You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-registry/container-registry-auth-service-principal.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -105,6 +105,10 @@ To create a service principal that can authenticate with a container registry in
105
105
106
106
For example steps, see [Pull images from a container registry to an AKS cluster in a different AD tenant](authenticate-aks-cross-tenant.md).
107
107
108
+
## Service principal renewal
109
+
110
+
The service principal is created with one-year validity. You have options to extend the validity further than one year, or can provide expiry date of your choice using the [`az ad sp credential reset`](/cli/azure/ad/sp/credential#az-ad-sp-credential-reset) command.
111
+
108
112
## Next steps
109
113
110
114
* See the [authentication overview](container-registry-authentication.md) for other scenarios to authenticate with an Azure container registry.
Copy file name to clipboardExpand all lines: articles/container-registry/container-registry-authentication.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -134,7 +134,7 @@ The admin account is currently required for some scenarios to deploy an image fr
134
134
> The admin account is designed for a single user to access the registry, mainly for testing purposes. We do not recommend sharing the admin account credentials among multiple users. All users authenticating with the admin account appear as a single user with push and pull access to the registry. Changing or disabling this account disables registry access for all users who use its credentials. Individual identity is recommended for users and service principals for headless scenarios.
135
135
>
136
136
137
-
The admin account is provided with two passwords, both of which can be regenerated. Two passwords allow you to maintain connection to the registry by using one password while you regenerate the other. If the admin account is enabled, you can pass the username and either password to the `docker login` command when prompted for basic authentication to the registry. For example:
137
+
The admin account is provided with two passwords, both of which can be regenerated. New passwords created for admin accounts are available immediately. Regenerating passwords for admin accounts will take 60 seconds to replicate and be available. Two passwords allow you to maintain connection to the registry by using one password while you regenerate the other. If the admin account is enabled, you can pass the username and either password to the `docker login` command when prompted for basic authentication to the registry. For example:
Copy file name to clipboardExpand all lines: articles/container-registry/container-registry-repository-scoped-permissions.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ This feature is available in the **Premium** container registry service tier. Fo
31
31
32
32
To configure repository-scoped permissions, you create a *token* with an associated *scope map*.
33
33
34
-
* A **token** along with a generated password lets the user authenticate with the registry. You can set an expiration date for a token password, or disable a token at any time.
34
+
* A **token** along with a generated password lets the user authenticate with the registry. You can set an expiration date for a token password, or disable a token at any time.
35
35
36
36
After authenticating with a token, the user or service can perform one or more *actions* scoped to one or more repositories.
37
37
@@ -166,7 +166,7 @@ After the token is validated and created, token details appear in the **Tokens**
166
166
167
167
### Add token password
168
168
169
-
To use a token created in the portal, you must generate a password. You can generate one or two passwords, and set an expiration date for each one.
169
+
To use a token created in the portal, you must generate a password. You can generate one or two passwords, and set an expiration date for each one. New passwords created for tokens are available immediately. Regenerating new passwords for tokens will take 60 seconds to replicate and be available.
170
170
171
171
1. In the portal, navigate to your container registry.
172
172
1. Under **Repository permissions**, select **Tokens (Preview)**, and select a token.
@@ -374,7 +374,7 @@ az acr token list --registry myregistry --output table
374
374
375
375
### Regenerate token passwords
376
376
377
-
If you didn't generate a token password, or you want to generate new passwords, run the [az acr token credential generate][az-acr-token-credential-generate] command.
377
+
If you didn't generate a token password, or you want to generate new passwords, run the [az acr token credential generate][az-acr-token-credential-generate] command.Regenerating new passwords for tokens will take 60 seconds to replicate and be available.
378
378
379
379
The following example generates a new value for password1 for the *MyToken* token, with an expiration period of 30 days. It stores the password in the environment variable `TOKEN_PWD`. This example is formatted for the bash shell.
380
380
@@ -448,4 +448,4 @@ In the portal, select the token in the **Tokens (Preview)** screen, and select *
0 commit comments