Skip to content

Commit 1ed78b6

Browse files
Steve DanielsonSteve Danielson
Steve Danielson
authored and
Steve Danielson
committed
MDP Open access
1 parent 75a3e54 commit 1ed78b6

File tree

3 files changed

+47
-1
lines changed

3 files changed

+47
-1
lines changed

docs/managed-devops-pools/configure-security.md

+31-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Configure security
33
description: Learn how to configure security settings for Managed DevOps Pools.
4-
ms.date: 11/18/2024
4+
ms.date: 04/23/2025
55
---
66

77
# Configure Managed DevOps Pools security settings
@@ -175,6 +175,36 @@ Add additional organizations to the organizations list to configure your pool fo
175175

176176
* * *
177177

178+
## Allow all pipelines to run on the pool without an approval (open access)
179+
180+
By default, each pipeline definition must be explictly authorized to run in a self-hosted agent pool (like a Managed DevOps Pool) before it is run for the first time in that pool.
181+
182+
Azure DevOps provides a [Pipeline permissions](../pipelines/policies/permissions.md#set-pipeline-permissions-for-an-individual-agent-pool) setting at the agent pool level to authorize specific pipelines to run in that pool, or to configure the pool for **Open access** to be available for all pipelines in that project.
183+
184+
Managed DevOps Pools can configure the **Open access** setting on your behalf when creating the Managed DevOps Pool if you enable **Allow all pipelines to run on the pool without an approval (open access)** during pool creation.
185+
186+
> [!NOTE]
187+
> The **Allow all pipelines to run on the pool without an approval (open access)** setting can be configured by Managed DevOps Pools only when the pool is created. After the Managed DevOps Pool is created, you can view and configure [Open access](../pipelines/policies/permissions.md#set-pipeline-permissions-for-an-individual-agent-pool) on the corresponding [agent pool](../pipelines/agents/pools-queues.md) in Azure DevOps.
188+
189+
#### [Azure portal](#tab/azure-portal/)
190+
191+
:::image type="content" source="./media/configure-security/open-access.png" alt-text="Screenshot of configuring open access.":::
192+
193+
#### [ARM template](#tab/arm/)
194+
195+
TODO
196+
197+
#### [Azure CLI](#tab/azure-cli/)
198+
199+
TODO
200+
201+
* * *
202+
203+
If you try to run a pipeline that is not authorized to access your aget pool, you'll receive an error similar to `This pipeline needs permission to access a resource before this run can continue`. There are two ways to explictly authorize a pipeline to run in a pool (in addition to confguring **Open access**).
204+
205+
* You can go to the **Security** settings for the agent pool in your Azure DevOps organization and add the pipeline in [Pipeline permissions](../pipelines/agents/pools-queues.md#pipeline-permissions).
206+
* If you don't add the pipeline, you will be [prompted in Azure DevOps the first time you run the pipeline](../pipelines/troubleshooting/troubleshooting.md#this-pipeline-needs-permission-to-access-a-resource-before-this-run-can-continue). When you authorize the pipeline, it will be added to the **Pipeline permissions** list.
207+
178208
## Configure interactive mode
179209

180210
If your tests need an interactive login for UI testing, enable interactive login by enabling the **EnableInteractiveMode** setting.
Loading

docs/pipelines/troubleshooting/troubleshooting.md

+16
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,7 @@ If the issue isn't apparent from the pipeline run summary page or browsing the l
7676

7777
## Common issues
7878

79+
* [This pipeline needs permission to access a resource before this run can continue](#this-pipeline-needs-permission-to-access-a-resource-before-this-run-can-continue)
7980
* [Job time-out](#job-time-out)
8081
* [Issues downloading code](#issues-downloading-code)
8182
* [My pipeline is failing on a command-line step such as MSBUILD](#my-pipeline-is-failing-on-a-command-line-step-such-as-msbuild)
@@ -110,6 +111,21 @@ Azure DevOps includes build-in notifications for failed pipeline runs. To enable
110111

111112
:::moniker-end
112113

114+
### This pipeline needs permission to access a resource before this run can continue
115+
116+
If your pipeline doesn't seem to start, or you receive an error message like `This pipeline needs permission to access a resource before this run can continue`, check to see if the pipeline is waiting for an authrization to run by a resource, like a service connection or agent pool.
117+
118+
1. [Go to the pipeline](../create-first-pipeline.md#view-and-manage-your-pipelines) and manually start a run.
119+
1. The message **This pipeline needs permission to access a resource before this run can continue** appears. Select **View** next to the message.
120+
1. On the **Waiting for review** screen, select **Permit**, and on the confirmation screen, select **Permit** again.
121+
122+
This action explictly adds the pipeline as an authorized user of the resource.
123+
124+
Some resources allow you to configure **Open access** so that each new pipeline definition doesn't require explicit authorization.
125+
126+
* To configure **Open access** for agent pools, see [Set pipeline permissions for an individual agent pool](../policies/permissions.md#set-pipeline-permissions-for-an-individual-agent-pool) and [Pipeline permissions](../agents/pools-queues.md#pipeline-permissions).
127+
* To review whether **Open access** is available for other [resource types](../process/resources.md#resource-authorization-in-yaml-pipelines), see [Manage security in Azure Pipelines](../policies/permissions.md) and search for **Open access**.
128+
113129
### Job time-out
114130

115131
A pipeline can run for a long time and then fail due to job time-out.

0 commit comments

Comments
 (0)