-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
support authenticating with a service principal in Linux #14154
base: main
Are you sure you want to change the base?
Conversation
@microsoft-github-policy-service agree |
@afeld : Thanks for your contribution! The author(s) have been notified to review your proposed change. |
|
||
### Authorization | ||
|
||
The token or service principal must have the **Agent Pools (read, manage)** scope at the Organization level of `AZP_URL`. If using a PAT, the token must be created by a user who has permission to [configure agents](pools-queues.md#create-agent-pools). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not 100% confident I got this part right, as my access in our Azure DevOps Organization is somewhat limited.
@steved0x Important: When the changes are ready for publication, adding a #label:"aq-pr-triaged" |
It appears issues got turned off in this repository, but I had described the background in #13864: I was trying to set up a Pipeline agent in a Docker container on Linux using a service principal, and it wasn't clear how to authenticate.
This pull request updates the instructions and code for Linux to support authentication with a service principal, which I was able to do locally. I don't know Powershell so I didn't touch that part of the page, but it should be possible there too.
Thanks!