{"id":40345,"date":"2018-01-29T18:22:11","date_gmt":"2018-01-29T18:22:11","guid":{"rendered":"https:\/\/blogs.msdn.microsoft.com\/devops\/?p=40345"},"modified":"2019-02-14T15:50:19","modified_gmt":"2019-02-14T23:50:19","slug":"vs-subscriptions-and-linking-your-vsts-account-to-azuread","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/devops\/vs-subscriptions-and-linking-your-vsts-account-to-azuread\/","title":{"rendered":"VS Subscriptions and linking your VSTS account to AzureAD"},"content":{"rendered":"<p><span>A few weeks ago,\u00a0<\/span><a href=\"https:\/\/blogs.msdn.microsoft.com\/devops\/2018\/01\/05\/vsts-will-no-longer-allow-creation-of-new-msa-users-with-custom-domain-names-backed-by-azuread\/\"><span>I posted about a change coming to organizations managing their identities with Microsoft Accounts (MSAs)<\/span><\/a><span>; as of March 30<\/span><span>th<\/span><span>, you will no longer able to create new MSAs with a custom domain name that is linked to an Azure Active Directory tenant.\u00a0 Many customers have reached out asking how this change affects their V<\/span><span>isual Studio<\/span><span>\u00a0subscriptions\u00a0<\/span><span>(formerly known as MSDN subscriptions)\u00a0<\/span><span>so this post is aimed at answering that question.<\/span><span>\u00a0<\/span><\/p>\n<p><span>In general, VS subscription administrators assign subscriptions to a user\u2019s corporate email (e.g.\u00a0<\/span><a href=\"mailto:justin@fabrikam.com\"><span>justin@fabrikam.com<\/span><\/a><span>) so that they can get the welcome email and notifications about the subscription.<\/span><span>\u00a0\u00a0<\/span><span>As long as the email of the identity<\/span><span>\u00a0and the subscription match, the user will be able to access the benefits of that subscription.\u00a0\u00a0<\/span><span>As your organization transitions from MSA to AAD identities and the emails match (both of the form\u00a0<\/span><a href=\"mailto:justin@fabrikam.com\"><span>justin@fabrikam.com<\/span><\/a><span>), your user\u2019s benefits will continue to work with their new AAD identity.<\/span><span>\u00a0<\/span><\/p>\n<p><span>While the previous scenario is by far the most common for organizations, t<\/span><span>here are a couple other scenarios that\u00a0<\/span><span>we\u2019ve seen customers hit\u2026<\/span><span>\u00a0<\/span><\/p>\n<p><b><span>Subscription is assigned to\u00a0<\/span><\/b><a href=\"mailto:justin@outlook.com\"><b><span>justin@outlook.com<\/span><\/b><\/a><b><span>\u00a0<\/span><\/b><b><span>(MSA)\u00a0<\/span><\/b><b><span>but the end user wants to use his VS subscription with an AAD identity (<\/span><\/b><a href=\"mailto:justin@fabrikam.com\"><b><span>justin@fabrikam.com<\/span><\/b><\/a><b><span>).\u00a0<\/span><\/b><span>\u00a0<\/span><\/p>\n<p><span>If you access\u00a0<\/span><span>VSTS<\/span><span>\u00a0or Microsoft Azure with\u00a0<\/span><span>an AAD identity,\u00a0<\/span><span>but access your\u00a0<\/span><span>VS subscription<\/span><span>\u00a0with a different identity (such as your personal Microsoft account), you can\u00a0<\/span><span>link your AAD identity to your VS subscription<\/span><span>\u00a0by\u00a0<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/vsts\/billing\/faq-link-msdn-subscription-org-account\"><span>adding an \u201cAlternate account\u201d to your subscription<\/span><\/a><span>.\u00a0\u00a0<\/span><span>Once the linking is complete, you\u2019ll be able to access\u00a0<\/span><span>your subscription with both the MSA and the AAD identities.<\/span><span>\u00a0<\/span><\/p>\n<p><b><span>Subscription is assigned to\u00a0<\/span><\/b><a href=\"mailto:justin@fabrikam.com\"><b><span>justin@fabrikam.com<\/span><\/b><\/a><b><span>\u00a0but the\u00a0<\/span><\/b><b><span>organization isn\u2019t using AAD for VSTS<\/span><\/b><b><span>.