You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -181,17 +181,17 @@ To configure open access for pipelines, you must have the following permissions
181
181
182
182
| Prerequisite Azure DevOps Permission | Additional required permission to configure open access |
183
183
|--|--|
184
-
| Project collection administrator | No additional permission required to configure open access |
184
+
| Project collection administrator | No additional permission required to configure open access. |
185
185
| Organization level pools administrator | You must be [Project administrator](../organizations/security/change-organization-collection-level-permissions.md#add-members-to-the-project-administrators-group) for each project that will be granted access to the Managed DevOps Pool. |
186
186
187
-
By default, every pipeline definition must be explictly authorized to run in a self-hosted agent pool (like a Managed DevOps Pool) before it is run for the first time in that pool.
187
+
By default, every pipeline definition must be explicitly authorized to run in a self-hosted agent pool (like a Managed DevOps Pool) before it is run for the first time in that pool.
188
188
189
189
Azure DevOps provides the following modes for authorizing pipelines to run in an agent pool.
190
190
191
191
* **Authorize specific pipelines** - Individually authorize specific pipelines from an Azure DevOps project to run in the pool. This method is the default.
192
192
* **Open access** - Configure an agent pool at project level to be available for all pipelines in that project.
193
193
194
-
Enable **Allow all pipelines to run on the pool without an approval (open access)** to configure the **Open access** agent pool setting in Azure DevOps when when creating the pool.
194
+
Enable **Allow all pipelines to run on the pool without an approval (open access)** to configure the **Open access** agent pool setting in Azure DevOps when creating the pool.
195
195
196
196
> [!NOTE]
197
197
> The **Allow all pipelines to run on the pool without an approval (open access)** setting can be configured by Managed DevOps Pools only when the pool is created. After the Managed DevOps Pool is created, you can view and configure [Open access](../pipelines/policies/permissions.md#set-pipeline-permissions-for-an-individual-agent-pool) on the corresponding [agent pool](../pipelines/agents/pools-queues.md) in Azure DevOps for each project that uses the pool.
@@ -217,7 +217,7 @@ If you enable **Use pool in multiple organizations**, you can specify **Open acc
217
217
Organizations are configured in the `organizationProfile` property of the Managed DevOps Pools resource. The following example has two organizations configured.
218
218
219
219
* The `fabrikam-tailspin` organization is configured with **Open access** on all projects.
220
-
* The `fabrikam-prime` organization is configured for availibility with two projects, with **Open access** enabled only on these two projects.
220
+
* The `fabrikam-prime` organization is configured for availability with two projects, with **Open access** enabled only on these two projects.
221
221
222
222
```json
223
223
"organizationProfile": {
@@ -258,7 +258,7 @@ az mdp pool create \
258
258
The following `orgaization-profile` example has two organizations configured.
259
259
260
260
* The `fabrikam-tailspin` organization is configured with **Open access** on all projects.
261
-
* The `fabrikam-prime` organization is configured for availibility with two projects, with **Open access** enabled only on these two projects.
261
+
* The `fabrikam-prime` organization is configured for availability with two projects, with **Open access** enabled only on these two projects.
262
262
263
263
```json
264
264
{
@@ -285,7 +285,7 @@ The following `orgaization-profile` example has two organizations configured.
285
285
286
286
* * *
287
287
288
-
If you try to run a pipeline that is not authorized to access your agent pool, you'll receive an error similar to `This pipeline needs permission to access a resource before this run can continue`. You can resolve this issue either by configuring open access, as described in the previous section, or by [explictly authorizing the pipeline to run in the agent pool](../pipelines/troubleshooting/troubleshooting.md#this-pipeline-needs-permission-to-access-a-resource-before-this-run-can-continue).
288
+
If you try to run a pipeline that is not authorized to access your agent pool, you'll receive an error similar to `This pipeline needs permission to access a resource before this run can continue`. You can resolve this issue either by configuring open access, as described in the previous section, or by [explicitly authorizing the pipeline to run in the agent pool](../pipelines/troubleshooting/troubleshooting.md#this-pipeline-needs-permission-to-access-a-resource-before-this-run-can-continue).
0 commit comments