You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/pipelines/policies/agent-pool-permissions.md
+16-1
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Configure Agent Pool Security in Azure Pipelines
2
+
title: Configure agent pool security in Azure Pipelines
3
3
ms.topic: how-to
4
4
description: Configure agent pool security in Azure Pipelines.
5
5
ms.author: v-catherbund
@@ -112,7 +112,11 @@ To configure security roles for all agent pools in the collection:
112
112
113
113
1. Go to **Organization settings** ::::image type="icon" source="../../media/icons/team-settings-gear-icon.png" border="false"::: and select **Agent pools**.
114
114
1. Select an agent pool.
115
+
115
116
1. Select **Security**.
117
+
118
+
:::image type="content" source="media\agent-pools-organization-level-security-dialog.png" alt-text="Screenshot of organization-level security dialog for all agent pools.":::
119
+
116
120
1. To add users and groups:
117
121
1. Select **Add**
118
122
1. Enter a user or group and select it from the search results.
@@ -154,6 +158,7 @@ To configure security roles for all agent pools in the collection:
154
158
1. Repeat the previous step to add more users and groups.
155
159
1. Select a role and select **Add**.
156
160
161
+
157
162
:::image type="content" source="media/agent-pool-add-user.png" alt-text="Screenshot of add user dialog for all agent pools.":::
158
163
159
164
1. To remove a user or group from the list, select the user or group and select the delete button:::image type="icon" source="../../media/icons/delete-icon.png" border="false":::. Inheritance must be turned off or the user or group must not be inherited from the project-level security settings.
@@ -185,6 +190,7 @@ To configure security roles for all agent pools in the collection:
185
190
1. Repeat the previous step to add more users and groups.
186
191
1. Select a role and select **Add**.
187
192
193
+
188
194
:::image type="content" source="media/agent-pool-add-user.png" alt-text="Screenshot of collection-level add user dialog.":::
189
195
190
196
1. To remove a user or group, select the user or group and select the delete button:::image type="icon" source="../../media/icons/delete-icon.png" border="false":::.
@@ -217,7 +223,9 @@ To configure security roles for all agent pools in the collection:
217
223
1. Enter a user or group and select it from the search results.
218
224
1. Repeat the previous step to add more users and groups.
219
225
1. Select a role and select **Add**.
226
+
220
227
:::image type="content" source="media/agent-pool-add-user.png" alt-text="Screenshot of collection-level add user dialog.":::
228
+
221
229
1. To remove a user or group from the list, select the user or group and select the delete button:::image type="icon" source="../../media/icons/delete-icon.png" border="false":::.
222
230
223
231
1. To change a security role, select the user or group and select the role from the dropdown list.
@@ -235,14 +243,18 @@ The security roles at this level are **Reader**, **Service Account**, and **Admi
235
243
To configure security roles for all agent pools in the collection:
236
244
237
245
1. Go to **Collection settings** ::::image type="icon" source="../../media/icons/team-settings-gear-icon.png" border="false"::: and select **Agent pools**.
246
+
238
247
1. Select an agent pool.
248
+
239
249
1. Select the **Roles** tab.
240
250
1. To add users and groups:
241
251
1. Select **Add**
242
252
1. Enter a user or group and select it from the search results.
243
253
1. Repeat the previous step to add more users and groups.
244
254
1. Select a role and select **Add**.
255
+
245
256
:::image type="content" source="media/agent-pool-add-user.png" alt-text="Screenshot of collection-level add user dialog.":::
257
+
246
258
1. To remove a user or group from the list, select the user or group and select the delete button:::image type="icon" source="../../media/icons/delete-icon.png" border="false":::.
247
259
1. To change a security role, select the user or group and select the role from the dropdown list.
248
260
1. Select the **Save changes** button:::image type="icon" source="media/save-icon.png" border="false"::: to save your changes or the **Reset changes** button:::image type="icon" source="media/reset-icon.png" border="false"::: to revert unsaved changes.
@@ -284,6 +296,7 @@ You can override project-level user and group role assignments, and set pipeline
284
296
To open the security dialog:
285
297
286
298
1. From your project, select **Project settings** :::image type="icon" source="../../media/icons/team-settings-gear-icon.png" border="false"::: and select **Agent pools**.
299
+
287
300
1. Select an agent pool.
288
301
1. Select **Security**.
289
302
@@ -322,6 +335,7 @@ When you explicitly set a role, the inheritance for that user or group is turned
322
335
To add project users or groups that aren't listed in the security dialog:
323
336
324
337
1. Select the **Add** button.
338
+
325
339
1. Enter the user or group in the search bar, then select the user or group from the search result. You can add multiple users and groups.
326
340
1. Select the **Role**.
327
341
1. Select **Add** to save the changes.
@@ -356,6 +370,7 @@ When you explicitly set a role, the inheritance for that user or group is turned
356
370
To add project users or groups that aren't listed in the security dialog:
357
371
358
372
1. Select the **Add** button.
373
+
359
374
1. Enter the user or group in the search bar, then select the user or group from the search result. You can add multiple users and groups.
This article provides guidance on managing security for environments in Azure Pipelines. Environments group together deployment targets for use with YAML pipelines. However, they are not supported in classic pipelines.
15
+
This article provides guidance on managing security for environments in Azure Pipelines. Environments group together deployment targets for use with YAML pipelines. However, they aren't supported in classic pipelines.
16
16
17
-
By default, all environments in a project inherit security roles that are assigned to a set of default users and groups at the project level. Security settings can be managed at both the project level and the object level for individual environments..
