Restricting PAT Creation in Azure DevOps Is Now in Preview
Table of Contents
- What's New
- Managing Exceptions
- Supporting Packaging Scenarios
- Final Thoughts
What's New
- The Restrict personal access token creation policy in Azure DevOps is now in preview.
- Default behavior: Enabled for new organizations, off for existing ones until manually enabled.
- Existing PATs will continue to function until they expire.
- Combine with "Set maximum lifespan for new PATs" setting for additional control.
- Manage the policy and sub-policies in Organization settings.
Managing Exceptions
- Exceptions can be made by adding specific Microsoft Entra users or groups to an allowlist.
- Use IAM platforms like Microsoft Entra ID Identity Governance to manage access requests and reviews.
Supporting Packaging Scenarios
- Limit token creation to packaging scopes for users not on the allowlist.
Final Thoughts
- The policy is a significant step in reducing PAT usage and enhancing security practices.
- Feedback on how this policy has impacted PAT usage is welcome.