Skip to content

Commit 6b9138e

Browse files
committed
prerequisites
1 parent fde9843 commit 6b9138e

27 files changed

+96
-94
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
ms.topic: include
3+
---
4+
5+
**Permissions**: Be a member of the **Project Collection Valid Users** group. Users who are project members are automatically members of this group.
6+
7+
::: moniker range="azure-devops"
8+
> [!NOTE]
9+
> Users added to the **Project-scoped users** group can't access **Organization settings** other than the **Overview** section if the [**Limit user visibility and collaboration to specific projects** preview feature is enabled](../../user-guide/manage-organization-collection.md#project-scoped-user-group) for the organization.
10+
11+
::: moniker-end

docs/organizations/security/add-ad-aad-built-in-security-groups.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ The process for adding an Active Directory group to a built-in security group is
3838

3939
- **Organization connection:** Have your Azure DevOps organization [connected to Microsoft Entra ID](../accounts/connect-organization-to-azure-ad.md).
4040
- **Permissions:** Be a member of the **Project Collection Administrators** group in Azure DevOps.
41-
- **Access:** Ensure you have at least **Basic** access in Azure DevOps.
41+
- **Access:** Have at least **Basic** access in Azure DevOps.
4242

4343
::: moniker-end
4444

docs/organizations/security/add-manage-security-groups.md

+2-5
Original file line numberDiff line numberDiff line change
@@ -27,13 +27,10 @@ Azure DevOps is pre-configured with default security groups. You can add and man
2727
> [!NOTE]
2828
> This article applies to Azure DevOps Services only. For Azure DevOps Server, you can manage security groups using the [**TFSSecurity** command](/azure/devops/server/command-line/tfssecurity-cmd).
2929
30-
3130
## Prerequisites
3231

33-
- To add and manage security groups, you must be a member of the Project Collection Administrators security group.
34-
- You must have installed the Azure DevOps CLI extension as described in [Get started with Azure DevOps CLI](../../cli/index.md).
35-
- Sign into Azure DevOps using `az login`.
36-
- For the examples in this article, set the default organization as follows: `az devops configure --defaults organization=YourOrganizationURL`.
32+
- **Permissions**: Be a member of the **Project Collection Administrators** security group. For more information on tokens, see [Security namespace and permission reference](namespace-reference.md).
33+
- **Tools**: Install the Azure DevOps CLI extension as described in [Get started with Azure DevOps CLI](../../cli/index.md). Sign in to Azure DevOps using `az login`.
3734

3835
## Security group commands
3936

docs/organizations/security/add-remove-manage-user-group-security-group.md

+3-2
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,9 @@ Azure DevOps uses security groups for the following purposes:
4545

4646
## Prerequisites
4747

48-
* To manage permissions or groups at the project level, you must be a member of the **Project Administrators** Group. If you created the project, you're automatically added as a member of this group.
49-
* To manage permissions or groups at the collection or instance level, you must be a member of the **Project Collection Administrators** Group. If you created the organization or collection, you're automatically added as a member of this group.
48+
**Permissions**:
49+
* To manage permissions or groups at the project level, be a member of the **Project Administrators** security group. If you created the project, you're automatically added as a member of this group.
50+
* To manage permissions or groups at the collection or instance level, be a member of the **Project Collection Administrators** security group. If you created the organization or collection, you're automatically added as a member of this group.
5051

5152
::: moniker range="azure-devops"
5253
> [!NOTE]

docs/organizations/security/add-users-team-project.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ In this article, learn how to add users to a team or project. For organizations
3232

3333
[!INCLUDE [temp](../../includes/prerequisites-add-users-server.md)]
3434

35-
If you're new to Azure DevOps, familiarize yourself with the information in the following articles:
35+
**Recommended**: If you're new to Azure DevOps, familiarize yourself with the information in the following articles:
3636

3737
- [Get started with permissions, access levels, and security groups](about-permissions.md)
3838
- [About projects and scaling your organization](../projects/about-projects.md)

docs/organizations/security/change-access-levels.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,9 @@ For a simplified overview of the permissions that are assigned to the most commo
2727

2828
## Prerequisites
2929

30-
* You must be a member of the Administrators group. If you aren't a member, [get added now](/azure/devops/server/admin/add-administrator).
31-
* To manage access for a large group of users, create either a [Windows group, a group in Active Directory, or Azure DevOps security group](/azure/devops/server/admin/setup-ad-groups), and then add users to those groups.
32-
* Users must be [added to a project](add-users-team-project.md).
30+
- **Permissions**: Be a member of the [**Project Administrators** group](../organizations/security/change-project-level-permissions.md).
31+
* **Group membership**: To manage access for a large group of users, create either a [Windows group, a group in Active Directory, or Azure DevOps security group](/azure/devops/server/admin/setup-ad-groups), and then add users to those groups.
32+
* **Project access**: Ensure users are [added to the project](add-users-team-project.md).
3333