17
+
By default, all environments in a project inherit security roles that are assigned to a set of default users and groups at the project level. Security settings can be managed at both the project level and the object level for individual environments.
18
18
19
19
Security roles for environments are:
20
20
@@ -34,7 +34,7 @@ The default user and group role assignments are:
Copy file name to clipboardexpand all lines: docs/pipelines/policies/library-permissions.md
+7-1
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Configure Library Security in Azure Pipelines
2
+
title: Configure library security in Azure Pipelines
3
3
ms.topic: how-to
4
4
description: Configure security for the library and library assets in Azure Pipelines.
5
5
ms.author: v-catherbund
@@ -67,6 +67,12 @@ To add project users or groups that aren't listed in the security dialog:
67
67
68
68
::: moniker-end
69
69
70
+
::: moniker range="< azure-devops-2020"
71
+
72
+
You can manage access for all library assets, such as [variable groups](../library/variable-groups.md) and [secure files](../library/secure-files.md), from the project-level library security settings.
73
+
74
+
::: moniker-end
75
+
70
76
## Set secure file security roles
71
77
72
78
Security roles for **Secure files** are inherited from the project-level library role assignments by default. You can override these assignments for an individual file. To remove an inherited user or group, or lower the privilege level of an inherited role, you must disable inheritance.
Azure Pipelines security helps you control access to your pipelines and pipeline resources. Access is managed through a hierarchial system of built-in and custom security groups and users.
16
+
Azure Pipelines security helps you control access to your pipelines and pipeline resources. Access is managed through a hierarchical system of built-in and custom security groups and users.
17
17
18
18
Pipeline resources are features and objects that are used in pipelines, but exist outside of the pipeline itself. For example, release pipelines, task groups, agent pools, and service connections are all pipeline resources.
19
19
20
-
Upon the creation of a pipeline or resource, a set of built-in security groups and users are assigned access permissions or roles at the project level. These project-level security settings are then inherited at the object level for individual objects. For instance, when you create a pipeline, a default set of users and groups are assigned permissions at the project level. These security settings are subsequently inherited at the object level for all pipelines within the project.
20
+
Upon the creation of a pipeline or resource, a set of built-in security groups and users are assigned access permissions or roles at the project level. These project-level security settings are then inherited at the object level for individual objects. For instance, when you create a pipeline, a default set of users and groups is assigned permissions at the project level. These security settings are then inherited at the object level for all pipelines within the project.
21
21
22
-
Commonly, administrator groups are given full access to all pipelines and resources. Contributors are often granted access to manage resources and pipelines, while readers are given view-only access. Users are assigned to security groups based on their role in the project and the permissions they need to perform their tasks.
22
+
Commonly, administrator groups are given full access to all pipelines and resources. Contributors are often granted access to manage resources and pipelines, while readers are given view-only access. Users are assigned to security groups based on their role in the project and the permissions they need to perform their tasks.
23
23
24
24
You can add and delete users and groups and change their permissions and roles at both the project- and object-levels. Object-level inheritance can be enabled and disabled.
Copy file name to clipboardexpand all lines: docs/pipelines/policies/release-pipeline-permissions.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Set Release Pipeline Permissions in Azure Pipelines
2
+
title: Set release pipeline permissions in Azure Pipelines
3
3
ms.topic: how-to
4
4
description: Learn how to set user and group permissions to securely manage release pipelines.
5
5
ms.author: v-catherbund
@@ -180,7 +180,7 @@ You can set the permissions to **Allow**, **Deny**, or to **Not set** if the per
180
180
181
181
1. To add users or groups that aren't listed in the permissions dialog, select **Add**, enter the user or group, and select **Save changes**.
182
182
183
-
1. Select a user and group and set the permission to **Allow**, **Deny**, or **Not set**, or the inherited value (for example, **Allow (inherited).
183
+
1. Select a user and group and set the permission to **Allow**, **Deny**, or **Not set**, or the inherited value (for example, **Allow (inherited)**).
184
184
185
185
:::image type="content" source="media/releases-individual-pipeline-permissions-2019.png" alt-text="Screenshot of release pipeline security add user or group selection.":::
Copy file name to clipboardexpand all lines: docs/pipelines/policies/service-connection-permissions.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Configure Service Connections Security in Azure Pipelines
2
+
title: Configure service connections security in Azure Pipelines
3
3
ms.topic: how-to
4
4
description: Configure security for service connection in Azure Pipelines.
5
5
ms.author: v-catherbund
@@ -121,7 +121,7 @@ Follow these steps to configure security roles for an individual service connect
121
121
122
122
1. In the **User permissions** section of the **Security** dialog, select **Project** to manage project-level users and groups, or **Organization** to manage organization- or collection-level users and groups.
123
123
124
-
:::image type="content" source="media/indivdual-service-connection-permission-user-dialog.png" alt-text="Screenshot of user permissions dialog for individual service connections.":::
124
+
:::image type="content" source="media/individual-service-connection-permission-user-dialog.png" alt-text="Screenshot of user permissions dialog for individual service connections.":::
125
125
126
126
1. Select users and groups and change their roles. To lower the privilege level of an inherited role, inheritance must be disabled.
127
127
1. To remove a user or group, select the user or group and select the delete button:::image type="icon" source="../../media/icons/delete-icon.png" border="false":::. Inherited users and groups can't be removed unless inheritance is disabled.
0 commit comments