Skip to content

Commit 9a557d0

Browse files
authored
Merge pull request #8007 from MicrosoftDocs/users/chcomley/436494-pats-entra
[PATs/Entra] - Add section about ARM audience usage removed from sign-in flow
2 parents 6552dfa + 8700b62 commit 9a557d0

File tree

2 files changed

+32
-22
lines changed

2 files changed

+32
-22
lines changed

docs/includes/manage-policies.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,14 @@ ms.topic: include
44

55
## Manage a policy
66

7-
To change application connection, security, and user policies for your organization, do the following steps.
7+
To update application connection, security, or user policies for your organization, follow these steps:
88

9-
1. Sign in to your organization (```https://dev.azure.com/{yourorganization}```).
9+
1. Sign in to your organization at `https://dev.azure.com/{Your_Organization}`.
1010

1111
2. Select ![gear icon](../media/icons/gear-icon.png) **Organization settings**.
1212

1313
![Screenshot of Organization settings button, preview page.](../media/settings/open-admin-settings-vert.png)
1414

15-
3. Select **Policies**, and then toggle your policy to **on** or **off** as needed.
15+
3. Select **Policies**, then toggle the desired policy **on** or **off**.
1616

17-
![Screenshot of select policy, and then turn On or Off.](../media/change-policies-preview.png)
17+
![Screenshot of policies list and their on and off toggles.](../media/change-policies-preview.png)

docs/organizations/accounts/change-application-access-policies.md

Lines changed: 28 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.assetid: 2fdfbfe2-b9b2-4d61-ad3e-45f11953ef3e
77
ms.topic: how-to
88
ms.author: chcomley
99
author: chcomley
10-
ms.date: 05/14/2025
10+
ms.date: 06/06/2025
1111
monikerRange: 'azure-devops'
1212
---
1313

@@ -25,13 +25,12 @@ This article shows how to manage your organization's security policies that dete
2525

2626
[!INCLUDE [manage-policies](../../includes/manage-policies.md)]
2727

28-
2928
## Restrict authentication methods
3029

3130
To allow seamless access to your organization without repeatedly prompting for user credentials, applications can use authentication methods, like [OAuth](../../integrate/get-started/authentication/oauth.md), [SSH](../../repos/git/use-ssh-keys-to-authenticate.md), and [personal access token (PATs)](use-personal-access-tokens-to-authenticate.md). By default, all existing organizations allow access for all authentication methods.
3231

33-
You can limit access to these authentication methods by disabling these application connection policies:
34-
- **Third-party application access via OAuth**: Enable Azure DevOps OAuth apps to access resources in your organization through OAuth. This policy is defaulted to *off* for all new organizations. If you want access to [Azure DevOps OAuth apps](../../integrate/get-started/authentication/azure-devops-oauth.md), enable this policy to ensure these apps can access resources in your organization. This policy doesn't impact [Microsoft Entra ID OAuth app access](../../integrate/get-started/authentication/entra-oauth.md).
32+
You can limit access to these authentication methods by disabling the following application connection policies:
33+
- **Third-party application access via OAuth**: Enable Azure DevOps OAuth apps to access resources in your organization through OAuth. This policy is defaulted to *off* for all new organizations. If you want access to [Azure DevOps OAuth apps](../../integrate/get-started/authentication/azure-devops-oauth.md), enable this policy to ensure these apps can access resources in your organization. This policy doesn't affect [Microsoft Entra ID OAuth app access](../../integrate/get-started/authentication/entra-oauth.md).
3534
- **SSH authentication**: Enable applications to connect to your organization's Git repos through SSH.
3635
- Tenant admins can [**restrict global personal access token creation**](manage-pats-with-policies-for-administrators.md#restrict-creation-of-global-pats-tenant-policy), [**restrict full-scoped personal access token creation**](manage-pats-with-policies-for-administrators.md#restrict-creation-of-full-scoped-pats-tenant-policy), and [**enforce maximum personal access token lifespan**](manage-pats-with-policies-for-administrators.md#set-maximum-lifespan-for-new-pats-tenant-policy) through tenant-level policies on the _Microsoft Entra_ settings page. Add Microsoft Entra users or groups to exempt them from these policies.
3736
- Organization admins can [**restrict personal access token creation**](manage-pats-with-policies-for-administrators.md#restrict-personal-access-token-creation-organization-policy) in their respective organizations. Subpolicies allow admins to permit the creation of packaging-only PATs or the creation of any-scope PATs to allowlisted Microsoft Entra users or groups.
@@ -40,30 +39,41 @@ When you deny access to an authentication method, no application can access your
4039

4140
## Enforce conditional access policies
4241

43-
Microsoft Entra ID allows tenants to define which users can access Microsoft resources through their [Conditional Access policy (CAP) feature](/azure/active-directory/conditional-access/overview). Tenant admins can set conditions that users must meet to gain access, such as requiring that the user:
42+
Microsoft Entra ID lets tenant admins control which users can access Microsoft resources using [Conditional Access policies (CAPs)](/azure/active-directory/conditional-access/overview). Admins set specific conditions users must meet to gain access, such as:
4443

