{"id":41875,"date":"2018-03-28T17:53:33","date_gmt":"2018-03-28T17:53:33","guid":{"rendered":"https:\/\/blogs.msdn.microsoft.com\/devops\/?p=41875"},"modified":"2019-02-14T15:50:09","modified_gmt":"2019-02-14T23:50:09","slug":"deadline-extended-for-connecting-vsts-accounts-to-azuread","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/devops\/deadline-extended-for-connecting-vsts-accounts-to-azuread\/","title":{"rendered":"Deadline extended for connecting VSTS accounts to AzureAD"},"content":{"rendered":"<p>On January 5, 2018, I announced that <a href=\"https:\/\/blogs.msdn.microsoft.com\/devops\/2018\/01\/05\/vsts-will-no-longer-allow-creation-of-new-msa-users-with-custom-domain-names-backed-by-azuread\/\">Visual Studio Team Services will no longer allow creation of <strong>new<\/strong> MSA users with custom domain names backed by AzureAD<\/a>.\u00a0 While most customers agree with the direction of this change, I got clear feedback that they could not connect their VSTS to AzureAD by the March 31 deadline.\u00a0 Based on this feedback, we are changing our tactics and extending the deadline to the end of September.<\/p>\n<p>PLEASE NOTE: VSTS will continue to work the way it does today and current users will never lose access. The only restriction starting in October will be on the creation of new MSA users; existing users will continue to have access to VSTS.<\/p>\n<p>From talking to hundreds of customers going through this process, we have heard clear feedback that customers see this as a Microsoft problem, not something specific to VSTS. \u00a0They\u2019re looking for Microsoft to provide a clear path to not only change the way users login to VSTS but to ensure their complete developer ecosystem stays intact including access to their VS and Azure subscriptions.\u00a0 We have updated our <a href=\"http:\/\/aka.ms\/vstsconnect\">documentation<\/a> to provide clearer guidance on how you can continue to access these as well as migrate them to an AzureAD identity if you so choose.<\/p>\n<p>We are extending the deadline to allow administrators to move to AzureAD by the end of September, at which time no new MSAs can be created with custom domain names backed by AzureAD.\u00a0 We are also working on a new technical solution that will allow new users to sign into VSTS with their AzureAD identity while existing users continue to sign in with their MSA identity. \u00a0I will post more about this once we have a firm plan in place.<\/p>\n<p>Please let me know if you have any other questions or concerns. Thank you for your continued use and support of VSTS.<\/p>\n<p>Thank you,<\/p>\n<p>Justin Marks, Principal PM, VSTS Identity<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On January 5, 2018, I announced that Visual Studio Team Services will no longer allow creation of new MSA users with custom domain names backed by AzureAD.\u00a0 While most customers agree with the direction of this change, I got clear feedback that they could not connect their VSTS to AzureAD by the March 31 deadline.\u00a0 [&hellip;]<\/p>\n","protected":false},"author":174,"featured_media":45953,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[228,1,251],"tags":[],"class_list":["post-41875","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-admin-licensing","category-devops","category-security"],"acf":[],"blog_post_summary":"<p>On January 5, 2018, I announced that Visual Studio Team Services will no longer allow creation of new MSA users with custom domain names backed by AzureAD.\u00a0 While most customers agree with the direction of this change, I got clear feedback that they could not connect their VSTS to AzureAD by the March 31 deadline.\u00a0 [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/posts\/41875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/users\/174"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/comments?post=41875"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/posts\/41875\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/media\/45953"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/media?parent=41875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/categories?post=41875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/tags?post=41875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}