Skip to content

Commit 91f42e0

Browse files
committed
more fixes
1 parent 34d32b2 commit 91f42e0

File tree

5 files changed

+1
-7
lines changed

5 files changed

+1
-7
lines changed

docs/pipelines/process/access-tokens.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@ title: Understand job access tokens
33
description: Access repositories, artifacts and other resources from pipelines
44
ms.topic: reference
55
ms.date: 06/30/2022
6-
monikerRange: '<= azure-devops'
76
---
87

98
# Access repositories, artifacts, and other resources

docs/pipelines/process/variables.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,6 @@ ms.topic: conceptual
66
ms.assetid: 4751564b-aa99-41a0-97e9-3ef0c0fce32a
77
ms.date: 10/03/2024
88
ai-usage: ai-assisted
9-
10-
monikerRange: '<= azure-devops'
119
---
1210

1311
# Define variables

docs/test/run-automated-tests-from-test-hub.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@ ms.custom: UpdateFrequency3
77
ms.topic: conceptual
88
ms.author: jeom
99
author: wisdeom
10-
monikerRange: '<= azure-devops'
1110
ms.date: 09/14/2021
1211
ms.update-cycle: 1095-days
1312
---

release-notes/2025/testplans/sprint-258-update.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,4 @@ ms.date: 6/30/2025
1212

1313
[!INCLUDE [sprint-258-update-links](../includes/testplans/sprint-258-update-links.md)]
1414

15-
[!INCLUDE [sprint-258-update](../includes/testplans/sprint-258-update.md)]
16-
1715
[!INCLUDE [nextsteps](../includes/nextsteps.md)]

release-notes/roadmap/2025/new-service-connection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ hide_comments: true
1212

1313
# PAT-less authentication from pipeline tasks to Azure DevOps APIs
1414

15-
Tasks in a pipeline use either a [job access token](../../../docs/pipelines/process/access-tokens.md), available via the built-in variable [System.AccessToken](../../../docs/pipelines/process/variables.md#system-variables), or a PAT to access Azure DevOps resources. For instance, a “checkout” task uses this token to authenticate to the repository. Similarly, a PowerShell script can use this token to access Azure DevOps REST APIs. However, the permissions of this token are based on the Project Build Service identity, meaning all job access tokens in a project have identical permissions. This grants excessive access across all pipelines within the project.
15+
Tasks in a pipelines use either a job access token, available via the built-in variable `System.AccessToken`, or a PAT to access Azure DevOps resources. For instance, a “checkout” task uses this token to authenticate to the repository. Similarly, a PowerShell script can use this token to access Azure DevOps REST APIs. However, the permissions of this token are based on the Project Build Service identity, meaning all job access tokens in a project have identical permissions. This grants excessive access across all pipelines within the project.
1616

1717
Using PATs to access Azure DevOps resources is common, particularly when a task needs to access those resources across organization boundaries. For instance, a Nuget Authenticate task uses a PAT token to authenticate to a feed in another organization. PATs are an anti-pattern for security as they tend to be created with broad permissions and are held for a long time thereby increasing the risk of exfiltration.
1818

0 commit comments

Comments
 (0)