Skip to content

Commit 2d82f7d

Browse files
authored
Merge pull request #225610 from tejaswikolli-web/tokenandscope
Edits for removing preview tag.
2 parents e0c369f + 41f7500 commit 2d82f7d

File tree

6 files changed

+21
-23
lines changed

6 files changed

+21
-23
lines changed

articles/container-registry/container-registry-repository-scoped-permissions.md

Lines changed: 15 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -21,13 +21,10 @@ Scenarios for creating a token include:
2121

2222
This feature is available in the **Premium** container registry service tier. For information about registry service tiers and limits, see [Azure Container Registry service tiers](container-registry-skus.md).
2323

24-
> [!IMPORTANT]
25-
> This feature is currently in preview, and some [limitations apply](#preview-limitations). Previews are made available to you on the condition that you agree to the [supplemental terms of use][terms-of-use]. Some aspects of this feature may change prior to general availability (GA).
26-
27-
## Preview limitations
24+
## Limitations
2825

2926
* You can't currently assign repository-scoped permissions to an Azure Active Directory identity, such as a service principal or managed identity.
30-
* You can't create a scope map in a registry enabled for [anonymous pull access](container-registry-faq.yml#how-do-i-enable-anonymous-pull-access-).
27+
3128

3229
## Concepts
3330

@@ -60,7 +57,7 @@ The following image shows the relationship between tokens and scope maps.
6057

6158
## Prerequisites
6259

63-
* **Azure CLI** - Azure CLI commands command examples in this article require Azure CLI version 2.17.0 or later. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI](/cli/azure/install-azure-cli).
60+
* **Azure CLI** - Azure CLI command examples in this article require Azure CLI version 2.17.0 or later. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI](/cli/azure/install-azure-cli).
6461
* **Docker** - To authenticate with the registry to pull or push images, you need a local Docker installation. Docker provides installation instructions for [macOS](https://docs.docker.com/docker-for-mac/), [Windows](https://docs.docker.com/docker-for-windows/), and [Linux](https://docs.docker.com/engine/installation/#supported-platforms) systems.
6562
* **Container registry** - If you don't have one, create a Premium container registry in your Azure subscription, or upgrade an existing registry. For example, use the [Azure portal](container-registry-get-started-portal.md) or the [Azure CLI](container-registry-get-started-azure-cli.md).
6663

@@ -150,7 +147,7 @@ You can use the Azure portal to create tokens and scope maps. As with the `az ac
150147
The following example creates a token, and creates a scope map with the following permissions on the `samples/hello-world` repository: `content/write` and `content/read`.
151148

152149
1. In the portal, navigate to your container registry.
153-
1. Under **Repository permissions**, select **Tokens (Preview) > +Add**.
150+
1. Under **Repository permissions**, select **Tokens > +Add**.
154151

155152
:::image type="content" source="media/container-registry-repository-scoped-permissions/portal-token-add.png" alt-text="Create token in portal":::
156153
1. Enter a token name.
@@ -171,7 +168,7 @@ After the token is validated and created, token details appear in the **Tokens**
171168
To use a token created in the portal, you must generate a password. You can generate one or two passwords, and set an expiration date for each one. New passwords created for tokens are available immediately. Regenerating new passwords for tokens will take 60 seconds to replicate and be available.
172169

173170
1. In the portal, navigate to your container registry.
174-
1. Under **Repository permissions**, select **Tokens (Preview)**, and select a token.
171+
1. Under **Repository permissions**, select **Tokens**, and select a token.
175172
1. In the token details, select **password1** or **password2**, and select the Generate icon.
176173
1. In the password screen, optionally set an expiration date for the password, and select **Generate**. It's recommended to set an expiration date.
177174
1. After generating a password, copy and save it to a safe location. You can't retrieve a generated password after closing the screen, but you can generate a new one.
@@ -259,7 +256,7 @@ az acr scope-map update \
259256
In the Azure portal:
260257

261258
1. Navigate to your container registry.
262-
1. Under **Repository permissions**, select **Scope maps (Preview)**, and select the scope map to update.
259+
1. Under **Repository permissions**, select **Scope maps**, and select the scope map to update.
263260
1. Under **Repositories**, enter `samples/nginx`, and under **Permissions**, select `content/read` and `content/write`. Then select **+Add**.
264261
1. Under **Repositories**, select `samples/hello-world` and under **Permissions**, deselect `content/write`. Then select **Save**.
265262

@@ -341,7 +338,7 @@ Sample output:
341338

342339
### List scope maps
343340

344-
Use the [az acr scope-map list][az-acr-scope-map-list] command, or the **Scope maps (Preview)** screen in the portal, to list all the scope maps configured in a registry. For example:
341+
Use the [az acr scope-map list][az-acr-scope-map-list] command, or the **Scope maps** screen in the portal, to list all the scope maps configured in a registry. For example:
345342

