diff --git a/docs/organizations/security/namespace-reference.md b/docs/organizations/security/namespace-reference.md index 3b5a5e34fc0..4d85246a670 100644 --- a/docs/organizations/security/namespace-reference.md +++ b/docs/organizations/security/namespace-reference.md @@ -8,7 +8,7 @@ ms.topic: reference ms.author: chcomley author: chcomley monikerRange: '<= azure-devops' -ms.date: 11/18/2024 +ms.date: 06/23/2025 --- # Security namespace and permission reference for Azure DevOps @@ -92,9 +92,9 @@ The following table describes the namespaces that manage object-level permission [Manages Analytics views permissions at the project-level and object-level](permissions.md#analytics-views-object-level) to read, edit, delete, and generate reports. You can manage these permissions for each [analytics view from the user interface](../../report/powerbi/analytics-security.md).
**Token format for project level permissions**: `$/Shared/PROJECT_ID` - **Example**: `$/Shared/xxxxxxxx-a1de-4bc8-b751-188eea17c3ba` + **Example**: `$/Shared/00001111-aaaa-2222-bbbb-3333cccc4444`
- **ID:** `d34d3680-dfe5-4cc6-a949-7d9c68f73cba` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -126,9 +126,9 @@ The following table describes the namespaces that manage object-level permission **Token format for project-level build permissions**: `PROJECT_ID` If you need to update permissions for a particular build definition ID, for example, 12, security token for that build definition looks like the following example: **Token format for project-level, specific build permissions**: `PROJECT_ID/12` - **Example**: `xxxxxxxx-a1de-4bc8-b751-188eea17c3ba/12` + **Example**: `00001111-aaaa-2222-bbbb-3333cccc4444/12`
- **ID:** `33344d9c-fc72-4d6f-aba5-fa317101a7e9` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -150,7 +150,7 @@ The following table describes the namespaces that manage object-level permission [Manages area path object-level permissions](permissions.md#area-path-object-level) to create, edit, and delete child nodes and set permissions to view or edit work items in a node. For more information, see [Set permissions and access for work tracking, Create child nodes, modify work items under an area path](set-permissions-access-work-tracking.md#set-permissions-area-path). **Token format example:** `POST https://dev.azure.com/{organization}/_apis/securitynamespaces/{namespaceId}/permissions?api-version=6.0 { "token": "vstfs:///Classification/Node/{area_node_id}", "permissions": { "allow": 1, "deny": 0 } }`
- **ID:** `83e28ad4-2d72-4ceb-97b0-c7726d5502c3` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -169,7 +169,13 @@ The following table describes the namespaces that manage object-level permission :::column span="2"::: [Manages dashboard object-level permissions](permissions.md#dashboards-object-level) to edit and delete dashboards and manage permissions for a project dashboard. You can manage these permissions through the [dashboards user interface](../../report/dashboards/dashboard-permissions.md#set-permissions-for-a-project-dashboard).
- **ID:** `8adf73b7-389a-4276-b638-fe1653f7efc7` + **Token format for Team Dashboard permissions**: `$/PROJECT_ID/Team_ID/Dashboard_ID` + **Example**: `$/66667777-aaaa-8888-bbbb-9999cccc0000/00001111-aaaa-2222-bbbb-3333cccc4444/55556666-ffff-7777-aaaa-8888bbbb9999` +

+ **Token format for Project Dashboard permissions**: `$/PROJECT_ID/00001111-aaaa-2222-bbbb-3333cccc4444/Dashboard_ID` + **Example**: `$/66667777-aaaa-8888-bbbb-9999cccc0000/00001111-aaaa-2222-bbbb-3333cccc4444/55556666-ffff-7777-aaaa-8888bbbb9999` +

+ **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -201,13 +207,14 @@ The following table describes the namespaces that manage object-level permission The `Administer` permission was divided into several more granular permissions [in 2017](/previous-versions/azure/devops/2017/jan-25-team-services#repo-admin-permission-changes), and shouldn't be used.
**Token format for project-level permissions**: `repoV2/PROJECT_ID` +
You need to append `RepositoryID` to update repository-level permissions.
**Token format for repository-specific permissions**: `repoV2/PROJECT_ID/REPO_ID`
**Token format for branch-level permissions** is described in [Git repo tokens for the security service](https://devblogs.microsoft.com/devops/git-repo-tokens-for-the-security-service/).

