You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-registry/container-registry-repository-scoped-permissions.md
+19-8Lines changed: 19 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Permissions to repositories in Azure Container Registry
3
3
description: Create a token with permissions scoped to specific repositories in a registry to pull or push images, or perform other actions
4
4
ms.topic: article
5
-
ms.date: 02/10/2020
5
+
ms.date: 02/13/2020
6
6
---
7
7
8
8
# Create a token with repository-scoped permissions
@@ -36,12 +36,17 @@ To configure repository-scoped permissions, you create a *token* with an associa
36
36
|`content/delete`| Remove data from the repository | Delete a repository or a manifest |
37
37
|`content/read`| Read data from the repository | Pull an artifact |
38
38
|`content/write`| Write data to the repository | Use with `content/read` to push an artifact |
39
-
|`metadata/read`| Read metadata from the repository | List tags or show manifest metadata|
40
-
|`metadata/write`| Write metadata to the repository |Update manifest attributes|
39
+
|`metadata/read`| Read metadata from the repository | List tags or manifests|
40
+
|`metadata/write`| Write metadata to the repository |Enable or disable read, write, or delete operations|
41
41
42
-
* A **scope map** groups the repository permissions you apply to a token, and can reapply to other tokens. A scope map helps you configure multiple tokens with identical permissions to a set of repositories.
42
+
* A **scope map** groups the repository permissions you apply to a token, and can reapply to other tokens. Every token is associated with a single scope map.
43
43
44
-
If you update a scope map you created, the permissions of the associated tokens are updated. Azure Container Registry also provides several system-defined scope maps, with fixed permissions across all repositories.
44
+
With a scope map:
45
+
46
+
* Configure multiple tokens with identical permissions to a set of repositories
47
+
* Update token permissions when you add or remove repository actions in the scope map, or apply a different scope map
48
+
49
+
Azure Container Registry also provides several system-defined scope maps you can apply, with fixed permissions across all repositories.
45
50
46
51
The following image shows the relationship between tokens and scope maps.
47
52
@@ -184,7 +189,7 @@ For the following examples, pull the `hello-world` and `alpine` images from Dock
184
189
docker pull hello-world
185
190
docker pull alpine
186
191
docker tag hello-world myregistry.azurecr.io/samples/hello-world:v1
187
-
docker tag hello-world myregistry.azurecr.io/samples/alpine:v1
192
+
docker tag hello-world myregistry.azurecr.io/samples/"alpine:v1
188
193
```
189
194
190
195
### Authenticate using token
@@ -381,7 +386,7 @@ In the portal, on the **Tokens (preview)** screen, select the token, and under *
381
386
> [!TIP]
382
387
> After updating a token with a new scope map, you might want to generate new token passwords. Use the [az acr token credential generate][az-acr-token-credential-generate] command or regenerate a token password in the Azure portal.
383
388
384
-
###Disable or delete token
389
+
## Disable or delete token
385
390
386
391
You might need to temporarily disable use of the token credentials for a user or service.
In the portal, selectthe token in the **Tokens (Preview)** screen, and select**Disabled** under **Status**.
396
401
397
-
To delete a token to permanently invalidate, access by anyone using its credentials, run the [az acr token delete][az-acr-token-delete] command. In the portal, select the token in the **Tokens (Preview)** screen, and select **Discard**.
402
+
To delete a token to permanently invalidate access by anyone using its credentials, run the [az acr token delete][az-acr-token-delete] command.
403
+
404
+
```azurecli
405
+
az acr token delete --name MyToken --registry myregistry
406
+
```
407
+
408
+
In the portal, selectthe token in the **Tokens (Preview)** screen, and select**Discard**.
0 commit comments