3434
## Open access levels
3535

docs/organizations/security/change-organization-collection-level-permissions.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -46,13 +46,13 @@ You might find the following articles helpful:
4646

4747
## Prerequisites
4848

49-
**Security groups:**
50-
- You must be a member of the **Project Collection Administrators** security group to manage permissions or groups at the organization or collection level. If you created the organization or collection, you're automatically a member of this group. To be added to this group, request permissions from a [member of the **Project Collection Administrators** group](look-up-project-collection-administrators.md).
51-
- Ensure security groups in Microsoft Entra ID or Active Directory are defined before adding them. For more information, see [Add Active Directory / Microsoft Entra users or groups to a built-in security group](add-ad-aad-built-in-security-groups.md).
49+
**Permissions:**
50+
- To manage permissions or groups at the organization or collection level, be a member of the [**Project Collection Administrators** security group](look-up-project-collection-administrators.md) . If you created the organization or collection, you're automatically a member of this group.
51+
- **Directory services**: Ensure security groups in Microsoft Entra ID or Active Directory are defined before adding them. For more information, see [Add Active Directory / Microsoft Entra users or groups to a built-in security group](add-ad-aad-built-in-security-groups.md).
5252

5353
::: moniker range="azure-devops"
5454
> [!NOTE]
55-
>- Users in the **Project-Scoped Users** group can't access most **Organization settings** pages, including **Permissions**. For more information, see [Manage your organization, limit user visibility for projects, and more](../../user-guide/manage-organization-collection.md#project-scoped-user-group).
55+
>- Users in the **Project-scoped Users** group can't access most organization settings, including permissions. For more information, see [Manage your organization, limit user visibility for projects, and more](../../user-guide/manage-organization-collection.md#project-scoped-user-group).
5656
>- Users with **Stakeholder** access can't access specific features even if they have permissions to those features. For more information, see [Stakeholder access quick reference](stakeholder-access.md).
5757

5858
::: moniker-end

docs/organizations/security/change-project-level-permissions.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -33,11 +33,11 @@ By default, members of the **Contributors** group are assigned the **Create tag
3333

3434
## Prerequisites
3535

36-
- To manage permissions or groups at the project level, you must be a member of the **Project Administrators** security group. If you created the project, you're automatically added as a member of this group. To get added to this group, you need to request permissions from a member of the **Project Administrators** group. See [Look up a project administrator](look-up-project-administrators.md).
37-
- To add security groups defined in Microsoft Entra ID or Active Directory, make sure the security groups are first defined. For more information, see [Add Active Directory / Microsoft Entra users or groups to a built-in security group](add-ad-aad-built-in-security-groups.md).
36+
- **Permissions**: To manage permissions or groups at the project level, be a member of the [**Project Administrators** security group](look-up-project-administrators.md). If you created the project, you're automatically added as a member of this group.
37+
- **Directory services**: To add security groups in Microsoft Entra ID or Active Directory, ensure the security groups are already defined. For more information, see [Add Active Directory / Microsoft Entra users or groups to a built-in security group](add-ad-aad-built-in-security-groups.md).
3838

3939
> [!NOTE]
40-
> Users granted **Stakeholder** access, can't access select features even if granted permissions to those features. For more information, see [Stakeholder access quick reference](stakeholder-access.md).
40+
> Users granted **Stakeholder** access can't access select features even if granted permissions to those features. For more information, see [Stakeholder access quick reference](stakeholder-access.md).
4141

4242
<a id="add-user-group"></a>
4343

docs/organizations/security/download-permissions-report-release.md

+1-5
Original file line numberDiff line numberDiff line change
@@ -14,17 +14,13 @@ ms.date: 07/07/2022
1414

1515
[!INCLUDE [version-eq-azure-devops](../../includes/version-eq-azure-devops.md)]
1616

17-
1817
To determine the effective permissions of users and groups for a release, you can download the permissions report. Requesting the report generates an email with a link to download the report. The report lists the effective permissions for the release you select, for each user and group specified at the time the report is generated. Inherited permissions come from a parent group that you can view from the web portal. The report is a json-formatted report that you can open using Power BI or other json reader.
1918

2019
You can also use the [Permissions Report REST API](/rest/api/azure/devops/permissionsreport/?view=azure-devops-rest-6.1&preserve-view=true) to download the report.
2120

