You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Find out how to use the OAuth 2.0 standard to grant a service access your Azure DevOps resources when you integrate that service with Azure DevOps.
6
+
description: Find out how to use OpenID Connect (OIDC)-based authentication to grant a service access to your Azure DevOps work items, source code, and other resources.
7
7
ms.assetid: 314a28cd-b2ae-41a0-8dfb-330222c1aed0
8
8
ms.author: chcomley
9
9
author: chcomley
10
10
monikerRange: '<= azure-devops'
11
11
ms.date: 06/24/2025
12
-
# customer intent: As a developer, I want to use OAuth 2.0 to give an integrated service access to my Azure DevOps resources so that I don't have to give the service my Azure credentials.
12
+
# customer intent: As a developer, I want to use OpenID Connect (OIDC)-based authentication to give an integrated service access to my Azure DevOps resources so that I don't have to give the service my Azure credentials.
13
13
---
14
14
15
15
# Manage authorization of services to access Azure DevOps
@@ -18,15 +18,11 @@ ms.date: 06/24/2025
18
18
19
19
When you integrate a service with Azure DevOps, you can grant the service access to your Azure DevOps resources, such as work items, source code, and build results.
20
20
21
-
Azure DevOps uses the industry-standard OAuth 2.0 authorization framework to grant the service access to your resources.
21
+
Azure DevOps uses OpenID Connect (OIDC)-based authentication to grant the service access to your resources.
22
22
23
23
- Authorizations are bound to your credentials, so the service can use an authorization to access your resources in Azure DevOps.
24
24
- You use your Microsoft account or your work account to authorize the service.
25
25
- The service that you authorize doesn't have access to your Azure DevOps credentials.
26
-
- You can revoke any authorizations that you grant to other services.
27
-
28
-
> [!IMPORTANT]
29
-
> Azure DevOps OAuth is slated for deprecation in 2026. To build an application on top of Azure DevOps REST APIs, explore the [Microsoft identity platform](/entra/identity-platform/v2-overview) and [register your application in Microsoft Entra ID](/entra/identity-platform/quickstart-register-app). For more information, see [No new Azure DevOps OAuth apps beginning April 2025](https://devblogs.microsoft.com/devops/no-new-azure-devops-oauth-apps/).
30
26
31
27
## Prerequisites
32
28
@@ -36,37 +32,40 @@ Azure DevOps uses the industry-standard OAuth 2.0 authorization framework to gra
36
32
|**Access levels**| At least **Basic** access. |
37
33
|**Permissions**| Member of the [Project Collection Administrators group](../organizations/security/look-up-project-collection-administrators.md). Organization owners are automatically members of this group.|
38
34
35
+
## Authentication frameworks
36
+
37
+
When you build an application on top of Azure DevOps REST APIs, you can use OIDC-based authentication by [registering your application in Microsoft Entra ID](/entra/identity-platform/quickstart-register-app). For more information, see [What is the Microsoft identity platform?](/entra/identity-platform/v2-overview).
38
+
39
+
Some older apps use an implementation of OAuth 2.0 to get access tokens for Azure DevOps resources. Registrations of these Azure DevOps OAuth applications are no longer supported, because Azure DevOps OAuth is slated for deprecation in 2026. For more information, see [No new Azure DevOps OAuth apps beginning April 2025](https://devblogs.microsoft.com/devops/no-new-azure-devops-oauth-apps/).
40
+
39
41
## Authorize a service
40
42
41
43
A typical authorization flow might include the following steps:
42
44
43
-
1. You're using a service that uses Azure DevOps resources, so the service requests authorization.
44
-
45
-
1. If you're not already signed in, Azure DevOps prompts you for your credentials.
45
+
1. You use a service that uses Azure DevOps resources, so the service requests authorization.
46
46
47
-
:::image type="content" source="media/authorize/vso-sign-in.png" alt-text="Screenshot of a Visual Studio Codespaces sign-in page with fields for a Microsoft email address and password.":::
47
+
1. To initiate the authentication process for the service, the registered app opens a Microsoft Entra ID website.
48
48
49
-
1. After you sign in, the authorization approval page appears.
49
+
:::image type="content" source="media/authorize/microsoft-account-selection.png" alt-text="Screenshot of a Microsoft dialog for selecting an account. One account is visible, and an option for adding another account is available.":::
50
50
51
-
:::image type="content" source="media/authorize/vso-authorize.png" alt-text="Screenshot of the Visual Studio Codespaces Authorize application page. An app name and description and a list of requested permissions are visible.":::
51
+
1. After you select an account, the authorization approval page appears.
52
52
53
-
Services can only request full access to all the resources that are available to you through the REST APIs, so the authorization request might not be specific.
53
+
:::image type="content" source="media/authorize/authorize-azure-devops-permissions.png" alt-text="Screenshot of a Microsoft Permissions requested dialog. An app name, a list of requested permissions, and Cancel and Accept buttons are visible.":::
54
54
55
55
1. You review the request and approve the authorization.
56
56
57
-
1. The authorized service uses that authorization to access resources in your Visual Studio account.
57
+
1. The authorized service uses that authorization to access resources in your Azure DevOps organization.
58
58
59
59
To ensure an authorization request is legitimate, take the following precautions:
60
60
61
-
- Look for Azure DevOps branding across the upper portion of the authorization approval page.
62
-
- Ensure the authorization approval page URL begins with `https://app.vssps.visualstudio.com/`.
63
61
- Pay attention to any HTTPS-related security warnings in your browser.
64
62
- Don't give your credentials to other services directly. Enter your credentials only through the authorization approval page in Azure DevOps.
65
63
66
64
## Manage authorizations
67
65
68
-
For a list of services that are authorized to access your account, go to [https://app.vssps.visualstudio.com/Profile/View](https://app.vssps.visualstudio.com/Profile/View)
69
-
and select **Manage authorizations**.
66
+
When you register an app in Microsoft Entra ID, the app can request tokens from the Microsoft identity platform. An authenticated service can then use a token to access specific protected resources. The lifetime of each token is at most 90 minutes. After a token expires, the service's access to the resources is revoked. For more information, see [Token lifetime](/entra/identity-platform/access-tokens#token-lifetime).
67
+
68
+
In contrast, apps that are registered with Azure DevOps OAuth can authorize services to access Azure DevOps resources for longer periods of time. For a list of services that are currently authorized to access your account, go to [https://app.vssps.visualstudio.com/Profile/View](https://app.vssps.visualstudio.com/Profile/View) and select **Manage authorizations**.
70
69
71
70
:::image type="content" source="media/authorize/authorizations.png" alt-text="Screenshot of the Authorizations dialog. The permissions granted to the Zapier service are visible, and a Revoke link is available.":::
0 commit comments