title | titleSuffix | ms.custom | description | ms.prod | ms.technology | ms.assetid | ms.topic | ms.manager | ms.author | author | ms.date | monikerRange |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Access your organization with Azure Active Directory |
Azure DevOps Services |
seodec18 |
Learn how to authenticate users and control access to your organization the same way you can with Microsoft services, like Office 365 and Azure |
devops |
devops-accounts |
c9aecaaf-9dfb-4877-84b4-60da253e3dc2 |
conceptual |
jillfra |
chcomley |
chcomley |
12/06/2018 |
azure-devops |
[!INCLUDE version-vsts-only]
Learn how to authenticate users and control access to your organization the same way that you can with Microsoft services like Office 365 and Azure. If your organization was created with a Microsoft account, you can connect your organization to your Azure Active Directory (Azure AD). You can then sign in to Azure DevOps with the same username and password that you use with these Microsoft services. You can also enforce policies for accessing your team's critical resources and key assets.
To use existing on-premises identities with Azure DevOps, you can integrate directories with Azure AD by using Azure AD Connect. To switch your organization to another directory, learn how to change your directory in Azure AD.
Your organization authenticates users through your organization's directory so that only users who are members or guests in that directory can get access to your organization. When users are disabled or removed from your directory, they can no longer access your organization by any mechanism including via PATs, SSH, or any other alternate credentials. Only specific Azure AD administrators can manage users in your directory, so they control who can get access to your organization.
Without Azure AD, you're solely responsible for controlling organization access. And all users must sign in with Microsoft accounts.
You need the following:
-
Ownership of the organization that you want to connect to Azure AD.
-
A "full" Azure subscription,such as a Pay-As-You-Go subscription,associated with Azure Active Directory and at least co-administrator permissions for your subscription.
You need both to make your directory appear in the Azure portal, so that you can link your subscription and connect Azure AD to your organization. Learn about Azure subscription co-administrator permissions.
-
Global administrator permissions for your directory so you can add current Azure DevOps users to that directory.
Otherwise, work with your directory's global administrator to add users. Learn more about Azure AD administrators.
To check your permissions, sign in to the Azure portal with your work or school account. Go to your directory.
You must add your Microsoft account to Azure AD.
Although directory membership isn't required to connect your organization to Azure AD, it makes sure that you can sign in and access your organization after you connect to Azure AD. Otherwise, your Microsoft account does not have access to your organization.
Your work in Azure DevOps is associated with your sign-in address. After your organization is connected to your directory, users continue working seamlessly if their sign-in addresses appear in the connected directory. If their sign-in addresses don't appear, you must add those users to your directory. Your organization might have policies about adding users to the directory, so find out more first.
You have to add these users to the directory with new work or school accounts. If they have existing work or school accounts, they can use those instead. Their work won't be lost and stays with their current sign-in addresses. You must add them as new users, reassign access levels, and readd them to any projects. Users can migrate work that they want to keep, except for their work history. Learn how to manage organization users.
Alternate credentials won't work anymore for tools that run outside a web browser, like the Git command-line tool. You have to set up your credentials again for the organization that you connected.
You should restore the user, rather than create a new one. If you create a new user, even with the same email address, this user is not associated with the previous identity.