author: jnHs Description: You can add users, groups, and Azure AD applications to your Dev Center account. title: Add users, groups, and Azure AD applications to your Dev Center account ms.author: wdg-dev-content ms.date: 03/21/2018 ms.topic: article ms.prod: windows ms.technology: uwp keywords: windows 10, uwp, azure ad application, aad, user, group ms.localizationpriority: high
The Users section of Dev Center lets you use Azure Active Directory to add users to your Dev Center account. Each user is assigned a role (or set of custom permissions) that defines their access to the account. You can also add groups of users and Azure AD applications to grant them access to your Dev Center account.
After users have been added to the account, you can edit account details, change roles and permissions, or remove users.
Important
In order to add users to your account, you must first associate your Dev Center account with your organization's Azure Active Directory tenant.
When adding users, you will need to specify their access to your Dev Center account by assigning them a role or set of custom permissions.
Keep in mind that all Dev Center users (including groups and Azure AD applications) must have an active account in an Azure AD tenant that is associated with your Dev Center account. User management is done in one tenant at a time; you must sign in with a Manager account for the tenant in which you want to add or edit users. Creating a new user in Dev Center will also create an account for that user in the Azure AD tenant to which you are signed in, and making changes to a user's name in Dev Center will make the same changes in your organization's Azure AD tenant.
Note
If your organization uses directory integration to sync the on-premises directory service with your Azure AD, you won't be able to create new users, groups, or Azure AD applications in Dev Center. You (or another admin in your on-premises directory) will need to create them directly in the on-premises directory before you'll be able to see and add them in Dev Center.
To add users to your Dev Center account, go to the Users page in Account settings and select Add users. You must be signed in with a Manager account for the Azure AD tenant that you want to work in.
You can select users who already exist in your organization's tenant and give them access to your Dev Center account.
- From the Users page, select Add users.
- Select one or more users from the list that appears. You can use the search box to search for specific users.
[!TIP] If you select more than one user to add to your Dev Center account, you must assign them the same role or set of custom permissions. To add multiple users with different roles/permissions, repeat the steps below for each role or set of custom permissions.
- When you are finished selecting users, click Add selected.
- In the Roles section, specify the role(s) or customized permissions for the selected user(s).
- Click Save. If your account has global administrator permissions you will see some additional ways to add users.
If you are signed in with a Manager account which also has global administrator permissions for the Azure AD tenant you're working in, you will have additional options to add users to your Dev Center account. You'll need to select one of the following:
- Add existing users: Choose users who already exist in your organization's directory and give them access to your Dev Center account, as described above.
- Create new users: Create brand new user accounts to add to both your organization's directory and your Dev Center account.
- Invite outside users: Send email invites to users who are not currently in your organization's directory. They will be invited to access your Dev Center account, and a new guest user account will be created for them in your Azure AD tenant.
Important
You must be signed in with a global administrator account in your Azure AD tenant in order to create new users.
- From the Users page, click Add users, then choose Create new users.
- Enter the first name, last name, and username for the new user.
- If you want the new user to have a global administrator account in your organization's directory, check the box labeled Make this user a Global administrator in your Azure AD, with full control over all directory resources. This will give the user full access to all administrative features in your company's Azure AD. They'll be able to add and manage users in your organization's directory (though not in Dev Center, unless you grant the account the appropriate role/permissions). If you check this box, you'll need to provide a Password recovery email for the user.
- If you checked the box to Make this user a Global administrator in your Azure AD, enter an email that the user can use if they need to recover their password.
- In the Group membership section, select any groups to which you want the new user to belong.
- In the Roles section, specify the role(s) or customized permissions for the user.
- Click Save.
- On the confirmation page, you'll see login info for the new user, including a temporary password. Be sure to note this info and provide it to the new user, as you won't be able to access the temporary password after you leave this page.
Important
You must be signed in with a global administrator account in your Azure AD tenant in order to invite outside users.
- Enter one or more email addresses (up to ten), separated by commas or semicolons.
- In the Roles section, specify the role(s) or customized permissions for the user.
- Click Save.
The users you invited will get an email invitation to join your account, and a new guest user account will be created for them in your Azure AD tenant. Each user will need to accept their invitation before they can access your account.
If you need to resend an invitation, find the user on your Users page and select their email address (or the text that says Invitation pending). Then, at the bottom of the page, click Resend invitation.
Important
Outside users that you invite to join your Dev Center account can be assigned the same roles and permissions as other users. However, outside users will not be able to perform certain tasks in Visual Studio, such as associating an app with the Store, or creating packages to upload to the Store. If a user needs to perform those tasks, choose Create new users instead of Invite outside users. (If you don’t want to add these users to your existing Azure AD tenant, you can create a new tenant, then create new user accounts for them in that tenant.)
If one of your users needs to change their password they can do so themselves if you provided a Password recovery email when creating the user account. You can also update a user's password by following the steps below (if you are signed in with a global administrator account in your Azure AD tenant in order to change a user's password). Note that this will change the user's password in your Azure AD tenant, along with the password they use to access Dev Center.
-
From the Users page, click the name of the user account that you want to edit.
-
Click the Reset password button at the bottom of the page.
-
A confirmation page will appear showing the login info for the user, including a temporary password.
[!IMPORTANT] Be sure to print or copy this info and provide it to the user, as you won't be able to access the temporary password after you leave this page.
You can add a group from your organization's directory to your Dev Center account. When you do so, every user who is a member of that group will be able to access it, with the permissions associated with the group's assigned role.
-
From the Users page, click Add groups.
-
Select one or more groups from the list that appears. You can use the search box to search for specific groups.
