New Application ID for Azure DevOps

Azure DevOps New Application ID

(๐€๐œ๐ญ๐ข๐จ๐ง ๐‘๐ž๐ช๐ฎ๐ข๐ซ๐ž๐) ๐‚๐จ๐ง๐๐ข๐ญ๐ข๐จ๐ง๐š๐ฅ ๐€๐œ๐œ๐ž๐ฌ๐ฌ ๐”๐ฉ๐๐š๐ญ๐ž ๐Ÿ๐จ๐ซ ๐€๐ณ๐ฎ๐ซ๐ž ๐ƒ๐ž๐ฏ๐Ž๐ฉ๐ฌ โ€“ ๐ƒ๐ž๐š๐๐ฅ๐ข๐ง๐ž: ๐’๐ž๐ฉ๐ญ ๐Ÿ’, ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“

Until now, many orgs protected Azure DevOps sign-ins indirectly via Conditional Access policies targeting the โ€œWindows Azure Service Management API (aka App ID: 797f4846-ba00-4fd7-ba43-dac1f8f63013).

โœ…Thatโ€™s no longer enough. From Sept 2, 2025, instead, you now have to explicitly include Azure DevOps in your Conditional Access policies using its own App ID:

๐Ÿ‘‰๐ŸปAzure DevOps App ID: 499b84ac-1321-427f-aa17-267ca6975798

In short, DevOps is separating from the pack and now needs to be called out explicitly in Conditional Access settings.

If Azure DevOps isnโ€™t explicitly included in your CA policies:

โŒ MFA and device rules wonโ€™t apply

โŒ Sign-ins may go unprotected

โŒ Youโ€™ll lose critical visibility and control

Find CA policies targeting Windows Azure Service Management API, update them to include Azure DevOps, and check sign-in logs.

Reminder: Youโ€™ll need Microsoft Entra ID P1 or P2 licenses to use Conditional Access.

If you already have CA policies applied to all users and all cloud apps without exclusions, then Azure DevOps is already covered. You’re good to go.

Write a Comment

Leave a Comment

Your email address will not be published. Required fields are marked *

Subscribe to Newsletter

Subscribe to our email newsletter to get the latest posts delivered right to your email.
Powered by Amail.