Azure DevOps Personal Access Token
Description
General
Documentation: https://docs.microsoft.com/en-us/azure/devops/cli/log-in-via-pat?view=azure-devops&tabs=windows
Summary: Azure is a cloud computing service created by Microsoft. The Azure DevOps personal access tokens are used to authenticate with the command line interface. This detector finds these secrets.
IPs allowlist: See API Management policies.
Scopes: Keys are specific to an API.
Revoke the secret
Keys can be rotated from Azure portal, PowerShell and Azure CLI.
Check for suspicious activity
Azure gives access to detailed logs, see Azure platform logs.
Details for Azure devops personal access token
Family: Api
Category: Cloud Provider
Company: Microsoft
High recall: False
Validity check available: False
Minimum number of matches: 1
Occurrences found for one million commits: 40.2
Prefixed: False
PreValidators:
- type: FilenameBanlistPreValidator
banlist_extensions:
- ^pkl$
banlist_filenames: []
check_binaries: false
include_default_banlist_extensions: true
ban_markup: true
- type: ContentWhitelistPreValidator
patterns:
- azure
Examples
- text: AZURE_TOKEN=sbwamnzekhbkhrthrkceu57534sargb7t24w5b6h55b3r3asnbbd
apikey: sbwamnzekhbkhrthrkceu57534sargb7t24w5b6h55b3r3asnbbd