Partager via


Security glossary

TFS 2018

This article provides definitions for select terms used to manage authentication and permissions for Azure DevOps.

Access control entries (ACE)

An access control entry is an entry in an access control list (ACL) that grants or denies a user or group access to an Azure DevOps resource. For a list of namespaces, ACEs, and management tools, see Security namespace and permission reference.

Access control list (ACL)

An access-control list is a list of permissions attached to an Azure DevOps object. An ACL specifies which users or system processes can view, create, modify, delete, or otherwise manage objects. For a list of namespaces, ACLs, and management tools, see Security namespace and permission reference.

Access level

Access levels correspond to a licensing level to provide access to certain features. Access to these features is restricted to members with that access level. For more information, see About access levels.

Authentication

Authentication verifies a user's identify based on the credentials provided when they sign into an organization in Azure DevOps. These services/servers typically integrate with and rely upon the security features provided by services such as Active Directory or Microsoft Entra ID. For more information, see About security, authentication, and authorization.

Authorization

Authorization is the operations that are performed to verify that the identity that's attempting to connect to a service or server instance has the necessary permissions to access a service, feature, function, object, or method. For more information, see About security, authentication, and authorization.

Basic member

A user account that has been granted membership to an organization in Azure DevOps instance with Basic access. For more information, see About access levels.

Collections

A collection is a container for a number of projects in Azure DevOps. A default collection is created when you sign up with Azure DevOps Services or install Team Foundation Server. Within Azure DevOps Services, a collection corresponds to an organization. For on-premises TFS deployments, you can add and manage collections to specify the logical and physical resources available to the projects within the collection.

Learn more: About projects and scaling your organization, Manage organizations or Manage project collections in Team Foundation Server.

Conditional access

Conditional access provides support for securing Azure DevOps resources backed by a Microsoft Entra tenant. For example, you can enable multi-factor authentication to help protect against the risk of compromised credentials. For more information, see Manage conditional access to Azure DevOps.

Inheritance

Permissions that aren't directly allowed or denied for a user, may be inherited. For more information, see Get started with permissions, access, and security groups.

Microsoft Authentication Library

The Microsoft Authentication Library (MSAL) enables application developers to acquire tokens from the Microsoft identity platform to authenticate users and access secured web APIs. It can be used to provide secure access to Microsoft Graph, other Microsoft APIs, third-party web APIs, or your own web API. MSAL supports many different application architectures and platforms including .NET, JavaScript, Java, Python, Android, and iOS. For more information, see the Overview of Microsoft Authentication Library.

Namespace

Each family of Azure DevOps resources (work items, Git repositories, etc.) is secured using a different namespace. Each security namespace contains zero or more ACLs. Each ACL contains a token, an inherit flag and a set of zero or more ACEs. Each ACE contains an identity descriptor, an allowed permissions bitmask and a denied permissions bitmask.

For a list of Azure DevOps namespaces, see Security namespace and permission reference.

OAuth

OAuth 2.0 is an industry-standard protocol for authorization. OAuth 2.0 is supported for Azure DevOps Services to authenticate REST APIs. For more information, see Authorize access to REST APIs with OAuth 2.0.

Personal Access Token (PAT)

Personal access tokens (PATs) are alternate passwords that you can use to authenticate into Azure DevOps. To learn how to create and revoke PATs, see Authenticate access with personal access tokens.

Permission

The assignment made to a user or group to use a feature or function. Permissions are assigned to default security groups. For more information, see Get started with permissions, access, and security groups.

Permission state

The state assigned to a feature or function to a user's or group's permission. Users have permission to access a feature if their permission is set to Allow, Inherited Allow, or System Allow. They don't have permission when the state is set to Deny, Inherited deny, System deny, or Not set. For more information, see Get started with permissions, access, and security groups.

Role-based permissions

A security model that limits actions based on membership within a role and permissions assigned to that role. For more information, see About permissions, access, and security groups, Role-based permissions.

Security group

A method by which you can organize users and other domain objects to simplify administration of permissions and access. Azure DevOps supports many default security groups and the ability to create custom groups. For more information, see Get started with permissions, access, and security groups.

Service account

An account used to monitor or manage select services, such as build or test services.

Service principal

A service principal is the local representation, or application instance, of a global application object in a single tenant or directory. When an application is given permission to access resources in a tenant (upon registration or consent), a service principal object is created. For more information, see Application and service principal objects in Microsoft Entra ID and service principal and managed identity support in Azure DevOps.

Secure Sockets Layer (SSL)

SSL is a protocol used to strengthen the security of cloud-hosted and on-premises applications by configuring it to use Hypertext Transfer Protocol Secure (HTTPS) with Secure Sockets Layer (SSL).

SSL is always used to protect Azure DevOps data. For more information, see Data Protection Overview.

For on-premises deployments, SSL is optional. For more information, see Setting up HTTPS with Secure Sockets Layer (SSL).

Stakeholder

A user account that has been granted membership to an organization in an Azure DevOps instance with Stakeholder access. With Stakeholder access, you can add and modify work items, check project status, manage pipelines, and view and manage dashboards. For more information, see Get started as a Stakeholder.

Team group

A security group that is defined when a team is created and automatically populated with members as they're added to the team.

Token

Tokens are arbitrary strings representing resources in Azure DevOps. Token format differs per resource type, however hierarchy and separator characters are common between all tokens. For details, see REST API Security.

Each family of Azure DevOps resources (work items, Git repositories, and so on) is secured using a different namespace. Each security namespace contains zero or more ACLs. Each ACL contains a token, an inherit flag and a set of zero or more ACEs. Each ACE contains an identity descriptor, an allowed permissions bitmask and a denied permissions bitmask.

For Azure DevOps Services, you can manage tokens and namespaces using the az devops security permission commands. For details, see Manage tokens and namespaces.

For Azure DevOps Server, see Use TFSSecurity to manage groups and permissions for Azure DevOps.

Valid users

Valid users are users that Azure DevOps recognizes as being able to connect to the account or a project. When you add accounts of users directly to a built-in group or through a Windows, Active Directory, or Microsoft Entra group, they're automatically added to one of the valid user groups. For more information, see Get started with permissions, access, and security groups.