Skip to content

Commit d0efbc9

Browse files
committed
.
1 parent 62c1fc5 commit d0efbc9

File tree

5 files changed

+108
-51
lines changed

5 files changed

+108
-51
lines changed

Diff for: docs/organizations/security/about-permissions.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,7 @@ When it comes to managing permissions in Azure DevOps, there are two key groups
4343
- They can perform all operations for the entire collection.
4444
- Their responsibilities include managing settings, policies, and processes for the organization.
4545
- Additionally, they can create and manage all projects and extensions within the organization.
46+
4647
**Project Administrators:**
4748
- Project Administrators operate at the project level.
4849
- They manage security groups and permissions primarily from the web portal’s Project settings.
@@ -87,7 +88,6 @@ Permissions follow a hierarchy, allowing inheritance from a parent or by overrid
8788

8889
For example, let’s break down the permission inheritance and specificity rules and remember, explicit permissions always take precedence over inherited ones:
8990

90-
**Inheritance:**
9191
- When a user’s permissions are set at a higher-level node (area-1), those permissions get inherited by all subnodes (area-1/sub-area-1) unless explicitly overridden.
9292
- If a permission is **not** explicitly allowed or denied for a subnode, it inherits the permission from its parent.
9393
- However, if a permission is explicitly set for a subnode (area-1/sub-area-1), the parent’s permission is **not** inherited, regardless of whether it's allowed or denied.
@@ -249,7 +249,7 @@ no members of the group are able to access the project, collection, or deploymen
249249

250250
::: moniker range="azure-devops"
251251

252-
### Project-scoped Users group
252+
### Project-scoped users group
253253

254254
By default, users added to an organization can view all organization and project information and settings. These settings include the list of users, the list of projects, billing details, usage data, and more, which you can access through **Organization settings**.
255255

Diff for: docs/organizations/security/about-security-identity.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ Throughout these docs, users can refer to all identities that have been added to
132132

133133
::: moniker-end
134134

135-
The most effective means for managing accounts is by [adding them to security groups](about-permissions.md#security-groups-membership).
135+
The most effective means for managing accounts is by [adding them to security groups](about-permissions.md#security-groups-and-membership).
136136

137137
> [!NOTE]
138138
> The organization owner and members of the Project Collection Administrators group are granted full access to most all features and functions.

Diff for: docs/organizations/security/includes/hidden-security-groups.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -9,20 +9,20 @@ ms.date: 10/20/2023
99
::: moniker range="azure-devops"
1010

1111
> [!NOTE]
12-
> Security groups belong to the organization level, even if they only access a specific project. Some groups may be hidden in the web portal depending on user permissions. You can find all group names in an organization with the **azure devops** CLI tool or our REST APIs. For more information, see [Add and manage security groups](../add-manage-security-groups.md).
12+
> Security groups belong to the organization level, even if they only access a specific project. Some groups might be hidden in the web portal depending on user permissions. You can find all group names in an organization with the **azure devops** CLI tool or our REST APIs. For more information, see [Add and manage security groups](../add-manage-security-groups.md).
1313
1414
::: moniker-end
1515

1616
::: moniker range=">= azure-devops-2020 < azure-devops"
1717

1818
> [!NOTE]
19-
> Security groups belong to the collection level, even if they only access a specific project. Some groups may be hidden in the web portal depending on user permissions. You can find all group names in an organization with the **azure devops** CLI tool or our REST APIs. For more information, see [Add and manage security groups](../add-manage-security-groups.md).
19+
> Security groups belong to the collection level, even if they only access a specific project. Some groups might be hidden in the web portal depending on user permissions. You can find all group names in an organization with the **azure devops** CLI tool or our REST APIs. For more information, see [Add and manage security groups](../add-manage-security-groups.md).
2020
2121
::: moniker-end
2222

2323
::: moniker range="< azure-devops-2020"
2424

2525
> [!NOTE]
26-
> Security groups belong to the collection level, even if they only access a specific project. Some groups may be hidden in the web portal depending on user permissions. However, you can discover the names of all groups in an organization using the REST APIs. For more information, see [Add and manage security groups](/rest/api/azure/devops/security/?view=azure-devops-rest-6.0&preserve-view=true).
26+
> Security groups belong to the collection level, even if they only access a specific project. Some groups might be hidden in the web portal depending on user permissions. However, you can discover the names of all groups in an organization using the REST APIs. For more information, see [Add and manage security groups](/rest/api/azure/devops/security/?view=azure-devops-rest-6.0&preserve-view=true).
2727
2828
::: moniker-end

0 commit comments

Comments
 (0)