Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Azure DevOps Services
Important
We recommend that you use Microsoft Entra ID authentication for new applications that integrate with Azure DevOps Services. It provides enhanced security, enterprise identity integration, and modern authentication capabilities.
This article explains the benefits of Microsoft Entra ID authentication and guides you through implementing it in your applications.
Overview
Microsoft Entra ID is Microsoft's cloud-based identity and access management platform that lets organizations:
- Manage user identities and control access to resources.
- Implement enterprise security policies like multifactor authentication and Microsoft Entra Conditional Access.
- Integrate with thousands of applications, including Azure DevOps Services.
- Provide single sign-on across Microsoft and non-Microsoft services.
Many Azure DevOps enterprise customers connect their Azure DevOps organization to Microsoft Entra ID to use these capabilities and enhanced security features.
Note
Microsoft Entra ID was previously known as Azure Active Directory (Azure AD). You might still see references in some Microsoft products and documentation.
Authentication options
The Microsoft Identity platform provides two primary authentication patterns for Azure DevOps access.
User delegation (OAuth)
Best for: Interactive applications that act for users
- Users sign in with their Microsoft Entra ID credentials.
- Applications receive delegated permissions to act as the signed-in user.
- Support for multifactor authentication and Microsoft Entra Conditional Access policies.
- Ideal for web applications, desktop apps, and user-facing tools.
Get started: Microsoft Entra ID OAuth implementation
Application identity (service principals and managed identities)
Best for: Background services and automation scenarios
- Applications authenticate by using their own identity (not user credentials).
- Suitable for continuous integration and continuous delivery (CI/CD) pipelines, background services, and automated tools.
- More secure for service-to-service communication.
- Support for service principals and Azure managed identities.
Get started: Service principals and managed identities
Benefits of Microsoft Entra ID authentication
Microsoft Entra ID authentication provides significant advantages over legacy Azure DevOps authentication methods.
Enhanced security
- Short-lived tokens (one-hour expiration) reduce risk from compromised credentials.
- Microsoft Entra Conditional Access policies protect against token theft and unauthorized access.
- Multifactor authentication supports other security layers.
- Advanced threat protection provides real-time risk assessment.
Enterprise integration
- Single sign-on across Microsoft and non-Microsoft applications
- Centralized identity management for users and applications
- Policy enforcement at the organizational level
- Audit and compliance capabilities for governance requirements
Developer experience
- Modern authentication libraries (Microsoft Authentication Library) with automatic token refresh
- Consistent identity platform across all Microsoft services
- Rich documentation and samples for quick implementation
- Active support and development with regular feature updates
Comparison with legacy methods
Feature | Microsoft Entra ID | Personal access tokens | Azure DevOps OAuth |
---|---|---|---|
Token lifespan | One hour (autorefresh) | Up to one year | Configurable |
Multifactor authentication | ✅ Native support | ❌ Not supported | ❌ Not supported |
Conditional access | ✅ Full support | ❌ Not supported | ❌ Not supported |
Enterprise policies | ✅ Enforced | ⚠️ Limited | ⚠️ Limited |
Audit logging | ✅ Comprehensive | ⚠️ Basic | ⚠️ Basic |
Future investment | ✅ Active development | ⚠️ Maintenance mode | ❌ Deprecated |
Important
Token compatibility: Microsoft Entra ID tokens and Azure DevOps tokens aren't interchangeable. Applications that migrate from Azure DevOps OAuth to Microsoft Entra ID OAuth require user reauthorization.
Migration from legacy authentication
Organizations increasingly adopt security policies that restrict personal access token (PAT) creation because of security risks. Microsoft Entra ID authentication provides secure alternatives for common PAT scenarios.
PAT scenario | Microsoft Entra alternative |
---|---|
Authenticate with Git Credential Manager (GCM) | GCM defaults to authenticating with PATs. Set the default credential type to oauth . Learn more on the Git Credential Manager (GCM) page. |
Authenticate in a build or release pipeline | Use a service connection with Workload Identity Federation. |
Ad hoc requests to Azure DevOps REST APIs | Issue a one-off Microsoft Entra token by using the Azure CLI. |
Tip
Do you have an Azure DevOps PAT scenario with no clear Microsoft Entra token alternative? Share your scenario in the Developer Community.