Hi @Conner, Mike@Energy ,
Thanks for reaching out to Microsoft Q&A.
Here’s what you can check and try:
- Generate the PAT on your on-prem server
- Sign into https://devops.energy.ca.gov
- Click your avatar =>Security =>Personal access tokens
- New token: give it a name, set the expiration, and under “Scopes” at minimum enable Code (Read & write)
- Copy the full token (you won’t be able to see it again)
- Use the PAT with Git Option A: include it in the clone URL (you may need to URL-encode special characters):
Option B: let Git prompt you for credentials (preferred):git clone https://<yourUserName>:<YOUR_PAT>@devops.energy.ca.gov/DefaultCollection/MIDAS/_git/midas-aws-migration
When prompted for Username, enter your username; when prompted for Password, paste the PATgit clone https://devops.energy.ca.gov/DefaultCollection/MIDAS/_git/midas-aws-migration - Install or update Git Credential Manager (GCM)
- This helps avoid retyping credentials and handles OAuth/Microsoft Entra tokens automatically
- Docs: https://learn.microsoft.com/azure/devops/repos/git/use-credential-manager
- Verify permissions and server support
- Make sure your account has at least Basic access and is in the Contributors group on the MIDAS project
- Confirm your Azure DevOps Server version supports PATs (PATs were introduced in Azure DevOps Server 2019)
- If you’re behind a proxy or using SSL inspection, try enabling Git trace logs (GIT_TRACE=1, GIT_CURL_VERBOSE=1) to see more details
Hope this helps!
If the resolution was helpful, kindly take a moment to click on and click on Yes for was this answer helpful. And, if you have any further query do let us know.