2221
## Prerequisites
2322

24-
- To download the permissions report, you must be a member of the **Project Collection Administrators** group. The user interface button doesn't appear for users who aren't a member of this group.
25-
26-
To find a member of the **Project Collection Administrators** group, see [Look up a project collection administrator](look-up-project-collection-administrators.md).
27-
23+
**Permissions**: To download the permissions report, be a member of the [**Project Collection Administrators** group](look-up-project-collection-administrators.md). The user interface option isn't available for users who aren't a member of this group.
2824

2925
## Open the security dialog for the release
3026

docs/organizations/security/download-permissions-report.md

+1-2
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,7 @@ You can also use the [Permissions Report REST API](/rest/api/azure/devops/permis
2121

2222
## Prerequisites
2323

24-
- To download the permissions report, you must be a member of the Project Collection Administrators group. The user interface button won't appear for users who aren't a member of this group.
25-
24+
**Permissions**: To download the permissions report, be a member of the [**Project Collection Administrators** group](look-up-project-collection-administrators.md). The user interface option isn't available for users who aren't a member of this group.
2625

2726
## Open Project Settings>Repositories
2827

docs/organizations/security/export-users-audit-log.md

+2-4
Original file line numberDiff line numberDiff line change
@@ -26,17 +26,15 @@ You can get a list of users and groups that have access to your organization in
2626
You can get a list of users and groups that have access to your Azure DevOps Server instance by exporting the audit log. The audit log also indicates access levels.
2727
::: moniker-end
2828

29-
30-
3129
## Prerequisites
3230

3331
::: moniker range="azure-devops"
3432

35-
* You must be the **Organization owner** or a member of the **Project Collection Administrators** group. For more information, see [Change project collection-level permissions](change-organization-collection-level-permissions.md).
33+
**Permissions**: Be a member of the [**Project Collection Administrators** group](change-organization-collection-level-permissions.md). Organization owners are automatically members of this group.
3634
::: moniker-end
3735

3836
::: moniker range="< azure-devops"
39-
* You must be a member of the Administrators group. If you aren't a member, get added now. For more information, see [Add administrators](/azure/devops/server/admin/add-administrator).
37+
**Permissions**: Be a member of the [**Administrators** group](/azure/devops/server/admin/add-administrator).
4038
::: moniker-end
4139

4240
## Export a list of users

docs/organizations/security/get-started-stakeholder.md

+12-13
Original file line numberDiff line numberDiff line change
@@ -28,20 +28,19 @@ For more information, see the [Stakeholder access quick reference](stakeholder-a
2828

2929
## Prerequisites
3030

31-
**Private project:**
32-
33-
- You must have Stakeholder access and be a member of the Contributors or Project Administrators group. You can view boards, open and modify work items, and add child tasks to a checklist. You can't reorder or reparent a backlog item by using the drag-and-drop method. You can't update a field on a card.
34-
35-
**Public project:**
36-
37-
- You must have Stakeholder access and be a member of the Contributors or Project Administrators group to have full access to all Azure Boards features. For more information, see [Default permissions quick reference](../security/permissions-access.md).
31+
**Private project:**
32+
- **Access levels**: Have **Stakeholder** access.
33+
::: moniker range="azure-devops"
34+
To get access as a Stakeholder, ask your organization owner or Project Collection Administrator to add you to a project with Stakeholder access. For more information, see [Add organization users and manage access](../accounts/add-organization-users.md).
35+
::: moniker-end
36+
::: moniker range="< azure-devops"
37+
To get access as a Stakeholder, ask your server administrator to add you to a security group that has Stakeholder access. For more information, see [Change access levels](change-access-levels.md).
38+
::: moniker-end
39+
- **Permissions**: Be a member of the **Contributors** or **Project Administrators** group. You can view boards, open and modify work items, and add child tasks to a checklist. You can't reorder or reparent a backlog item by using the drag-and-drop method. You can't update a field on a card.
3840

39-
::: moniker range="azure-devops"
40-
To get access as a Stakeholder, ask your organization owner or Project Collection Administrator to add you to a project with Stakeholder access. For more information, see [Add organization users and manage access](../accounts/add-organization-users.md).
41-
::: moniker-end
42-
::: moniker range="< azure-devops"
43-
To get access as a Stakeholder, ask your server administrator to add you to a security group that has Stakeholder access. For more information, see [Change access levels](change-access-levels.md).
44-
::: moniker-end
41+
**Public project:**
42+
- **Access levels**: Have **Stakeholder** access.
43+
- **Permissions**: Be a member of the **Contributors** or **Project Administrators** group to have full access to all Azure Boards features. For more information, see [Default permissions quick reference](../security/permissions-access.md).
4544

4645
## Sign in to a project
4746

docs/organizations/security/look-up-organization-owner.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ To change the **Organization owner**, see [Change organization owner](../account
2121

