You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/organizations/accounts/faq-user-and-permissions-management.yml
+18-9Lines changed: 18 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ metadata:
9
9
ms.topic: faq
10
10
ms.author: chcomley
11
11
author: chcomley
12
-
ms.date: 06/16/2025
12
+
ms.date: 06/27/2025
13
13
monikerRange: '<= azure-devops'
14
14
title: User and permissions management FAQs
15
15
summary: |
@@ -108,29 +108,38 @@ sections:
108
108

109
109
110
110
- question: |
111
-
Q: Are users using GitHub Enterprise Server detected as having GitHub Enterprise?
111
+
Q: How are GitHub Enterprise users detected?
112
112
answer: |
113
-
A: No, only GitHub Enterprise cloud users are detected in Azure DevOps. Customers using GitHub Server can [sync license usage between GitHub Enterprise Server and GitHub Enterprise Cloud](https://docs.github.com/[email protected]/billing/managing-your-license-for-github-enterprise/syncing-license-usage-between-github-enterprise-server-and-github-enterprise-cloud).
113
+
A: Azure DevOps automatically checks if a user has GitHub Enterprise when the user signs in. It can take up to 24 hours for their access level to change to GitHub Enterprise. There are no charges for a user with the GitHub Enterprise access level.
114
114
115
115
- question: |
116
116
Q: What kind of access do GitHub Enterprise users get in Azure DevOps?
117
117
answer: |
118
118
A: Basic access, which includes all features except Test Plans. For more information, see [Pricing for Azure DevOps](https://azure.microsoft.com/pricing/details/devops/azure-devops-services/)
119
119
120
120
- question: |
121
-
Q: How are GitHub Enterprise users detected?
121
+
Q: What if a GitHub Enterprise user needs access to Test Plans?
122
122
answer: |
123
-
A: Azure DevOps automatically checks if a user has GitHub Enterprise when the user signs in. It can take up to 24 hours for their access level to change to GitHub Enterprise. There are no charges for a user with the GitHub Enterprise access level.
123
+
A: GitHub Enterprise users who need access to Test Plans can be assigned the Basic + Test Plans access level.
124
124
125
125
- question: |
126
-
Q: What access level should I select if a user has a GitHub Enterprise license?
126
+
Q: What happens when a GitHub Enterprise license is no longer detected?
127
127
answer: |
128
-
A: If you know a user has a GitHub Enterprise license, the best option to choose is Stakeholder, to avoid any charges for Basic before the user signs in for the first time
128
+
A: When a user no longer has GitHub Enterprise, they're treated like a new user.
129
+
- Your organization's default access level, whether Basic or Basic + Test Plans, gets assigned automatically.
130
+
- If your organization established Group Rules, the user receives the access specified for their Microsoft Entra group. Group rule reevaluation occurs every 24 hours, so they might initially have Stakeholder access before receiving group rule access.
131
+
132
+
Otherwise, users who no longer have access through GitHub Enterprise maintain Stakeholder access until an administrator assigns them paid access.
133
+
134
+
- question: |
135
+
Q: Are users using GitHub Enterprise Server detected as having GitHub Enterprise?
136
+
answer: |
137
+
A: No, only GitHub Enterprise cloud users are detected in Azure DevOps. Customers using GitHub Server can [sync license usage between GitHub Enterprise Server and GitHub Enterprise Cloud](https://docs.github.com/[email protected]/billing/managing-your-license-for-github-enterprise/syncing-license-usage-between-github-enterprise-server-and-github-enterprise-cloud).
129
138
130
139
- question: |
131
-
Q: What if a GitHub Enterprise user needs access to Test Plans?
140
+
Q: What access level should I select if a user has a GitHub Enterprise license?
132
141
answer: |
133
-
A: GitHub Enterprise users who need access to Test Plans can be assigned the Basic + Test Plans access level.
142
+
A: If you know a user has a GitHub Enterprise license, the best option to choose is Stakeholder, to avoid any charges for Basic before the user signs in for the first time
134
143
135
144
- question: |
136
145
Q: What if a GitHub Enterprise user also has a Visual Studio subscription?