\u00a0 They have created\u00a0<\/span><\/b><b><span>a<\/span><\/b><b><span>\u00a0new MSA\u00a0<\/span><\/b><b><span>for the user\u00a0<\/span><\/b><b><span>with the sign in address\u00a0<\/span><\/b><a href=\"mailto:justin@outlook.com\"><b><span>justin@outlook.com<\/span><\/b><\/a><b><span>.\u00a0<\/span><\/b><span>\u00a0<\/span><\/p>\n<p><span>This\u00a0<\/span><span>scenario is going to become more prevalent given the lockdown of MSA account creation.\u00a0 We have just released the ability for a user to add an MSA \u201cAlternate account\u201d when they\u2019re\u00a0<\/span><span>signed in<\/span><span>to VSTS<\/span><span>\u00a0with an AAD identity\u00a0<\/span><span>(the reverse of the previous scenario).\u00a0\u00a0<\/span><\/p>\n<p><b><span>Subscription is assigned to\u00a0<\/span><\/b><a href=\"mailto:justin@fabrikam.com\"><b><span>justin@fabrikam.com<\/span><\/b><\/a><b><span>\u00a0but the<\/span><\/b><b><span>\u00a0organization\u2019s AAD\u00a0<\/span><\/b><b><span>has a different email,\u00a0<\/span><\/b><a href=\"mailto:justin@contoso.com\"><b><span>justin@contoso.com<\/span><\/b><\/a><b><span>, that doesn\u2019t match the email where the subscription is assigned.<\/span><\/b><span>\u00a0<\/span><\/p>\n<p><span>This is\u00a0<\/span><span>similar to<\/span><span>\u00a0the above scenario and <\/span><span>supported in the same way.\u00a0\u00a0<\/span><span>W<\/span><span>e\u2019ve gotten feedback from VS subscription administrators that\u00a0<\/span><span>some do not\u00a0<\/span><span>want to allow use of a subscription by AAD identities outside their\u00a0<\/span><span>organization<\/span><span>\u00a0so we are planning additional work to allow for these administrative controls at a later time.<\/span><span>\u00a0Alternatively, the subscription administrator can reassign the subscription to the users&#8217;s organization email address.<\/span><\/p>\n<p><span>Hopefully this helps bring some clarity and I\u2019m eager to hear your feedback as your organization begins their transition away from MSA to AAD linked VSTS accounts.\u00a0 Please don\u2019t hesitate to reach out if you have any further questions.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Thank you,<\/span><span>\n<\/span><span>Justin Marks, Principal PM, VSTS Identity<\/span><span>\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A few weeks ago,\u00a0I posted about a change coming to organizations managing their identities with Microsoft Accounts (MSAs); as of March 30th, you will no longer able to create new MSAs with a custom domain name that is linked to an Azure Active Directory tenant.\u00a0 Many customers have reached out asking how this change affects [&hellip;]<\/p>\n","protected":false},"author":174,"featured_media":45953,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[228,1,251],"tags":[],"class_list":["post-40345","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-admin-licensing","category-devops","category-security"],"acf":[],"blog_post_summary":"<p>A few weeks ago,\u00a0I posted about a change coming to organizations managing their identities with Microsoft Accounts (MSAs); as of March 30th, you will no longer able to create new MSAs with a custom domain name that is linked to an Azure Active Directory tenant.\u00a0 Many customers have reached out asking how this change affects [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/posts\/40345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/users\/174"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/comments?post=40345"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/posts\/40345\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/media\/45953"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/media?parent=40345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/categories?post=40345"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/tags?post=40345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}