2222
## Prerequisites
2323

24-
* To look up the owner or view organization settings, you must be a member of the **Project Collection Valid Users** group. Users added to a project are automatically included in this group.
24+
[!INCLUDE [prerequisites-project-collection-valid-users-group](../../includes/prerequisites-project-collection-valid-users-group.md)]
2525

2626
<a name="find-owner"></a>
2727

docs/organizations/security/look-up-project-administrators.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ To add users to the **Project Administrators** group or change a project-level p
2828

2929
## Prerequisites
3030

31-
You must be a member of the **Project Collection Valid Users** group to look up members of the **Project Administrators** group. Users added to a project are automatically added to this group.
31+
[!INCLUDE [prerequisites-project-collection-valid-users-group](../../includes/prerequisites-project-collection-valid-users-group.md)]
3232

3333
## Identify members of the Project Administrators group
3434

docs/organizations/security/look-up-project-collection-administrators.md

+1-6
Original file line numberDiff line numberDiff line change
@@ -40,13 +40,8 @@ For more information, see [Get started with permissions and security groups](abo
4040

4141
## Prerequisites
4242

43-
You must be a member of the **Project Collection Valid Users** group to look up members of the **Project Collection Administrators** group. Users added to a project are automatically added to this group.
44-
45-
::: moniker range="azure-devops"
46-
> [!NOTE]
47-
> Users added to the **Project-Scoped Users** group can't access **Organization settings** other than the **Overview** section if the [**Limit user visibility and collaboration to specific projects** preview feature is enabled](../../user-guide/manage-organization-collection.md#project-scoped-user-group) for the organization.
43+
[!INCLUDE [prerequisites-project-collection-valid-users-group](../../includes/prerequisites-project-collection-valid-users-group.md)]
4844

49-
::: moniker-end
5045

5146
## Show members of the Project Collection Administrators group
5247

docs/organizations/security/manage-tokens-namespaces.md

+6-6
Original file line numberDiff line numberDiff line change
@@ -29,12 +29,12 @@ Azure DevOps grants a number of permissions by default to members of default sec
2929
>
3030
## Prerequisites
3131

32-
- To manage tokens and namespaces, you must be a member of the Project Collection Administrators security group. For more information on tokens, see [Security namespace and permission reference](namespace-reference.md).
33-
- You must have installed the Azure DevOps CLI extension as described in [Get started with Azure DevOps CLI](../../cli/index.md).
34-
- Sign into Azure DevOps using `az login`.
35-
- For the examples in this article, set the default organization as follows:
36-
- For **Azure DevOps Services**: `az devops configure --defaults organization=YourOrganizationURL`.
37-
- For **Azure DevOps Server**: `az devops configure --defaults organization=https://ServerName/CollectionName`
32+
- **Permissions**: Be a member of the **Project Collection Administrators** security group. For more information on tokens, see [Security namespace and permission reference](namespace-reference.md).
33+
- **Tools**: Install the Azure DevOps CLI extension as described in [Get started with Azure DevOps CLI](../../cli/index.md).
34+
- Sign into Azure DevOps using `az login`.
35+
- For the examples in this article, set the default organization as follows:
36+
- **Azure DevOps Services**: `az devops configure --defaults organization=YourOrganizationURL`.
37+
- **Azure DevOps Server**: `az devops configure --defaults organization=https://ServerName/CollectionName`
3838

3939
## Security permission commands
4040

docs/organizations/security/permissions-lookup-guide.md

+7-7
Original file line numberDiff line numberDiff line change
@@ -26,20 +26,20 @@ Values in parenthesis indicate what level the permission is managed:
2626

2727
::: moniker range="azure-devops"
2828

29-
- **Object**: Permissions are managed at the object-level
30-
- **Project**: Permissions are managed at the project level
31-
- **Collection**: Permissions are managed at the organization level
29+
- **Object**: Permissions are managed at the object level.
30+
- **Project**: Permissions are managed at the project level.
31+
- **Collection**: Permissions are managed at the organization level.
3232
- **Role**: Permissions are managed through a security role.
3333
- **Team**: Permissions are managed via the team administrator role.
3434
::: moniker-end
3535

3636
::: moniker range="< azure-devops"
3737

38-
- **Object**: Permissions are managed at the object-level
39-
- **Project**: Permissions are managed at the project level
40-
- **Collection**: Permissions are managed at the account or project collection level
38+
- **Object**: Permissions are managed at the object level.
39+
- **Project**: Permissions are managed at the project level.
40+
- **Collection**: Permissions are managed at the account or project collection level.
4141
- **Role**: Permissions are managed through a security role.
42-
- **Server**: Permissions are managed at the instance level for a server
42+
- **Server**: Permissions are managed at the instance level for a server.
4343
- **Team**: Permissions are managed via the team administrator role.
4444
::: moniker-end
4545

Binary file not shown.

0 commit comments

Comments
 (0)