Skip to content

Commit 41e5070

Browse files
committed
add line explaining the feature can be used from all SKUs
1 parent 3ca0748 commit 41e5070

File tree

1 file changed

+7
-5
lines changed

1 file changed

+7
-5
lines changed

articles/container-registry/container-registry-repository-scoped-permissions.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ Scenarios for creating a token include:
1919
* Provide an external organization with permissions to a specific repository
2020
* Limit repository access to different user groups in your organization. For example, provide write and read access to developers who build images that target specific repositories, and read access to teams that deploy from those repositories.
2121

22+
This feature is available in all the service tiers. For information about registry service tiers and limits, see [Azure Container Registry service tiers](container-registry-skus.md)
23+
2224
## Limitations
2325

2426
* You can't currently assign repository-scoped permissions to an Azure Active Directory identity, such as a service principal or managed identity.
@@ -39,7 +41,7 @@ To configure repository-scoped permissions, you create a *token* with an associa
3941
|`metadata/read` | Read metadata from the repository | List tags or manifests |
4042
|`metadata/write` | Write metadata to the repository | Enable or disable read, write, or delete operations |
4143

42-
* A **scope map** groups the repository permissions you apply to a token, and can reapply to other tokens. Every token is associated with a single scope map.
44+
* A **scope map** groups the repository permissions you apply to a token, and can reapply to other tokens. Every token is associated with a single scope map.
4345

4446
With a scope map:
4547

@@ -48,7 +50,7 @@ To configure repository-scoped permissions, you create a *token* with an associa
4850

4951
Azure Container Registry also provides several system-defined scope maps you can apply when creating tokens. The permissions of system-defined scope maps apply to all repositories in your registry.The individual *actions* corresponds to the limit of [Repositories per scope map.](container-registry-skus.md)
5052

51-
The following image shows the relationship between tokens and scope maps.
53+
The following image shows the relationship between tokens and scope maps.
5254

5355
![Registry tokens and scope maps](media/container-registry-repository-scoped-permissions/token-scope-map-concepts.png)
5456

@@ -162,7 +164,7 @@ After the token is validated and created, token details appear in the **Tokens**
162164

163165
### Add token password
164166

165-
To use a token created in the portal, you must generate a password. You can generate one or two passwords, and set an expiration date for each one. New passwords created for tokens are available immediately. Regenerating new passwords for tokens will take 60 seconds to replicate and be available.
167+
To use a token created in the portal, you must generate a password. You can generate one or two passwords, and set an expiration date for each one. New passwords created for tokens are available immediately. Regenerating new passwords for tokens will take 60 seconds to replicate and be available.
166168

167169
1. In the portal, navigate to your container registry.
168170
1. Under **Repository permissions**, select **Tokens**, and select a token.
@@ -398,7 +400,7 @@ In the portal, on the **Tokens** screen, select the token, and under **Scope map
398400
399401
## Disable or delete token
400402

401-
You might need to temporarily disable use of the token credentials for a user or service.
403+
You might need to temporarily disable use of the token credentials for a user or service.
402404

403405
Using the Azure CLI, run the [az acr token update][az-acr-token-update] command to set the `status` to `disabled`:
404406

@@ -409,7 +411,7 @@ az acr token update --name MyToken --registry myregistry \
409411

410412
In the portal, select the token in the **Tokens** screen, and select **Disabled** under **Status**.
411413

412-
To delete a token to permanently invalidate access by anyone using its credentials, run the [az acr token delete][az-acr-token-delete] command.
414+
To delete a token to permanently invalidate access by anyone using its credentials, run the [az acr token delete][az-acr-token-delete] command.
413415

414416
```azurecli
415417
az acr token delete --name MyToken --registry myregistry

0 commit comments

Comments
 (0)