[!TIP] If you select more than one group to add to your Dev Center account, you must assign them the same role or set of custom permissions. To add multiple groups with different roles/permissions, repeat the steps below for each role or set of custom permissions.
-
When you are finished selecting groups, click Add selected.
-
In the Roles section, specify the role(s) or customized permissions for the selected group(s). All members of the group will be able to access your Dev Center account with the permissions you apply to the group, regardless of the roles/permissions associated with their individual account.
-
Click Save.
If you want to grant Dev Center access to a brand new group, you can create a new group in the Users section. Note that the new group will be created in your organization's directory, not just in your Dev Center account.
- From the Users page, click Add groups.
- On the next page, click New group.
- Enter the display name for the new group.
- Specify the role(s) or customized permissions for the group. All members of the group will be able to access your Dev Center account with the permissions you apply to the group, regardless of the roles/permissions associated with their individual account.
- Select the user(s) to assign to the new group from the list that appears. You can use the search box to search for specific users.
- When you are finished selecting users, click Add selected to add them to the new group.
- Click Save.
You can allow applications or services that are part of your organization's Azure AD to access your Dev Center account. These Azure AD application user accounts can be used to call the REST APIs provided by the Microsoft Store services.
-
From the Users page, select Add Azure AD applications.
-
Select one or more Azure AD applications from the list that appears. You can use the search box to search for specific Azure AD applications.
[!TIP] If you select more than one Azure AD application to add to your Dev Center account, you must assign them the same role or set of custom permissions. To add multiple Azure AD applications with different roles/permissions, repeat the steps below for each role or set of custom permissions.
-
When you are finished selecting Azure AD applications, click Add selected.
-
In the Roles section, specify the role(s) or customized permissions for the selected Azure AD application(s).
-
Click Save.
Create a new Azure AD application account in your organization's directory and add it to your Dev Center account
If you want to grant Dev Center access to a brand new Azure AD application account, you can create one in the Users section. Note that this will create a new account in your organization's directory, not just in your Dev Center account.
Tip
If you are primarily using this Azure AD application for Dev Center authentication, and don't need users to access it directly, you can enter any valid address for the Reply URL and App ID URI, as long as those values are not used by any other Azure AD application in your directory.
- From the Users page, select Add Azure AD applications.
- On the next page, click New Azure AD application.
- Enter the Reply URL for the new Azure AD application. This is the URL where users can sign in and use your Azure AD application (sometimes also known as the App URL or Sign-On URL). The Reply URL can't be longer than 256 characters and must be unique within your directory.
- Enter the App ID URI for the new Azure AD application. This is a logical identifier for the Azure AD application that is presented when it sends a single sign-on request to Azure AD. Note that the App ID URI must be unique for each Azure AD application in your directory, and it can't be longer than 256 characters. For more info about the App ID URI, see Integrating applications with Azure Active Directory.
- In the Roles section, specify the role(s) or customized permissions for the Azure AD application.
- Click Save.
After you add or create an Azure AD application, you can return to the Users section and select the application name to review settings for the application, including the Tenant ID, Client ID, Reply URL, and App ID URI.
Note
If you intend to use the REST APIs provided by the Microsoft Store services, you will need the Tenant ID and Client ID values shown on this page to obtain an Azure AD access token that you can use to authenticate the calls to services.
If your Azure AD application reads and writes data in Microsoft Azure AD, it will need a key. You can create keys for an Azure AD application by editing its info in Dev Center. You can also remove keys that are no longer needed.
-
From the Users page, click the name of the Azure AD application.
[!TIP] When you click the name of the Azure AD application, you'll see all of the active keys for the Azure AD application, including the date on which the key was created and when it will expire. To remove a key that is no longer needed, click Remove.
-
To add a new key, click Add new key.
-
You will see a screen showing the Client ID and Key values.
[!IMPORTANT] Be sure to print or copy this info, as you won't be able to access it again after you leave this page.
-
If you want to create more keys, click Add another key.
After you've added users, groups, and/or Azure AD applications to your Dev Center account, you can make changes to their account info.
Important
Changes made to roles or permissions will only affect Dev Center access. All other changes (such as changing a user's name or group membership, or the Reply URL and App ID URI for an Azure AD application) will be reflected in your organization's Azure AD tenant as well as in your Dev Center account.
- From the Users page, click the name of the user, group, or Azure AD application account that you want to edit.
- Make your desired changes. The items you can edit are as follows:
- For a user, you can edit the user's first name, last name, or username. You can also select or deselect groups in the Group membership section to update their group membership.
- For a group, you can edit the name of the group. (To update group membership, edit the users you want to add or remove from the group and make changes to the Group membership section.)
- For an Azure AD application, you can enter new values for the Reply URL or App ID URI. Remember that these changes will be made in your organization's directory as well as in your Dev Center account.
- For changes related to Dev Center access, select or deselect the role(s) that you want to apply, or select Customize permissions and make the desired changes. These changes only impact Dev Center access and will not change any permissions within your organization's Azure AD tenant.
- Click Save.
As an account owner, you can view the detailed browsing history for any additional users you’ve added to the account.
On the Users page, click the link shown under Last activity for the user whose browsing history you’d like to review. You'll be able to view the URLs for all pages that the user visited in the last 30 days.
To remove a user, group, or Azure AD application from your Dev Center account, click the Remove link that appears by their name on the Users page. After confirming that you want to remove it, that user, group, or Azure AD application will no longer be able to access to your Dev Center account (unless you add it again later).
Important
Removing a user, group, or Azure AD application means that it will no longer have access to your Dev Center account. It does not delete the user, group, or Azure AD application from your organization's directory.