Skip to content

Commit cca7614

Browse files
committed
Add FAQs and reorganized for Enterprise
1 parent a827aac commit cca7614

File tree

2 files changed

+34
-17
lines changed

2 files changed

+34
-17
lines changed

docs/organizations/accounts/faq-user-and-permissions-management.yml

Lines changed: 18 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ metadata:
99
ms.topic: faq
1010
ms.author: chcomley
1111
author: chcomley
12-
ms.date: 06/16/2025
12+
ms.date: 06/27/2025
1313
monikerRange: '<= azure-devops'
1414
title: User and permissions management FAQs
1515
summary: |
@@ -108,29 +108,38 @@ sections:
108108
![Screenshot shows GitHub Enterprise listed as user's access level in Organization settings, Users page.](media/faq/github-enterprise.png)
109109
110110
- question: |
111-
Q: Are users using GitHub Enterprise Server detected as having GitHub Enterprise?
111+
Q: How are GitHub Enterprise users detected?
112112
answer: |
113-
A: No, only GitHub Enterprise cloud users are detected in Azure DevOps. Customers using GitHub Server can [sync license usage between GitHub Enterprise Server and GitHub Enterprise Cloud](https://docs.github.com/[email protected]/billing/managing-your-license-for-github-enterprise/syncing-license-usage-between-github-enterprise-server-and-github-enterprise-cloud).
113+
A: Azure DevOps automatically checks if a user has GitHub Enterprise when the user signs in. It can take up to 24 hours for their access level to change to GitHub Enterprise. There are no charges for a user with the GitHub Enterprise access level.
114114
115115
- question: |
116116
Q: What kind of access do GitHub Enterprise users get in Azure DevOps?
117117
answer: |
118118
A: Basic access, which includes all features except Test Plans. For more information, see [Pricing for Azure DevOps](https://azure.microsoft.com/pricing/details/devops/azure-devops-services/)
119119
120120
- question: |
121-
Q: How are GitHub Enterprise users detected?
121+
Q: What if a GitHub Enterprise user needs access to Test Plans?
122122
answer: |
123-
A: Azure DevOps automatically checks if a user has GitHub Enterprise when the user signs in. It can take up to 24 hours for their access level to change to GitHub Enterprise. There are no charges for a user with the GitHub Enterprise access level.
123+
A: GitHub Enterprise users who need access to Test Plans can be assigned the Basic + Test Plans access level.
124124
125125
- question: |
126-
Q: What access level should I select if a user has a GitHub Enterprise license?
126+
Q: What happens when a GitHub Enterprise license is no longer detected?
127127
answer: |
128-
A: If you know a user has a GitHub Enterprise license, the best option to choose is Stakeholder, to avoid any charges for Basic before the user signs in for the first time
128+
A: When a user no longer has GitHub Enterprise, they're treated like a new user.
129+
- Your organization's default access level, whether Basic or Basic + Test Plans, gets assigned automatically.
130+
- If your organization established Group Rules, the user receives the access specified for their Microsoft Entra group. Group rule reevaluation occurs every 24 hours, so they might initially have Stakeholder access before receiving group rule access.
131+
132+
Otherwise, users who no longer have access through GitHub Enterprise maintain Stakeholder access until an administrator assigns them paid access.
133+
134+
- question: |
135+
Q: Are users using GitHub Enterprise Server detected as having GitHub Enterprise?
136+
answer: |
137+
A: No, only GitHub Enterprise cloud users are detected in Azure DevOps. Customers using GitHub Server can [sync license usage between GitHub Enterprise Server and GitHub Enterprise Cloud](https://docs.github.com/[email protected]/billing/managing-your-license-for-github-enterprise/syncing-license-usage-between-github-enterprise-server-and-github-enterprise-cloud).
129138
130139
- question: |
131-
Q: What if a GitHub Enterprise user needs access to Test Plans?
140+
Q: What access level should I select if a user has a GitHub Enterprise license?
132141
answer: |
133-
A: GitHub Enterprise users who need access to Test Plans can be assigned the Basic + Test Plans access level.
142+
A: If you know a user has a GitHub Enterprise license, the best option to choose is Stakeholder, to avoid any charges for Basic before the user signs in for the first time
134143
135144
- question: |
136145
Q: What if a GitHub Enterprise user also has a Visual Studio subscription?

