Edit

Share via


Change application connection & security policies for your organization

Important

Azure DevOps doesn't support Alternate Credentials authentication. If you're still using Alternate Credentials, we strongly encourage you to switch to a more secure authentication method.

This article shows how to manage your organization's security policies that determine how users and applications can access services and resources in your organization. You can access most of these policies in Organization settings.

Prerequisites

Category Requirements
Permissions

Manage a policy

To update application connection, security, or user policies for your organization, follow these steps:

  1. Sign in to your organization at https://dev.azure.com/{Your_Organization}.

  2. Select gear icon Organization settings.

    Screenshot of Organization settings button, preview page.

  3. Select Policies, then toggle the desired policy on or off.

    Screenshot of policies list and their on and off toggles.

Restrict authentication methods

To allow seamless access to your organization without repeatedly prompting for user credentials, applications can use authentication methods, like OAuth, SSH, and personal access token (PATs). By default, all existing organizations allow access for all authentication methods.

You can limit access to these authentication methods by disabling the following application connection policies:

When you deny access to an authentication method, no application can access your organization through that method. Any application that previously had access encounter authentication errors and lose access.

Conditional Access policy support on Azure DevOps

Conditional Access (CA) in Azure DevOps is enforced through Microsoft Entra ID and supports both interactive (web) and non-interactive (client credential) flows, validating policies like MFA, IP restrictions, and device compliance during sign-in and periodically via token checks.

Policies by Level

Policy Org-level Tenant-level
Third-party application access via OAuth
SSH authentication
Log audit events
Restrict personal access token creation
Allow public projects
Additional protections when using public package registries
Enable IP Conditional Access policy validation on non-interactive flows
External guest access
Allow team and project administrators to invite new users
Request access allows users to request access to the organization with a provided internal URL
Allow Microsoft to collect feedback from users
Restrict organization creation
Restrict global personal access token creation
Restrict full-scoped personal access token creation
Enforce maximum personal access token lifespan