- **ID:** `2e9eb7ed-3c0a-47d4-87c1-0ffdd275fd87` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -237,7 +244,7 @@ The following table describes the namespaces that manage object-level permission To update permissions for `ProjectIteration1\TeamIteration1\TeamIteration1ChildIteration1`, the security token looks like the following example: `vstfs:///Classification/Node/ProjectIteration1_Identifier:vstfs:///Classification/Node/TeamIteration1_Identifier:vstfs:///Classification/Node/TeamIteration1ChildIteration1_Identifier`
- **ID:** `bf7bfa03-b2b7-47db-8113-fa2e002cc5b1` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -261,7 +268,7 @@ The following table describes the namespaces that manage object-level permission
**Token Format**: `PROJECT_ID/PARENT_TASK_ID/METATASK_ID`

- **ID:** `f6a4de49-dbe2-4704-86dc-f8ec1a294436` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -278,7 +285,11 @@ The following table describes the namespaces that manage object-level permission :::column span="2"::: [Manages permissions for Delivery Plans](permissions.md) to view, edit, delete, and manage delivery plans. You can manage these permissions through the [web portal for each plan](set-permissions-access-work-tracking.md).
- **ID:** `bed337f8-e5f3-4fb9-80da-81e17d06e7a8` + **Token Format**: `Plan/PROJECT_ID/DeliveryPlan_ID` +

