Skip to content

Commit 32b2a3c

Browse files
author
RoseHJM
committed
Graphics
1 parent 2544337 commit 32b2a3c

5 files changed

+13
-9
lines changed

articles/dev-box/how-to-customizations-connect-resource-repository.md

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -144,20 +144,24 @@ tasks:
144144
This setup allows automated, secure access to Azure resources during Dev Box provisioning, without exposing credentials in the script.
145145

146146
### Example: Download an artifact from Azure DevOps
147-
You can also download build artifacts from Azure DevOps (ADO) by using a service principal for authentication. First, add the service principal as a user in your Azure DevOps organization and then assign it to the *Readers* group. This grants the necessary permissions to access build artifacts.
148-
149-
- Add the service principal's Application ID (appId) as a user in your Azure DevOps organization.
150-
- Assign the service principal to the **Readers** group to provide read access to artifacts.
147+
You can also download build artifacts from Azure DevOps (ADO) by using a service principal for authentication. To do this, add the service principal's Application ID (appId) as a user in your Azure DevOps organization and assign it to the **Readers** group. This provides the necessary permissions to access build artifacts.
151148

152149
Once configured, you can use the service principal credentials in your customization tasks to authenticate and download artifacts securely from Azure DevOps.
153150

154-
To add a service principal to your Azure DevOps organization and the Readers group:
151+
To add a service principal to your Azure DevOps organization: and the Readers group:
155152

156153
1. Go to your Azure DevOps organization settings.
157-
2. Select **Users** and click **Add users**.
158-
3. Enter the service principal's Application ID (appId) as the user email.
159-
4. Assign the user to the **Readers** group.
160-
5. Complete the process to grant the necessary permissions.
154+
1. Select **Users** and click **Add users**.
155+
1. Enter the service principal's Application ID (appId) as the user email.
156+
157+
:::image type="content" source="media/how-to-customizations-connect-resource-repository/dev-box-customizations-devops-add-service-principal.png" alt-text="alt text":::
158+
159+
1. Add to the readers group
160+
1. Assign the user to the **Readers** group.
161+
162+
:::image type="content" source="media/how-to-customizations-connect-resource-repository/dev-box-customizations-devops-add-readers.png" alt-text="alt text":::
163+
164+
1. Complete the process to grant the necessary permissions.
161165

162166
For detailed steps, see [Add users and groups to Azure DevOps](/azure/devops/organizations/security/add-users-team-project).
163167

Loading
Loading
Loading
Loading

0 commit comments

Comments
 (0)