Share via

Unable to allow all users to create Azure DevOps organizations in tenant

Enmanuel Perdomo 0 Reputation points
2026-05-04T20:07:20.8733333+00:00

We are managing an Azure DevOps environment for our company and we have identified an inconsistency regarding organization creation permissions.

Currently:

  • Some users (including myself and another admin) are able to create new Azure DevOps organizations.
  • Other users in the same Microsoft Entra ID tenant are NOT able to create organizations.
  • All users are internal (Member type), not guests.

We have already checked:

  • Organization-level policies (Organization Settings → Policies)
  • Microsoft Entra ID roles and permissions
  • User access levels in Azure DevOps

We could NOT find any setting to centrally control or enable the ability for all users to create organizations.

Questions:

  1. Is there a tenant-level policy that controls who can create Azure DevOps organizations?
  2. How can we enable this permission for all users in the tenant?
  3. Is this behavior based on legacy permissions or internal flags?
  4. Can this be enabled globally by Microsoft support?

Additional context:

  • We want to standardize permissions across users.
  • We understand the governance risks, but we need to validate the technical possibility.

Looking forward to clarification on how this permission is managed.

Azure DevOps

1 answer

Sort by: Most helpful
  1. Q&A Assist
    2026-05-04T20:07:42.36+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more
    1. Yes. There is a tenant-level policy in Azure DevOps that controls who can create new Azure DevOps organizations. It is the Restrict organization creation tenant policy, configured under Organization settings → Microsoft Entra ID for an Azure DevOps organization that is linked to the tenant.
      • By default, any user in the Microsoft Entra tenant can create new Azure DevOps organizations.
      • When Restrict organization creation is turned on, only users and groups on the allowlist can create organizations. All other users, including Azure DevOps administrators, are blocked unless explicitly added to the allowlist.
    2. To enable the permission for all users in the tenant, the tenant policy must either be turned off or its allowlist must be configured to include everyone: Option A – Allow everyone (recommended for your scenario):
      • Sign in to an existing Azure DevOps organization as a user with the Azure DevOps Administrator role in Microsoft Entra ID.
      • Go to https://dev.azure.com/{Your_Organization}.
      • Select Organization settings (gear icon).
      • Select Microsoft Entra ID.
      • Turn off the Restrict organization creation toggle.
      • With the policy off, any user in the tenant can create new Azure DevOps organizations again.
      Option B – Keep restriction but broaden allowlist:
      • If the policy must stay enabled, still go to Organization settings → Microsoft Entra ID.
      • Under Allow list, select Add Microsoft Entra user or group.
      • Add a tenant-wide group that contains all internal members (for example, an “All Employees” or equivalent security group).
      • Save the changes.
      • All users in that group will be able to create organizations; others will be blocked.
      Note: The documentation explicitly recommends using groups in the allowlist rather than individual users.
    3. The behavior is not described as legacy or based on hidden internal flags. It is governed by the documented Restrict organization creation tenant policy and its allowlist:
      • When the policy is off, behavior is “open”: any user in the tenant can create organizations.
      • When the policy is on, behavior is “restricted”: only users or groups on the allowlist can create organizations.
      • This policy affects only the creation of new organizations; it does not change access to existing organizations or their settings.
      The inconsistency observed (some users can create organizations, others cannot) is consistent with this policy being enabled and only certain users or groups being present on the allowlist.
    4. The documentation does not state that Microsoft Support can globally override or bypass this policy. Instead, it states that:
      • To manage this tenant-level policy, the administrator must have the Azure DevOps Administrator role in Microsoft Entra ID.
      • That administrator can enable/disable the policy and manage the allowlist directly in the Azure DevOps Organization settings → Microsoft Entra ID blade.
      Therefore, the supported way to standardize and globally enable organization creation is to configure the Restrict organization creation policy and its allowlist as described above, rather than relying on Microsoft Support to change it.

    If users report they cannot create organizations, they should contact the administrator managing this tenant policy, as also indicated in the user-facing FAQ.


    References:

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.