+ **Example**: `Plan/00001111-aaaa-2222-bbbb-3333cccc4444/55556666-ffff-7777-aaaa-8888bbbb9999` +
+ **ID:** `11112222-bbbb-3333-cccc-4444dddd5555` :::column-end::: :::row-end::: --- @@ -306,16 +317,16 @@ The following table describes the namespaces that manage object-level permission [Manages release definition permissions at the project and object-level](permissions.md#release-management).
**Token format for project-level permissions**: `PROJECT_ID` - **Example**: `xxxxxxxx-a1de-4bc8-b751-188eea17c3ba` + **Example**: `00001111-aaaa-2222-bbbb-3333cccc4444` If you need to update permissions for a particular release definition ID, for example, 12, security token for that release definition looks as follows:
**Token format for specific release definition permissions**: `PROJECT_ID/12` - **Example**: `xxxxxxxx-a1de-4bc8-b751-188eea17c3ba/12` + **Example**: `00001111-aaaa-2222-bbbb-3333cccc4444/12` If the release definition ID lives in a folder, then the security tokens look as follows: **Token format**: `PROJECT_ID/{folderName}/12` For stages, tokens look like: `PROJECT_ID/{folderName}/{DefinitionId}/Environment/{EnvironmentId}`.
- **ID:** `c788c23e-1b46-4162-8f5e-d7585343b5de` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -335,7 +346,7 @@ The following table describes the namespaces that manage object-level permission [Manages permissions for work item queries and query folders](permissions.md#query). To manage these permissions through the web portal, see [Set permissions on queries or query folders](set-permissions-access-work-tracking.md#work-item-queries). **Token format example:** `POST https://dev.azure.com/{organization}/_apis/securitynamespaces/{namespaceId}/permissions?api-version=6.0 { "token": "/{project_id}/{shared_queries_id}", "permissions": { "allow": 1, "deny": 0 } }`.
- **ID:** `71356614-aad7-4757-8f2c-0fb3bff6f680` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -398,11 +409,11 @@ The following table describes the namespaces that manage project-level permissio Assume you have a project named `Test Project 1`. You can get the project ID for this project by using the [`az devops project show` command](../projects/create-project.md). `az devops project show --project "Test Project 1"` - The command returns a project-id, for example, `xxxxxxxx-a1de-4bc8-b751-188eea17c3ba`. + The command returns a project-id, for example, `00001111-aaaa-2222-bbbb-3333cccc4444`. Therefore, the token to secure project-related permissions for `Test Project 1` is: - `'$PROJECT:vstfs:///Classification/TeamProject/xxxxxxxx-a1de-4bc8-b751-188eea17c3ba'` + `'$PROJECT:vstfs:///Classification/TeamProject/00001111-aaaa-2222-bbbb-3333cccc4444'`
- **ID:** `52d39943-cb85-4d7f-8fa8-c6baac873819` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -420,9 +431,9 @@ The following table describes the namespaces that manage project-level permissio Manages permissions to create, delete, enumerate, and use work item tags. You can manage the **Create tag definition** permission through the [permissions administrative interface](change-project-level-permissions.md).
**Token format for project-level permissions**: `/PROJECT_ID` - **Example**: `/xxxxxxxx-a1de-4bc8-b751-188eea17c3ba` + **Example**: `/00001111-aaaa-2222-bbbb-3333cccc4444`
- **ID:** `bb50f182-8e5e-40b8-bc21-e8752a1e7ae2` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -448,7 +459,7 @@ The following table describes the namespaces that manage project-level permissio :::column span="2"::: Manages permissions for a [Team Foundation Version Control (TFVC) repository](permissions.md#tfvc). There's only one TFVC repository for a project. You can manage these permissions through the [repositories administrative interface](../../repos/tfvc/set-tfvc-repository-permissions.md).
- **ID:** `a39371cf-0841-4c16-bbd3-276e341bc052` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -499,7 +510,7 @@ The following table describes the namespaces that manage organization-level perm
**Token format**: `/AllPermissions`
- **ID:** `a6cc6381-a1ca-4b36-b3c1-4e65211e82b6` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -518,7 +529,7 @@ The following table describes the namespaces that manage organization-level perm :::column span="2"::: [Manages access to view, manage, use, or administer permissions for build resources](permissions.md#collection-level).
- **ID:** `302acaca-b667-436d-a946-87133492041c` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -541,7 +552,7 @@ The following table describes the namespaces that manage organization-level perm :::column span="2"::: [Manages permissions at the organization or collection-level](permissions.md#collection-level).
- **ID:** `3e65f728-f8bc-4ecd-8764-7e378b19bfa7` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -560,7 +571,7 @@ The following table describes the namespaces that manage organization-level perm :::column span="2"::: [Manages permissions to create, delete, and administer processes](permissions.md#administer-process-permissions).
- **ID:** `2dab47f9-bd70-49ed-9bd5-8eb051e59c02` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -581,7 +592,7 @@ The following table describes the namespaces that manage organization-level perm **Root token format**: `/` **Token format for a specific workspace**: `/{workspace_name};{owner_id}`
- **ID:** `93bafc04-9075-403a-9367-b7164eac6b5c` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -602,7 +613,7 @@ The following table describes the namespaces that manage organization-level perm > The `AdminConfiguration` permission grants users the ability to edit server-level permissions for users and groups. > The `AdminConnections` permission grants users the ability to read the contents of a file or folder of an on-premises, server-level repository. ::: moniker-end - **ID:** `66312704-deb5-43f9-b51c-ab4ff5e351c3` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -638,7 +649,7 @@ The following table describes those security namespaces and permissions defined :::column span="2"::: Manages permissions set at the server-level to create and delete project collections.
- **ID:** `52d39943-cb85-4d7f-8fa8-c6baac873819` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -655,7 +666,7 @@ The following table describes those security namespaces and permissions defined :::column span="2"::: Manages permissions set at the server-level. Includes permissions to edit instance-level information, make requests on behalf of others, and trigger events.
- **ID:** `1f4179b3-6bac-4d01-b421-71ea09171400` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -669,7 +680,7 @@ The following table describes those security namespaces and permissions defined :::column span="2"::: Grants permission to process or change settings for the data warehouse or SQL Server Analysis cube by using the [Warehouse Control Web Service](/previous-versions/azure/devops/report/admin/manage-reports-data-warehouse-cube).
- **ID:** `b8fbab8b-69c8-4cd9-98b5-873656788efb` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -711,7 +722,7 @@ The following table describes the security namespaces and permissions used to ma - **Administrator** role (all permissions) to members of the Build Administrators, Project Administrators, and Release Administrators groups. - **User** role (`View`, `Use`, and `Create` permissions) to all members of the Contributor group - **Creator** role (`View`, `Use`, and `Create` permissions) to all members of the Contributor group

- **ID:** `101eae8c-1709-47f9-b228-0e476c35b3ba` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -733,7 +744,7 @@ The following table describes the security namespaces and permissions used to ma - **Creator** role (`View`, `Use`, and `Create` permissions) to all members of the Contributor group - **Creator** role (`View`, `Use`, and `Create` permissions) to all members of the Project Administrators group - **Administrator** role (all permissions) to the user who created a specific Environment.

- **ID:** `83d4c2e6-e57d-4d6e-892b-b87222b7ad20` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -749,7 +760,7 @@ The following table describes the security namespaces and permissions used to ma :::column span="2"::: The **Manager** role is the only role used to manage the security of Marketplace extensions. Members of the Manager role can install extensions and respond to requests for extensions to be installed. The other permissions are assigned automatically to members of default security groups and service principals. To add users to the Manager role, see [Manage extension permissions](../../marketplace/grant-permissions.md).
- **ID:** `5d6d7b80-3c63-4ab0-b699-b6a5910f8029` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -772,7 +783,7 @@ The following table describes the security namespaces and permissions used to ma - **Creator** role (`View`, `Use`, `Create`, and `Owner` permissions) to the member who created the library item - **Administrator** role (all permissions) to members of the Build Administrators, Project Administrators, and Release Administrators groups. For more information, see [Library asset security roles](../../pipelines/library/index.md).

