You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/organizations/security/troubleshoot-permissions.md
+8-8
Original file line number
Diff line number
Diff line change
@@ -54,7 +54,7 @@ Less common reasons for limited access are when one of the following events has
54
54
|---------|---------|
55
55
|A project administrator disabled a service. In this case, no one has access to the disabled service. | To determine whether a service is disabled, see [Turn an Azure DevOps service on or off](../settings/set-services.md). |
56
56
|A Project Collection Administrator disabled a preview feature, which disables it for all project members in the organization. | See [Manage preview features](../../project/navigation/preview-features.md). |
57
-
|Group rules governing the user’s access level or project membership are restricting access. |See [Determine a user's access level and subscription status].(#determine-a-users-access-level-and-subscription-status). |
57
+
|Group rules governing the user’s access level or project membership are restricting access. |See [Determine a user's access level and subscription status](#determine-a-users-access-level-and-subscription-status). |
58
58
|Custom rules have been defined to a work item type’s workflow. |see [Rules applied to a work item type that restrict select operation](#rules-applied-to-a-work-item-type-that-restrict-select-operations). |
59
59
60
60
## Determine a user's access level and subscription status
@@ -142,13 +142,13 @@ The resulting trace lets you know how they're inheriting the listed permission.
142
142
1. Go to the Security page for the project that the user is having access problems.
143
143
2. Enter their name into the box in the upper left-hand corner.
144
144
145
-
:::image type="content" source="media/security-page-enter-user-name.png" alt-text="Enter user name to view permissions.":::
145
+
:::image type="content" source="media/security-page-enter-user-name.png" alt-text="Enter user name to view permissions.":::
146
146
147
-
You should have a user-specific view that shows what permissions they have.
147
+
You should have a user-specific view that shows what permissions they have.
148
148
149
149
3. Trace why a user does or doesn't have any of the listed permissions. Hover over the permission, and then choose **Why**.
150
150
151
-
:::image type="content" source="media/permissions-list-view-project-level-information.png" alt-text="Select Why to trace the permissions":::
151
+
:::image type="content" source="media/permissions-list-view-project-level-information.png" alt-text="Select Why to trace the permissions":::
152
152
153
153
The resulting trace lets you know how they're inheriting the listed permission. You can then adjust the user's permissions by adjusting those permissions provided to the groups they're in.
154
154
@@ -230,14 +230,14 @@ You can use the following tools to fix a user's permission issue.
230
230
231
231
- TFSSecurity.exe - TFSSecurity is a command-line tool that can be used to view and update and delete permissions or groups.
Use `prc_pSetAccessControlEntry` or `prc_pRemoveAccessControlEntries` to add or remove ACEs directly from the security tables if TFSSecurity doesn't work for you.
239
+
Example usage:
240
+
Use `prc_pSetAccessControlEntry` or `prc_pRemoveAccessControlEntries` to add or remove ACEs directly from the security tables if TFSSecurity doesn't work for you.
241
241
242
242
For more information, see [Use TFSSecurity to manage groups and permissions for Azure DevOps](https://docs.microsoft.com/azure/devops/server/command-line/tfssecurity-cmd.md).
0 commit comments