

It inherently could be a target for Remote Code Execution (RCE) attacks. The Azure Pipelines agent is a software product designed to execute code it downloads from external sources. The folders controlled by the agent should be restricted to as few users as possible and they contain secrets that could be decrypted or exfiltrated. The user configuring the agent needs pool admin permissions, but the user running the agent does not. Prepare permissions Information security for self-hosted agents On the other hand, the bulk of the Azure DevOps code is built by 24-core server class machines It's not possible to make a general recommendation that will apply to everyone.Īs a point of reference, the Azure DevOps team builds the hosted agents code using pipelines that utilize hosted agents. The hardware specs for your agents will vary with your needs, team size, etc. You should run agent setup manually the first time.Īfter you get a feel for how agents work, or if you want to automate setting up many agents, consider using unattended config. Recommended - Visual Studio build tools (2015 or higher).
#DOWNLOAD BITCASA FOR WINDOWS INSTALL#
#DOWNLOAD BITCASA FOR WINDOWS HOW TO#
This article describes how to configure a self-hosted agent.
