Skip to content

Commit 321ee8c

Browse files
committed
review comments
1 parent a18a357 commit 321ee8c

File tree

1 file changed

+9
-7
lines changed

1 file changed

+9
-7
lines changed

articles/container-registry/container-registry-repository-scoped-permissions.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Permissions to repositories in Azure Container Registry
33
description: Create a token with permissions scoped to specific repositories in a registry to pull or push images, or perform other actions
44
ms.topic: article
5-
ms.date: 05/22/2020
5+
ms.date: 05/27/2020
66
---
77

88
# Create a token with repository-scoped permissions
@@ -48,7 +48,7 @@ To configure repository-scoped permissions, you create a *token* with an associa
4848
* Configure multiple tokens with identical permissions to a set of repositories
4949
* Update token permissions when you add or remove repository actions in the scope map, or apply a different scope map
5050

51-
Azure Container Registry also provides several system-defined scope maps you can apply, with fixed permissions across all repositories.
51+
Azure Container Registry also provides several system-defined scope maps you can apply when creating tokens. The permissions of system-defined scope maps apply to all repositories in your registry.
5252

5353
The following image shows the relationship between tokens and scope maps.
5454

@@ -175,12 +175,14 @@ To use a token created in the portal, you must generate a password. You can gene
175175

176176
## Authenticate with token
177177

178-
When a user or service uses a token to authenticate with the target registry, it provides the token name as a user name and one of its generated passwords. The authentication method depends on the configured action or actions associated with the token.
178+
When a user or service uses a token to authenticate with the target registry, it provides the token name as a user name and one of its generated passwords.
179+
180+
The authentication method depends on the configured action or actions associated with the token.
179181

180182
|Action |How to authenticate |
181183
|---------|---------|
182-
|`content/delete` | `az acr repository delete` in Azure CLI |
183-
|`content/read` | `docker login`<br/><br/>`az acr login` in Azure CLI |
184+
|`content/delete` | `az acr repository delete` in Azure CLI<br/><br/>Example: `az acr repository delete --name myregistry --repository myrepo --username MyToken --password xxxxxxxxxx`|
185+
|`content/read` | `docker login`<br/><br/>`az acr login` in Azure CLI<br/><br/>Example: `az acr login --name myregistry --username MyToken --password xxxxxxxxxx` |
184186
|`content/write` | `docker login`<br/><br/>`az acr login` in Azure CLI |
185187
|`metadata/read` | `az acr repository show`<br/><br/>`az acr repository show-tags`<br/><br/>`az acr repository show-manifests` in Azure CLI |
186188
|`metadata/write` | `az acr repository untag`<br/><br/>`az acr repository update` in Azure CLI |
@@ -202,7 +204,7 @@ docker tag hello-world myregistry.azurecr.io/samples/alpine:v1
202204

203205
### Authenticate using token
204206

205-
Run `docker login` to authenticate with the registry, Provide the token name as the user name, and provide one of its passwords. The token must have the `Enabled` status.
207+
Run `docker login` or `az acr login` to authenticate with the registry to push or pull images. Provide the token name as the user name, and provide one of its passwords. The token must have the `Enabled` status.
206208

207209
The following example is formatted for the bash shell, and provides the values using environment variables.
208210

@@ -341,7 +343,7 @@ az acr scope-map list \
341343
--registry myregistry --output table
342344
```
343345

344-
The output shows the scope maps you defined and several system-defined scope maps you can use to configure tokens:
346+
The output shows the scope maps you defined and several system-defined scope maps that are also available to configure tokens. The permissions of system-defined scope maps apply to all repositories in your registry.
345347

346348
```
347349
NAME TYPE CREATION DATE DESCRIPTION

0 commit comments

Comments
 (0)