You can revoke a PAT at any time for these and other reasons:
150
150
151
-
- Revoke a PAT if you suspect it is compromised.
152
-
- Revoke a PAT when it is no longer needed.
153
-
- Revoke a PAT to enforce security policies or compliance requirements.
151
+
-**Security breach**: Revoke a PAT immediately if you suspect it is compromised, leaked, or exposed in logs or public repositories.
152
+
-**No longer needed**: Revoke a PAT when the project, service, or integration it was created for is complete or discontinued.
153
+
-**Policy compliance**: Revoke a PAT to enforce security policies, compliance requirements, or organizational token rotation schedules.
154
+
-**User changes**: Revoke a PAT when a team member leaves the organization or changes roles and no longer needs access.
155
+
-**Scope reduction**: Revoke and recreate a PAT with reduced permissions when you need to limit its access capabilities.
156
+
-**Regular maintenance**: Revoke a PAT as part of routine security hygiene and token lifecycle management.
157
+
158
+
Do the following steps to revoke a PAT:
154
159
155
160
1. From your home page, open user settings :::image type="icon" source="../../media/icons/user-settings-gear.png" border="false"::: and select **Personal access tokens**.
156
161
@@ -255,19 +260,22 @@ A: All PATs are associated with the user identity that created it. Applications
255
260
In Azure DevOps, you can generate access tokens that aren't linked to a specific user by using Microsoft Entra tokens issued by an [application service principal or managed identity](../../integrate/get-started/authentication/service-principal-managed-identity.md). For pipelines, use [service connections](../../pipelines/library/service-endpoints.md) to securely authenticate and authorize automated tasks without relying on user-specific credentials.
256
261
257
262
### Q: How can I regenerate/rotate PATs through the API? I saw that option in the UI, but I don’t see a similar method in the API.
258
-
The 'Regenerate' functionality available in the UI actually accomplishes a few actions, which can be replicated through API.
263
+
A: The 'Regenerate' functionality available in the UI actually accomplishes a few actions, which can be replicated through API.
259
264
260
265
To rotate your PAT, do the following steps:
261
266
1. See PAT metadata with a **GET** call,
262
267
2. Create a new PAT with the old PAT ID using a **POST** call,
263
268
3. Revoke the old PAT using a **DELETE** call.
264
269
270
+
### Q: How long do expired, revoked, or inactive PATs remain visible in the Azure DevOps token list?
271
+
272
+
A: PATs that are expired or revoked can no longer be used or regenerated. However, they remain visible in your PAT list for audit and reference purposes. These inactive tokens typically stay visible for several months after expiration or revocation before being automatically removed from the display. This visibility helps you track your token history and ensure proper cleanup of unused credentials.
273
+
265
274
### Q: I see a "Need admin approval" pop-up when I try to use a Microsoft Entra app to call the PAT Lifecycle Management APIs.
266
-
Your tenant's security policies require admin consent before applications can access organization resources in the organization. Reach out to your tenant administrator.
275
+
A: Your tenant's security policies require admin consent before applications can access organization resources in the organization. Reach out to your tenant administrator.
267
276
268
277
### Q: Can I use a service principal to create or manage PATs?
269
-
No, personal access tokens belong to a user identity. Microsoft Entra [service principals or managed identities](../../integrate/get-started/authentication/service-principal-managed-identity.md) are able to generate short-lived Microsoft Entra tokens that can be used in most places where a PAT is accepted. Learn more about [our efforts to reduce PAT usage across Azure DevOps](https://devblogs.microsoft.com/devops/reducing-pat-usage-across-azure-devops/) and explore replacing PATs with Microsoft Entra tokens.
270
-
278
+
A: No, PATs belong to a user identity. Microsoft Entra [service principals or managed identities](../../integrate/get-started/authentication/service-principal-managed-identity.md) can generate short-lived Microsoft Entra tokens that you can use in most places where a PAT is accepted. Learn more about [our efforts to reduce PAT usage across Azure DevOps](https://devblogs.microsoft.com/devops/reducing-pat-usage-across-azure-devops/) and explore replacing PATs with Microsoft Entra tokens.
0 commit comments