-
Notifications
You must be signed in to change notification settings - Fork 2k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Co-authored-by: Matthew John Cheetham <[email protected]>
- Loading branch information
Showing
6 changed files
with
60 additions
and
60 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -18,7 +18,7 @@ Historically, the only option supported by the Azure Repos host provider was | |
Azure DevOps Personal Access Tokens (PATs). | ||
|
||
These PATs are only used by Azure DevOps, and must be [managed through the Azure | ||
DevOps user settings page][azure-devops-pats] or [REST API][]. | ||
DevOps user settings page][azure-devops-pats] or [REST API][azure-devops-api]. | ||
|
||
PATs have a limited lifetime and new tokens must be created once they expire. In | ||
Git Credential Manager, when a PAT expired (or was manually revoked) this | ||
|
@@ -188,7 +188,7 @@ inherited). | |
|
||
To associate a user account with a particular Git remote you must manually edit | ||
the remote URL using `git config` commands to include the username in the | ||
[user information][] part of the URL. | ||
[user information][rfc3986-s321] part of the URL. | ||
|
||
```shell | ||
git config --local remote.origin.url https://alice-alt%[email protected]/project/_git/repo | ||
|
@@ -221,5 +221,5 @@ fabrikam: | |
[azure-devops-pats]: https://docs.microsoft.com/en-us/azure/devops/organizations/accounts/use-personal-access-tokens-to-authenticate?view=azure-devops&tabs=preview-page | ||
[`credential.azreposCredentialType`]: configuration.md#credentialazreposcredentialtype | ||
[`GCM_AZREPOS_CREDENTIALTYPE`]: environment.md#GCM_AZREPOS_CREDENTIALTYPE | ||
[REST API]: https://docs.microsoft.com/en-gb/rest/api/azure/devops/tokens/pats | ||
[user information]: https://tools.ietf.org/html/rfc3986#section-3.2.1 | ||
[azure-devops-api]: https://docs.microsoft.com/en-gb/rest/api/azure/devops/tokens/pats | ||
[rfc3986-s321]: https://tools.ietf.org/html/rfc3986#section-3.2.1 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -7,15 +7,15 @@ Additionally Bitbucket supports App-specific passwords which can be used via Bas | |
To enhance security Bitbucket offers optional Two-Factor Authentication (2FA). When 2FA is enabled username/password Basic Auth access to the REST APIs and to Git repositories is suspended. | ||
At that point users are left with the choice of username/apps-specific-password Basic Auth for REST APIs and Git interactions, OAuth for REST APIs and Git/Hg interactions or SSH for Git/HG interactions and one of the previous choices for REST APIs. | ||
SSH and REST API access are beyond the scope of this document. | ||
Read about [Bitbucket's 2FA implementation][]. | ||
Read about [Bitbucket's 2FA implementation][2fa-impl]. | ||
|
||
App-specific passwords are not particularly user friendly as once created Bitbucket hides their value, even from the owner. | ||
They are intended for use within application that talk to Bitbucket where application can remember and use the app-specific-password. | ||
[Additional information][]. | ||
[Additional information][additional-info]. | ||
|
||
OAuth is the intended authentication method for user interactions with HTTPS remote URL for Git repositories when 2FA is active. | ||
Essentially once a client application has an OAuth access token it can be used in place of a user's password. | ||
Read more about information [Bitbucket's OAuth implementation][]. | ||
Read more about information [Bitbucket's OAuth implementation][oauth-impl]. | ||
|
||
Bitbucket's OAuth implementation follows the standard specifications for OAuth 2.0, which is out of scope for this document. | ||
However it implements a comparatively rare part of OAuth 2.0 Refresh Tokens. | ||
|
@@ -30,7 +30,7 @@ This is explained in more detail below. | |
|
||
## Multiple User Accounts | ||
|
||
Unlike the GitHub implementation within the Git Credential Manager, the Bitbucket implementation stores 'secrets', passwords, app-specific passwords, or OAuth tokens, with usernames in the [Windows Credential Manager][] vault. | ||
Unlike the GitHub implementation within the Git Credential Manager, the Bitbucket implementation stores 'secrets', passwords, app-specific passwords, or OAuth tokens, with usernames in the [Windows Credential Manager][wincred-manager] vault. | ||
|
||
Depending on the circumstances this means either saving an explicit username in to the Windows Credential Manager/Vault or including the username in the URL used as the identifying key of entries in the Windows Credential Manager vault, i.e. using a key such as `git:https://[email protected]/` rather than `git:https://bitbucket.org`. | ||
This means that the Bitbucket implementation in the GCM can support multiple accounts, and usernames, for a single user against Bitbucket, e.g. a personal account and a work account. | ||
|
@@ -81,10 +81,10 @@ This will download and run a standalone instance of Bitbucket Server which can b | |
|
||
Atlassian has [documentation][] on how to download and install their SDK. | ||
|
||
[Additional information]:https://confluence.atlassian.com/display/BITBUCKET/App+passwords | ||
[additional-info]:https://confluence.atlassian.com/display/BITBUCKET/App+passwords | ||
[atlas-run-standalone]: https://developer.atlassian.com/server/framework/atlassian-sdk/atlas-run-standalone/ | ||
[bitbucket.org]: https://bitbucket.org | ||
[Bitbucket's 2FA implementation]: https://confluence.atlassian.com/bitbucket/two-step-verification-777023203.html | ||
[Bitbucket's OAuth implementation]: https://confluence.atlassian.com/bitbucket/oauth-on-bitbucket-cloud-238027431.html | ||
[2fa-impl]: https://confluence.atlassian.com/bitbucket/two-step-verification-777023203.html | ||
[oauth-impl]: https://confluence.atlassian.com/bitbucket/oauth-on-bitbucket-cloud-238027431.html | ||
[documentation]: https://developer.atlassian.com/server/framework/atlassian-sdk/ | ||
[Windows Credential Manager]: https://msdn.microsoft.com/en-us/library/windows/desktop/aa374792(v=vs.85).aspx | ||
[wincred-manager]: https://msdn.microsoft.com/en-us/library/windows/desktop/aa374792(v=vs.85).aspx |
Oops, something went wrong.