|
1 | 1 | ---
|
2 | 2 | title: Configure security
|
3 | 3 | description: Learn how to configure security settings for Managed DevOps Pools.
|
4 |
| -ms.date: 11/18/2024 |
| 4 | +ms.date: 04/23/2025 |
5 | 5 | ---
|
6 | 6 |
|
7 | 7 | # Configure Managed DevOps Pools security settings
|
@@ -175,6 +175,36 @@ Add additional organizations to the organizations list to configure your pool fo
|
175 | 175 |
|
176 | 176 | * * *
|
177 | 177 |
|
| 178 | +## Allow all pipelines to run on the pool without an approval (open access) |
| 179 | + |
| 180 | +By default, each pipeline definition must be explictly authorized to run in a self-hosted agent pool (like a Managed DevOps Pool) before it is run for the first time in that pool. |
| 181 | + |
| 182 | +Azure DevOps provides a [Pipeline permissions](../pipelines/policies/permissions.md#set-pipeline-permissions-for-an-individual-agent-pool) setting at the agent pool level to authorize specific pipelines to run in that pool, or to configure the pool for **Open access** to be available for all pipelines in that project. |
| 183 | + |
| 184 | +Managed DevOps Pools can configure the **Open access** setting on your behalf when creating the Managed DevOps Pool if you enable **Allow all pipelines to run on the pool without an approval (open access)** during pool creation. |
| 185 | + |
| 186 | +> [!NOTE] |
| 187 | +> The **Allow all pipelines to run on the pool without an approval (open access)** setting can be configured by Managed DevOps Pools only when the pool is created. After the Managed DevOps Pool is created, you can view and configure [Open access](../pipelines/policies/permissions.md#set-pipeline-permissions-for-an-individual-agent-pool) on the corresponding [agent pool](../pipelines/agents/pools-queues.md) in Azure DevOps. |
| 188 | + |
| 189 | +#### [Azure portal](#tab/azure-portal/) |
| 190 | + |
| 191 | +:::image type="content" source="./media/configure-security/open-access.png" alt-text="Screenshot of configuring open access."::: |
| 192 | + |
| 193 | +#### [ARM template](#tab/arm/) |
| 194 | + |
| 195 | +TODO |
| 196 | + |
| 197 | +#### [Azure CLI](#tab/azure-cli/) |
| 198 | + |
| 199 | +TODO |
| 200 | + |
| 201 | +* * * |
| 202 | + |
| 203 | +If you try to run a pipeline that is not authorized to access your aget pool, you'll receive an error similar to `This pipeline needs permission to access a resource before this run can continue`. There are two ways to explictly authorize a pipeline to run in a pool (in addition to confguring **Open access**). |
| 204 | + |
| 205 | +* You can go to the **Security** settings for the agent pool in your Azure DevOps organization and add the pipeline in [Pipeline permissions](../pipelines/agents/pools-queues.md#pipeline-permissions). |
| 206 | +* If you don't add the pipeline, you will be [prompted in Azure DevOps the first time you run the pipeline](../pipelines/troubleshooting/troubleshooting.md#this-pipeline-needs-permission-to-access-a-resource-before-this-run-can-continue). When you authorize the pipeline, it will be added to the **Pipeline permissions** list. |
| 207 | + |
178 | 208 | ## Configure interactive mode
|
179 | 209 |
|
180 | 210 | If your tests need an interactive login for UI testing, enable interactive login by enabling the **EnableInteractiveMode** setting.
|
|
0 commit comments