- **ID:** `b7e84409-6553-448a-bbb2-af228e07cbeb` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -793,7 +804,7 @@ The following table describes the security namespaces and permissions used to ma - **Creator** role (`View`, `Use`, and `Create` permissions) to members of the Endpoint Creators service security group. - **Administrator** role (all permissions) to members of the Endpoint Administrators service security group. Roles are assigned through [Service connection security roles](about-security-roles.md#service-endpoint-roles).

- **ID:** `49b48001-ca20-4adc-8111-5b60c903a50c` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -829,7 +840,7 @@ The following table describes the security namespaces and permissions that aren' :::column span="2"::: Manages permissions to read or modify the organization account owner. These permissions are assigned to the organization owner and members of the Project Collection Administrator group.
- **ID:** `11238e09-49f2-40c7-94d0-8f0307204ce4` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -849,9 +860,9 @@ The following table describes the security namespaces and permissions that aren' Manages permissions to read, administer permissions, and execute queries against the Analytics service.
**Token format for project-level permissions**: `$/PROJECT_ID` - **Example**: `$/xxxxxxxx-a1de-4bc8-b751-188eea17c3ba` + **Example**: `$/00001111-aaaa-2222-bbbb-3333cccc4444`
- **ID:** `58450c49-b02d-465a-ab12-59ae512d6531` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -869,7 +880,7 @@ The following table describes the security namespaces and permissions that aren' :::column span="2"::: Sets permissions to read, delete, create, and manage the security of the data store. These permissions are assigned to several Azure DevOps service principals.
- **ID:** `19F9F97D-7CB7-45F7-8160-DD308A6BD48E` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -888,7 +899,7 @@ The following table describes the security namespaces and permissions that aren' :::column span="2"::: Manages permissions and access to boards.
- **ID:** `251e12d9-bea3-43a8-bfdb-901b98c0125e` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -904,7 +915,7 @@ The following table describes the security namespaces and permissions that aren' :::column span="2"::: Manages read/write permissions of external integrations with Azure Boards.
- **ID:** `5ab15bc8-4ea1-d0f3-8344-cab8fe976877` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -931,7 +942,7 @@ The following table describes the security namespaces and permissions that aren' :::column span="2"::: Manages permissions for chat services integrated with Azure DevOps, such as Slack and Microsoft Teams. For more information, see [Azure Boards with Slack](../../boards/integrations/boards-slack.md), [Azure Boards with Microsoft Teams](../../boards/integrations/boards-teams.md), [Azure Pipelines with Slack](../../pipelines/integrations/slack.md), [Azure Pipelines with Microsoft Teams](../../pipelines/integrations/microsoft-teams.md), [Azure Repos with Slack](../../repos/integrations/repos-slack.md), and [Azure Repos with Microsoft Teams](../../repos/integrations/repos-teams.md).
- **ID:** `bc295513-b1a2-4663-8d1a-7017fd760d18` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -950,7 +961,7 @@ The following table describes the security namespaces and permissions that aren' :::column span="2"::: Manages permissions to view, manage, moderate, and contribute to [code review discussions setup for Azure Pipelines](../../pipelines/process/environments-kubernetes.md#set-up-review-app).
- **ID:** `0d140cae-8ac1-4f48-b6d1-c93ce0301a12` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -966,7 +977,7 @@ The following table describes the security namespaces and permissions that aren' :::column span="2"::: Grants read and write access for notification handler.
- **ID:** `7cd317f2-adc6-4b6c-8d99-6074faeaf173` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -981,7 +992,7 @@ The following table describes the security namespaces and permissions that aren' :::column span="2"::: Grants read and write access for notification subscribers.
- **ID:** `2bf24a2b-70ba-43d3-ad97-3d9e1f75622f` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -998,7 +1009,7 @@ The following table describes the security namespaces and permissions that aren' :::column span="2"::: Manages member permissions to view, edit, and unsubscribe from notifications or create a SOAP subscription.