346343
```azurecli
347344
az acr scope-map list \
@@ -361,22 +358,22 @@ MyScopeMap UserDefined 2019-11-15T21:17:34Z Sample scope map
361358

362359
### Show token details
363360

364-
To view the details of a token, such as its status and password expiration dates, run the [az acr token show][az-acr-token-show] command, or select the token in the **Tokens (Preview)** screen in the portal. For example:
361+
To view the details of a token, such as its status and password expiration dates, run the [az acr token show][az-acr-token-show] command, or select the token in the **Tokens** screen in the portal. For example:
365362

366363
```azurecli
367364
az acr scope-map show \
368365
--name MyScopeMap --registry myregistry
369366
```
370367

371-
Use the [az acr token list][az-acr-token-list] command, or the **Tokens (Preview)** screen in the portal, to list all the tokens configured in a registry. For example:
368+
Use the [az acr token list][az-acr-token-list] command, or the **Tokens** screen in the portal, to list all the tokens configured in a registry. For example:
372369

373370
```azurecli
374371
az acr token list --registry myregistry --output table
375372
```
376373

377374
### Regenerate token passwords
378375

379-
If you didn't generate a token password, or you want to generate new passwords, run the [az acr token credential generate][az-acr-token-credential-generate] command.Regenerating new passwords for tokens will take 60 seconds to replicate and be available.
376+
If you didn't generate a token password, or you want to generate new passwords, run the [az acr token credential generate][az-acr-token-credential-generate] command. Regenerating new passwords for tokens will take 60 seconds to replicate and be available.
380377

381378
The following example generates a new value for password1 for the *MyToken* token, with an expiration period of 30 days. It stores the password in the environment variable `TOKEN_PWD`. This example is formatted for the bash shell.
382379

@@ -397,7 +394,7 @@ az acr token update --name MyToken --registry myregistry \
397394
--scope-map MyNewScopeMap
398395
```
399396

400-
In the portal, on the **Tokens (preview)** screen, select the token, and under **Scope map**, select a different scope map.
397+
In the portal, on the **Tokens** screen, select the token, and under **Scope map**, select a different scope map.
401398

402399
> [!TIP]
403400
> After updating a token with a new scope map, you might want to generate new token passwords. Use the [az acr token credential generate][az-acr-token-credential-generate] command or regenerate a token password in the Azure portal.
@@ -413,15 +410,15 @@ az acr token update --name MyToken --registry myregistry \
413410
--status disabled
414411
```
415412

416-
In the portal, select the token in the **Tokens (Preview)** screen, and select **Disabled** under **Status**.
413+
In the portal, select the token in the **Tokens** screen, and select **Disabled** under **Status**.
417414

418415
To delete a token to permanently invalidate access by anyone using its credentials, run the [az acr token delete][az-acr-token-delete] command.
419416

420417
```azurecli
421418
az acr token delete --name MyToken --registry myregistry
422419
```
423420

424-
In the portal, select the token in the **Tokens (Preview)** screen, and select **Discard**.
421+
In the portal, select the token in the **Tokens** screen, and select **Discard**.
425422

426423
## Next steps
427424

@@ -430,7 +427,7 @@ In the portal, select the token in the **Tokens (Preview)** screen, and select *
430427
* Learn about [connected registries](intro-connected-registry.md) and using tokens for [access](overview-connected-registry-access.md).
431428

432429
<!-- LINKS - External -->
433-
[terms-of-use]: https://azure.microsoft.com/support/legal/preview-supplemental-terms/
430+
434431

435432
<!-- LINKS - Internal -->
436433
[az-acr-login]: /cli/azure/acr#az_acr_login
@@ -450,4 +447,4 @@ In the portal, select the token in the **Tokens (Preview)** screen, and select *
450447
[az-acr-token-delete]: /cli/azure/acr/token/#az_acr_token_delete
451448
[az-acr-token-create]: /cli/azure/acr/token/#az_acr_token_create
452449
[az-acr-token-update]: /cli/azure/acr/token/#az_acr_token_update
453-
[az-acr-token-credential-generate]: /cli/azure/acr/token/credential/#az_acr_token_credential_generate
450+
[az-acr-token-credential-generate]: /cli/azure/acr/token/credential/#az_acr_token_credential_generate

articles/container-registry/container-registry-roles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,4 +146,4 @@ To create or update a custom role using the JSON description, use the [Azure CLI
146146

147147
* Learn about [authentication options](container-registry-authentication.md) for Azure Container Registry.
148148

149-
* Learn about enabling [repository-scoped permissions](container-registry-repository-scoped-permissions.md) (preview) in a container registry.
149+
* Learn about enabling [repository-scoped permissions](container-registry-repository-scoped-permissions.md) in a container registry.
-9.39 KB
Loading
-12.9 KB
Loading
-9.83 KB
Loading

includes/container-registry-limits.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,10 +30,11 @@ ms.custom: include file
3030
| Service endpoint VNet access | N/A | N/A | [Preview][vnet] |
3131
| &bull; Virtual network rules | N/A | N/A | 100 |
3232
| Customer-managed keys | N/A | N/A | [Supported][cmk] |
33-
| Repository-scoped permissions | N/A | N/A | [Preview][token]|
34-
| &bull; Tokens | N/A | N/A | 20,000 |
35-
| &bull; Scope maps | N/A | N/A | 20,000 |
36-
| &bull; Repositories per scope map<sup>5</sup> | N/A | N/A | 500 |
33+
| Repository-scoped permissions | [Supported][token] | [Supported][token] | [Supported][token]|
34+
| &bull; Tokens | 100 | 500 | 50,000 |
35+
| &bull; Scope maps | 100 | 500 | 50,000 |
36+
| &bull; Actions| 500 | 500 | 500 |
37+
| &bull; Repositories per scope map<sup>5</sup> | 500 | 500 | 500 |
3738
| Anonymous pull access | N/A | [Preview][anonymous-pull-access] | [Preview][anonymous-pull-access] |
3839

3940

0 commit comments

Comments
 (0)