You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-registry/container-registry-repository-scoped-permissions.md
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Permissions to repositories in Azure Container Registry
3
3
description: Create a token with permissions scoped to specific repositories in a registry to pull or push images, or perform other actions
4
4
ms.topic: article
5
-
ms.date: 05/22/2020
5
+
ms.date: 05/27/2020
6
6
---
7
7
8
8
# Create a token with repository-scoped permissions
@@ -48,7 +48,7 @@ To configure repository-scoped permissions, you create a *token* with an associa
48
48
* Configure multiple tokens with identical permissions to a set of repositories
49
49
* Update token permissions when you add or remove repository actions in the scope map, or apply a different scope map
50
50
51
-
Azure Container Registry also provides several system-defined scope maps you can apply, with fixed permissions across all repositories.
51
+
Azure Container Registry also provides several system-defined scope maps you can apply when creating tokens. The permissions of system-defined scope maps apply to all repositories in your registry.
52
52
53
53
The following image shows the relationship between tokens and scope maps.
54
54
@@ -175,12 +175,14 @@ To use a token created in the portal, you must generate a password. You can gene
175
175
176
176
## Authenticate with token
177
177
178
-
When a user or service uses a token to authenticate with the target registry, it provides the token name as a user name and one of its generated passwords. The authentication method depends on the configured action or actions associated with the token.
178
+
When a user or service uses a token to authenticate with the target registry, it provides the token name as a user name and one of its generated passwords.
179
+
180
+
The authentication method depends on the configured action or actions associated with the token.
179
181
180
182
|Action |How to authenticate |
181
183
|---------|---------|
182
-
|`content/delete`|`az acr repository delete` in Azure CLI|
183
-
|`content/read`|`docker login`<br/><br/>`az acr login` in Azure CLI |
@@ -202,7 +204,7 @@ docker tag hello-world myregistry.azurecr.io/samples/alpine:v1
202
204
203
205
### Authenticate using token
204
206
205
-
Run `docker login` to authenticate with the registry, Provide the token name as the user name, and provide one of its passwords. The token must have the `Enabled` status.
207
+
Run `docker login`or `az acr login`to authenticate with the registry to push or pull images. Provide the token name as the user name, and provide one of its passwords. The token must have the `Enabled` status.
206
208
207
209
The following example is formatted for the bash shell, and provides the values using environment variables.
208
210
@@ -341,7 +343,7 @@ az acr scope-map list \
341
343
--registry myregistry --output table
342
344
```
343
345
344
-
The output shows the scope maps you defined and several system-defined scope maps you can use to configure tokens:
346
+
The output shows the scope maps you defined and several system-defined scope maps that are also available to configure tokens. The permissions of system-defined scope maps apply to all repositories in your registry.
0 commit comments