- **ID:** `58b176e7-3411-457a-89d0-c6d0ccb3c52b` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: :::row::: @@ -1017,11 +1028,11 @@ The following table describes the security namespaces and permissions that aren' Manages permissions to read, write, and delete user account identity information; manage group membership and create and restore identity scopes. The `ManageMembership` permission is automatically granted to members of the Project Administrators and Project Collection Administrators groups. **Token format for project-level permissions**: `PROJECT_ID` - **Example**: `xxxxxxxx-a1de-4bc8-b751-188eea17c3ba` - To modify group level permissions for Group Origin ID [2b087996-2e64-4cc1-a1dc-1ccd5e7eb95b]: - **Token**: `xxxxxxxx-a1de-4bc8-b751-188eea17c3ba\2b087996-2e64-4cc1-a1dc-1ccd5e7eb95b` + **Example**: `00001111-aaaa-2222-bbbb-3333cccc4444` + To modify group level permissions for Group Origin ID [11112222-bbbb-3333-cccc-4444dddd5555]: + **Token**: `00001111-aaaa-2222-bbbb-3333cccc4444\11112222-bbbb-3333-cccc-4444dddd5555`
- **ID:** `5a27515b-ccd7-42c9-84f1-54c998f03866` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -1040,7 +1051,7 @@ The following table describes the security namespaces and permissions that aren' :::column span="2"::: Manages the ability to view, add, modify, and remove license levels. These permissions are automatically granted to members of the Project Collection Administrators groups.
- **ID:** `453e2db3-2e81-474f-874d-3bf51027f2ee` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -1057,7 +1068,7 @@ The following table describes the security namespaces and permissions that aren' :::column span="2"::: Manages the ability to create and download permission reports.
- **ID:** `25fb0ed7-eb8f-42b8-9a5e-836a25f67e37` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -1071,7 +1082,7 @@ The following table describes the security namespaces and permissions that aren' :::column-end::: :::column span="2"::: Applies a system-level deny permission on the namespace, which supports the Project-Scoped User Group. Members of the group receive limited visibility to organization-level data. For more information, see [Manage your organization, Limit user visibility for projects and more](../../user-guide/manage-organization-collection.md#project-scoped-user-group).
- **ID:** `F0003BCE-5F45-4F93-A25D-90FC33FE3AA9` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -1087,7 +1098,7 @@ The following table describes the security namespaces and permissions that aren' :::column span="2"::: Manages permissions to read and write [pipeline cache entries](../../pipelines/release/caching.md). These permissions are only assigned to internal Azure DevOps service principles.
- **ID:** `62a7ad6b-8b8d-426b-ba10-76a7090e94d5` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -1103,7 +1114,7 @@ The following table describes the security namespaces and permissions that aren' :::column span="2"::: Grants `Read` permissions to members of the Project Valid Users group and `Manage` permissions to members of the Project Administrators group.
- ID: `cb4d56d2-e84b-457e-8845-81320a133fbb` + ID: `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -1123,7 +1134,7 @@ The following table describes the security namespaces and permissions that aren' :::column span="2"::: Manages access to Release Management user interface elements.
- **ID:** `7c7d32f7-0e86-4cd6-892e-b35dbba870bd ` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -1139,7 +1150,7 @@ The following table describes the security namespaces and permissions that aren' :::column span="2"::: This security namespace is used to know if a user is valid or anonymous/public.
- **ID:** `ca535e7e-67ce-457f-93fe-6e53aa4e4160` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -1157,7 +1168,7 @@ The following table describes the security namespaces and permissions that aren' :::column span="2"::: Manages permissions to view, edit, and delete service hook subscriptions and publish service hook events. These permissions are automatically assigned to members of the Project Collection Administrators group. `DeleteSubscriptions` is no longer used; `EditSubscriptions` can delete service hooks.
- **ID:** `cb594ebe-87dd-4fc9-ac2c-6a10a4c92046` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -1174,7 +1185,7 @@ The following table describes the security namespaces and permissions that aren' **Token format**: `/`
- **ID:** `83abde3a-4593-424e-b45f-9898af99034d` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -1190,7 +1201,7 @@ The following table describes the security namespaces and permissions that aren' :::column span="2"::: Manages permissions for administrating work tracking and destroying attachments.
- **ID:** `445d2788-c5fb-4132-bbef-09c4045ad93f` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: --- @@ -1208,7 +1219,7 @@ The following table describes the security namespaces and permissions that aren' **Root token format**: `/$` **Token format for a specific project**: `$/PROJECT_ID`
- **ID:** `5a6cd233-6615-414d-9393-48dbb252bd23` + **ID:** `00001111-aaaa-2222-bbbb-3333cccc4444` :::column-end::: :::row-end::: ---