Skip to content

Commit 935ba11

Browse files
committed
build warning fixes
1 parent 6b9138e commit 935ba11

File tree

4 files changed

+5
-11
lines changed

4 files changed

+5
-11
lines changed

docs/includes/prerequisites-project-collection-valid-users-group.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@
22
ms.topic: include
33
---
44

5-
**Permissions**: Be a member of the **Project Collection Valid Users** group. Users who are project members are automatically members of this group.
5+
**Permissions**: Be a member of the **Project Collection Valid Users** group. Project members are automatically members of this group.
66

77
::: moniker range="azure-devops"
88
> [!NOTE]
9-
> Users added to the **Project-scoped users** group can't access **Organization settings** other than the **Overview** section if the [**Limit user visibility and collaboration to specific projects** preview feature is enabled](../../user-guide/manage-organization-collection.md#project-scoped-user-group) for the organization.
9+
> Users added to the **Project-scoped users** group can't access **Organization settings** other than the **Overview** section if the [**Limit user visibility and collaboration to specific projects** preview feature is enabled](../user-guide/manage-organization-collection.md#project-scoped-user-group) for the organization.
1010
1111
::: moniker-end

docs/organizations/security/change-access-levels.md

+1-7
Original file line numberDiff line numberDiff line change
@@ -27,26 +27,20 @@ For a simplified overview of the permissions that are assigned to the most commo
2727

2828
## Prerequisites
2929

30-
- **Permissions**: Be a member of the [**Project Administrators** group](../organizations/security/change-project-level-permissions.md).
30+
- **Permissions**: Be a member of the [**Project Administrators** group](change-project-level-permissions.md).
3131
* **Group membership**: To manage access for a large group of users, create either a [Windows group, a group in Active Directory, or Azure DevOps security group](/azure/devops/server/admin/setup-ad-groups), and then add users to those groups.
3232
* **Project access**: Ensure users are [added to the project](add-users-team-project.md).
3333

3434
## Open access levels
3535

3636
You can manage access levels for the collections defined on the application tier. The default access level affects all the projects in all the collections. When you add users or groups to teams, projects, or collections, they get the default access level. To give a different access level to a certain user or group, you need to add them to a non-default access level.
3737

38-
::: moniker range=">= azure-devops-2019"
39-
4038
- From the web portal home page for a project collection (for example, `http://MyServer:8080/tfs/DefaultCollection/`), open **Access levels**. If you're at a project level, choose the :::image type="icon" source="../../media/icons/project-icon.png" border="false"::: Azure DevOps logo and then choose **Access levels**.
4139

4240
![Screenshot of web portal, Open Access levels dialog.](media/change-access-levels/open-access-levels-2019.png)
4341

4442
If you don't see **Access levels**, you aren't an administrator and need to [get permission](/azure/devops/server/admin/add-administrator).
4543

46-
::: moniker-end
47-
48-
49-
5044
## Add a user or group to an access level
5145

5246
Changes you make to the access level settings take effect immediately.

docs/organizations/security/restrict-invitations.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ can add users who are already in the organization to their team |
3030
## Prerequisites
3131

3232
- **Permissions**: Be a member of the [**Project Collection Administrators** group](../security/look-up-project-collection-administrators.md). Organization owners are automatically members of this group.
33-
- **Access levels:** Be a member in the destination Microsoft Entra ID. For more information, see how to [convert a Microsoft Entra guest into a member](faq-azure-access.yml).
33+
- **Access levels:** Be a member in the destination Microsoft Entra ID. For more information, see [Convert a Microsoft Entra guest into a member](../accounts/faq-azure-access.yml).
3434

3535
## Turn off policy
3636

docs/organizations/security/view-permissions.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ For more information, see [Get started with permissions, access, and security gr
2727

2828
## Prerequisites
2929

30-
* **Project membership**: Be a member of a [project](../organizations/projects/create-project.md).
30+
* **Project membership**: Be a [member of a project](../organizations/projects/create-project.md).
3131
* **Permissions:** Be a member of the **Project Valid Users** group or **Project Collection Valid Users** group.
3232

3333
## View project-level permissions

0 commit comments

Comments
 (0)