1. Prerequisites
5 minGather required information and create the necessary tokens before running the pipeline.
View detailed actions
- You will need your Azure Subscription ID, ADO Organization URL, ADO Project Name, GitHub Organization, and GitHub Repository.
- You will need an AI provider API key — at least one of: Anthropic (Claude) or OpenAI. The pipeline stores it securely in Key Vault and configures the Function App — the AI is not called during setup itself, only wired in so it’s ready for your first story. Google Gemini can be added post-setup in Function App configuration.
- Create an Azure Service Connection in your ADO project (Project Settings → Service connections → New service connection). This is required — the pipeline uses it to authenticate with Azure and deploy the Resource Group, Key Vault, Storage Account, and Function App on your behalf. When prompted, select Azure Resource Manager → Identity type: App registration (automatic) → Credential: Workload identity federation — the modern, credential-free option. Set scope to Subscription, leave Resource Group blank, and check “Grant access permission to all pipelines”. For the connection name use something like
adom8-azure-deploy— this becomes yourAZURE_SERVICE_CONNECTIONpipeline variable. - Create an ADO Onboarding PAT by following these steps:
- 1Click your avatar (top-right) then select User settings
- 2Click Personal access tokens
- 3Click + New Token
- 4Set Name:
Adom8-Agent-Bot· Expiration: 30 days · Scopes: Custom defined - 5Check: Work Items (Read & write), Code (Read & write), Build (Read & execute), Release (Read, write, & execute)
- 6Click “Show all scopes” and also check: Project and Team (Read, write, & manage), Service Connections (Read, query, & manage)
- 7Click Create. ⚠ Copy the token immediately — it will not be shown again. Paste it into the checklist scratch pad now.
- Create a Fine-grained GitHub PAT. This is always created on your personal GitHub account — even if the repo is inside an organization.
- 1Go to your personal GitHub Settings
- 2Scroll to the bottom of the left sidebar and click Developer settings
- 3Click Fine-grained tokens → Generate new token
- 4Fill in Token name (e.g.
adom8-pipeline), add a description, and set Expiration to 90 days (best practice — avoid “No expiration”). - 5Resource owner: if the repo is in an organization, select the organization here (not your personal account). ⚠ The org owner must have enabled fine-grained PATs first — they can do this in Org Settings → Third-party Access → Personal access tokens → Allow fine-grained tokens.
- 6Under Repository access select Only select repositories and choose your target repo.
- 7Under Permissions grant Read & write to: Contents, Pull requests, Issues, Webhooks, Secrets. (Secrets is required so the pipeline can automatically write
AZURE_FUNCTIONAPP_NAME,AZURE_FUNCTIONAPP_PUBLISH_PROFILE, andAZURE_STATIC_WEB_APPS_API_TOKENto your repo — no manual secret setup needed.) - 8Click Generate token. ⚠ Copy the token immediately — GitHub will never show it again. Paste it into the checklist scratch pad now.
- Copy both tokens immediately after creation — you will not be able to see them again.