45-
- Be a member of a specific Entra security group
46-
- Belong to a certain location and/or network
47-
- Use a specific operating system
48-
- Use an enabled device in a management system
44+
- Membership in a specific Microsoft Entra security group
45+
- Location or network requirements
46+
- Use of a particular operating system
47+
- Use of a managed and enabled device
4948

50-
Depending on which conditions the user satisfies, you can then permit them access, require additional checks like multifactor authentication, or block access altogether. Learn more about [conditional access policies](/azure/active-directory/active-directory-conditional-access) and [how to set one up for Azure DevOps](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps) in the Entra docs.
49+
Based on these conditions, you can grant access, require more checks like multifactor authentication, or block access entirely. Learn more about [conditional access policies](/azure/active-directory/active-directory-conditional-access) and [how to set one up for Azure DevOps](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps) in the Microsoft Entra documentation.
5150

5251
### CAP support on Azure DevOps
5352

54-
When you sign in to the web portal of a Microsoft Entra ID-backed organization, Microsoft Entra ID always performs validation for any Conditional Access policies set by tenant administrators. Since [modernizing our web authentication stack to use Microsoft Entra tokens](https://devblogs.microsoft.com/devops/full-web-support-for-conditional-access-policies-across-azure-devops-and-partner-web-properties/), we now also enforce validation for Conditional Access policies on all interactive (web) flows.
53+
When you sign in to the web portal of a Microsoft Entra ID-backed organization, Microsoft Entra ID validates all Conditional Access policies set by tenant administrators. After [modernizing our web authentication stack to use Microsoft Entra tokens](https://devblogs.microsoft.com/devops/full-web-support-for-conditional-access-policies-across-azure-devops-and-partner-web-properties/), Azure DevOps now enforces Conditional Access policy validation on all interactive (web) flows.
54+
55+
- Meet sign-in policies when using PATs on REST API calls that rely on Microsoft Entra.
56+
- Remove Azure DevOps as a resource from the CAP, which prevents CAPs from applying.
57+
- Enforce MFA policies on web flows only; block access for non-interactive flows if users don't meet a CAP.
58+
59+
### IP-based conditions
60+
61+
If you enable the **IP Conditional Access policy validation on non-interactive flows** policy, Azure DevOps checks IP fencing policies on non-interactive flows, such as when you use a PAT to make a REST API call.
62+
63+
Azure DevOps supports IP-fencing conditional access policies (CAPs) for both IPv4 and IPv6 addresses. If CAPs block your IPv6 address, ask your tenant administrator to update the policy to allow your IPv6 address. Also, consider including the IPv4-mapped address for any default IPv6 address in all CAP conditions.
5564

56-
* Using PATs on REST API calls that rely on Microsoft Entra requests requires that any sign-in policies set by tenant admins are also met. For example, if a sign-in policy requires a user sign in every seven days, you must also sign in every seven days to continue using PATs.
57-
* If you don't want any CAPs to be applied to Azure DevOps, remove Azure DevOps as a resource for the CAP.
58-
* We support MFA policies on web flows only. For non-interactive flows, if the user doesn't satisfy a CAP, they aren't prompted for MFA and are blocked instead.
65+
If users access the Microsoft Entra sign-in page from a different IP address than the one used to access Azure DevOps resources (which can happen with VPN tunneling), review your VPN configuration or networking setup. Make sure your tenant administrator includes all relevant IP addresses in the CAPs.
5966

60-
#### IP-based conditions
67+
### Azure Resource Manager audience and CAPs
6168

62-
If the **Enable IP Conditional Access policy validation on non-interactive flows** policy is enabled, we check IP fencing policies on non-interactive flows, such as when you use a PAT to make a REST API call.
69+
Azure DevOps doesn't depend on the Azure Resource Manager (ARM) resource (`https://management.azure.com`) when you sign in or refresh Microsoft Entra access tokens. Previously, Azure DevOps required the ARM audience during sign-in and token refresh flows. This requirement meant that administrators had to allow all Azure DevOps users to bypass ARM CAPs to ensure access.
6370

64-
We support IP-fencing conditional access policies (CAPs) for both IPv4 and IPv6 addresses. If your IPv6 address is being blocked, ensure that the tenant administrator configured CAPs to allow your IPv6 address. Additionally, consider including the IPv4-mapped address for any default IPv6 address in all CAP conditions.
71+
Tokens for Azure DevOps no longer require the ARM audience. As a result, you can manage CAPs more effectively without configuring specific audience settings for ARM. This approach streamlines authentication, reduces token management complexity, and lets you apply security policies more consistently across your Azure environments. Organizations can focus on broader access controls, improving compliance and security posture without being limited by audience-specific configurations.
6572

66-
If users access the Microsoft Entra sign-in page via a different IP address than the one used to access Azure DevOps resources (common with VPN tunneling), check your VPN configuration or networking infrastructure. Ensure to include all used IP addresses within your tenant administrator's CAPs.
73+
> [!NOTE]
74+
> There are the following exceptions where continued access to ARM is still required:
75+
> - **Billing administrators** need access to ARM to set up billing and access subscriptions.
76+
> - **Service Connection creators** require access to ARM for ARM role assignments and updates to managed service identities (MSIs).
6777
6878
## Policies by Level
6979

0 commit comments

Comments
 (0)