level should I select if a user has a GitHub Enterprise license?
132142
answer: |
133-
A: GitHub Enterprise users who need access to Test Plans can be assigned the Basic + Test Plans access level.
143+
A: If you know a user has a GitHub Enterprise license, the best option to choose is Stakeholder, to avoid any charges for Basic before the user signs in for the first time
134144
135145
- question: |
136146
Q: What if a GitHub Enterprise user also has a Visual Studio subscription?
@@ -382,7 +392,7 @@ sections:
382392
- question: |
383393
Q: Why don't users appear or disappear promptly in Azure DevOps after I add or delete them in the Users hub?
384394
answer: |
385-
A: If you experience delays finding new users or gettings deleted users promptly removed from Azure DevOps (for example, in drop-down lists and groups) after you add or delete users, [file a problem report on Developer Community](https://go.microsoft.com/fwlink/?LinkId=820594) so we can investigate.
395+
A: If you experience delays finding new users or getting deleted users promptly removed from Azure DevOps (for example, in drop-down lists and groups) after you add or delete users, [file a problem report on Developer Community](https://go.microsoft.com/fwlink/?LinkId=820594) so we can investigate.
386396
387397
<a name="ChooseOrgAcctMSAcct"></a>
388398

docs/organizations/accounts/use-personal-access-tokens-to-authenticate.md

Lines changed: 16 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: d980d58e-4240-47c7-977c-baaa7028a1d8
99
ms.topic: how-to
1010
ms.author: chcomley
1111
author: chcomley
12-
ms.date: 06/12/2025
12+
ms.date: 06/27/2025
1313
monikerRange: '<= azure-devops'
1414
---
1515

@@ -148,9 +148,14 @@ Do the following steps to:
148148

149149
You can revoke a PAT at any time for these and other reasons:
150150

151-
- Revoke a PAT if you suspect it is compromised.
152-
- Revoke a PAT when it is no longer needed.
153-
- Revoke a PAT to enforce security policies or compliance requirements.
151+
- **Security breach**: Revoke a PAT immediately if you suspect it is compromised, leaked, or exposed in logs or public repositories.
152+
- **No longer needed**: Revoke a PAT when the project, service, or integration it was created for is complete or discontinued.
153+
- **Policy compliance**: Revoke a PAT to enforce security policies, compliance requirements, or organizational token rotation schedules.
154+
- **User changes**: Revoke a PAT when a team member leaves the organization or changes roles and no longer needs access.
155+
- **Scope reduction**: Revoke and recreate a PAT with reduced permissions when you need to limit its access capabilities.
156+
- **Regular maintenance**: Revoke a PAT as part of routine security hygiene and token lifecycle management.
157+
158+
Do the following steps to revoke a PAT:
154159

155160
1. From your home page, open user settings :::image type="icon" source="../../media/icons/user-settings-gear.png" border="false"::: and select **Personal access tokens**.
156161

@@ -255,19 +260,22 @@ A: All PATs are associated with the user identity that created it. Applications
255260
In Azure DevOps, you can generate access tokens that aren't linked to a specific user by using Microsoft Entra tokens issued by an [application service principal or managed identity](../../integrate/get-started/authentication/service-principal-managed-identity.md). For pipelines, use [service connections](../../pipelines/library/service-endpoints.md) to securely authenticate and authorize automated tasks without relying on user-specific credentials.
256261
257262
### Q: How can I regenerate/rotate PATs through the API? I saw that option in the UI, but I don’t see a similar method in the API.
258-
The 'Regenerate' functionality available in the UI actually accomplishes a few actions, which can be replicated through API.
263+
A: The 'Regenerate' functionality available in the UI actually accomplishes a few actions, which can be replicated through API.
259264
260265
To rotate your PAT, do the following steps:
261266
1. See PAT metadata with a **GET** call,
262267
2. Create a new PAT with the old PAT ID using a **POST** call,
263268
3. Revoke the old PAT using a **DELETE** call.
264269
270+
### Q: How long do expired, revoked, or inactive PATs remain visible in the Azure DevOps token list?
271+
272+
A: PATs that are expired or revoked can no longer be used or regenerated. These inactive tokens stay visible for several months after expiration or revocation before being automatically removed from the display.
273+
265274
### Q: I see a "Need admin approval" pop-up when I try to use a Microsoft Entra app to call the PAT Lifecycle Management APIs.
266-
Your tenant's security policies require admin consent before applications can access organization resources in the organization. Reach out to your tenant administrator.
275+
A: Your tenant's security policies require admin consent before applications can access organization resources in the organization. Reach out to your tenant administrator.
267276
268277
### Q: Can I use a service principal to create or manage PATs?
269-
No, personal access tokens belong to a user identity. Microsoft Entra [service principals or managed identities](../../integrate/get-started/authentication/service-principal-managed-identity.md) are able to generate short-lived Microsoft Entra tokens that can be used in most places where a PAT is accepted. Learn more about [our efforts to reduce PAT usage across Azure DevOps](https://devblogs.microsoft.com/devops/reducing-pat-usage-across-azure-devops/) and explore replacing PATs with Microsoft Entra tokens.
270-
278+
A: No, PATs belong to a user identity. Microsoft Entra [service principals or managed identities](../../integrate/get-started/authentication/service-principal-managed-identity.md) can generate short-lived Microsoft Entra tokens that you can use in most places where a PAT is accepted. Learn more about [our efforts to reduce PAT usage across Azure DevOps](https://devblogs.microsoft.com/devops/reducing-pat-usage-across-azure-devops/) and explore replacing PATs with Microsoft Entra tokens.
271279
272280
## Related articles
273281

0 commit comments

Comments
 (0)