Events
17 Mar, 11 pm - 21 Mar, 11 pm
Join the meetup series to build scalable AI solutions based on real-world use cases with fellow developers and experts.
Register nowThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Azure DevOps Services
Learn how to turn on the Microsoft Entra tenant policy, which restricts users from creating an organization in Azure DevOps. This policy is turned off, by default.
Category | Requirements |
---|---|
Permissions | Azure DevOps Administrator in Microsoft Entra ID. To check your role, sign in to the Azure portal, and go to Microsoft Entra ID > Roles and administrators. If you're not an Azure DevOps administrator, you can't see the policies. Contact your administrator, if necessary. The Project Collection Administrator role isn't required. |
Sign in to your organization (https://dev.azure.com/{yourorganization}
).
Select Organization settings.
Select Microsoft Entra ID, and then switch the toggle to turn on the policy, restricting organization creation.
Warning
We recommend using groups with your tenant policy allowlist. If you use a named user, be aware that a reference to the named user's identity resides in the United States, Europe (EU), and Southeast Asia (Singapore).
When the policy is enabled, all users are restricted from creating new organizations. To grant exceptions, add users to an allowlist. Users on the allowlist can create new organizations but can't manage the policy.
Select Add Microsoft Entra user or group.
For more information, see Add organization users and manage access.
When administrators, who aren't on the allowlist, try to create an organization they get an error.
To customize this error message, do the following steps:
In the policy settings in Azure DevOps, select Edit display message.
Enter your customized message, and then select Save.
The error message is customized.
Note
Administrators, who aren't on the allowlist, can't connect their organization to the Microsoft Entra tenant where the policy is turned on.
Events
17 Mar, 11 pm - 21 Mar, 11 pm
Join the meetup series to build scalable AI solutions based on real-world use cases with fellow developers and experts.
Register nowTraining
Learning path
Configure and govern entitlement with Microsoft Entra ID SC-5008 - Training
Use Microsoft Entra to manage access by using entitlements, access reviews, privileged access tools, and monitor access events. (SC-5008)
Certification
Microsoft Certified: Identity and Access Administrator Associate - Certifications
Demonstrate the features of Microsoft Entra ID to modernize identity solutions, implement hybrid solutions, and implement identity governance.
Documentation
Get list of organizations connected to Microsoft Entra ID - Azure DevOps Services
Learn how to download a complete list of organizations backed by or connected to Microsoft Entra ID.
Access via Microsoft Entra FAQs
Learn the answers to frequently asked questions (FAQs), like how to understand Microsoft Entra groups, add users, connect to, disconnect from, or switch your directory.
Change the owner of an organization - Azure DevOps Services
Learn how to assign a different user as the owner for your organization and which permissions are required.