docs/organizations/accounts/use-personal-access-tokens-to-authenticate.md

Lines changed: 16 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: d980d58e-4240-47c7-977c-baaa7028a1d8
99
ms.topic: how-to
1010
ms.author: chcomley
1111
author: chcomley
12-
ms.date: 06/12/2025
12+
ms.date: 06/27/2025
1313
monikerRange: '<= azure-devops'
1414
---
1515

@@ -148,9 +148,14 @@ Do the following steps to:
148148

149149
You can revoke a PAT at any time for these and other reasons:
150150

151-
- Revoke a PAT if you suspect it is compromised.
152-
- Revoke a PAT when it is no longer needed.
153-
- Revoke a PAT to enforce security policies or compliance requirements.
151+
- **Security breach**: Revoke a PAT immediately if you suspect it is compromised, leaked, or exposed in logs or public repositories.
152+
- **No longer needed**: Revoke a PAT when the project, service, or integration it was created for is complete or discontinued.
153+
- **Policy compliance**: Revoke a PAT to enforce security policies, compliance requirements, or organizational token rotation schedules.
154+
- **User changes**: Revoke a PAT when a team member leaves the organization or changes roles and no longer needs access.
155+
- **Scope reduction**: Revoke and recreate a PAT with reduced permissions when you need to limit its access capabilities.
156+
- **Regular maintenance**: Revoke a PAT as part of routine security hygiene and token lifecycle management.
157+
158+
Do the following steps to revoke a PAT:
154159

155160
1. From your home page, open user settings :::image type="icon" source="../../media/icons/user-settings-gear.png" border="false"::: and select **Personal access tokens**.
156161

@@ -255,19 +260,22 @@ A: All PATs are associated with the user identity that created it. Applications
255260
In Azure DevOps, you can generate access tokens that aren't linked to a specific user by using Microsoft Entra tokens issued by an [application service principal or managed identity](../../integrate/get-started/authentication/service-principal-managed-identity.md). For pipelines, use [service connections](../../pipelines/library/service-endpoints.md) to securely authenticate and authorize automated tasks without relying on user-specific credentials.
256261
257262
### Q: How can I regenerate/rotate PATs through the API? I saw that option in the UI, but I don’t see a similar method in the API.
258-
The 'Regenerate' functionality available in the UI actually accomplishes a few actions, which can be replicated through API.
263+
A: The 'Regenerate' functionality available in the UI actually accomplishes a few actions, which can be replicated through API.
259264
260265
To rotate your PAT, do the following steps:
261266
1. See PAT metadata with a **GET** call,
262267
2. Create a new PAT with the old PAT ID using a **POST** call,
263268
3. Revoke the old PAT using a **DELETE** call.
264269
270+
### Q: How long do expired, revoked, or inactive PATs remain visible in the Azure DevOps token list?
271+
272+
A: PATs that are expired or revoked can no longer be used or regenerated. However, they remain visible in your PAT list for audit and reference purposes. These inactive tokens typically stay visible for several months after expiration or revocation before being automatically removed from the display. This visibility helps you track your token history and ensure proper cleanup of unused credentials.
273+
265274
### Q: I see a "Need admin approval" pop-up when I try to use a Microsoft Entra app to call the PAT Lifecycle Management APIs.
266-
Your tenant's security policies require admin consent before applications can access organization resources in the organization. Reach out to your tenant administrator.
275+
A: Your tenant's security policies require admin consent before applications can access organization resources in the organization. Reach out to your tenant administrator.
267276
268277
### Q: Can I use a service principal to create or manage PATs?
269-
No, personal access tokens belong to a user identity. Microsoft Entra [service principals or managed identities](../../integrate/get-started/authentication/service-principal-managed-identity.md) are able to generate short-lived Microsoft Entra tokens that can be used in most places where a PAT is accepted. Learn more about [our efforts to reduce PAT usage across Azure DevOps](https://devblogs.microsoft.com/devops/reducing-pat-usage-across-azure-devops/) and explore replacing PATs with Microsoft Entra tokens.
270-
278+
A: No, PATs belong to a user identity. Microsoft Entra [service principals or managed identities](../../integrate/get-started/authentication/service-principal-managed-identity.md) can generate short-lived Microsoft Entra tokens that you can use in most places where a PAT is accepted. Learn more about [our efforts to reduce PAT usage across Azure DevOps](https://devblogs.microsoft.com/devops/reducing-pat-usage-across-azure-devops/) and explore replacing PATs with Microsoft Entra tokens.
271279
272280
## Related articles
273281

0 commit comments

Comments
 (0)