Skip to content

Commit 8dbab82

Browse files
authored
Merge pull request #190535 from tejaswikolli-web/main
service-principal-renewal
2 parents 8f5511e + f6f3445 commit 8dbab82

File tree

4 files changed

+11
-7
lines changed

4 files changed

+11
-7
lines changed

articles/container-registry/container-registry-auth-service-principal.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,10 @@ To create a service principal that can authenticate with a container registry in
105105

106106
For example steps, see [Pull images from a container registry to an AKS cluster in a different AD tenant](authenticate-aks-cross-tenant.md).
107107

108+
## Service principal renewal
109+
110+
The service principal is created with one-year validity. You have options to extend the validity further than one year, or can provide expiry date of your choice using the [`az ad sp credential reset`](/cli/azure/ad/sp/credential#az-ad-sp-credential-reset) command.
111+
108112
## Next steps
109113

110114
* See the [authentication overview](container-registry-authentication.md) for other scenarios to authenticate with an Azure container registry.

articles/container-registry/container-registry-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ The admin account is currently required for some scenarios to deploy an image fr
134134
> The admin account is designed for a single user to access the registry, mainly for testing purposes. We do not recommend sharing the admin account credentials among multiple users. All users authenticating with the admin account appear as a single user with push and pull access to the registry. Changing or disabling this account disables registry access for all users who use its credentials. Individual identity is recommended for users and service principals for headless scenarios.
135135
>
136136
137-
The admin account is provided with two passwords, both of which can be regenerated. Two passwords allow you to maintain connection to the registry by using one password while you regenerate the other. If the admin account is enabled, you can pass the username and either password to the `docker login` command when prompted for basic authentication to the registry. For example:
137+
The admin account is provided with two passwords, both of which can be regenerated. New passwords created for admin accounts are available immediately. Regenerating passwords for admin accounts will take 60 seconds to replicate and be available. Two passwords allow you to maintain connection to the registry by using one password while you regenerate the other. If the admin account is enabled, you can pass the username and either password to the `docker login` command when prompted for basic authentication to the registry. For example:
138138

139139
```
140140
docker login myregistry.azurecr.io

articles/container-registry/container-registry-repository-scoped-permissions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ This feature is available in the **Premium** container registry service tier. Fo
3131

3232
To configure repository-scoped permissions, you create a *token* with an associated *scope map*.
3333

34-
* A **token** along with a generated password lets the user authenticate with the registry. You can set an expiration date for a token password, or disable a token at any time.
34+
* A **token** along with a generated password lets the user authenticate with the registry. You can set an expiration date for a token password, or disable a token at any time.
3535

3636
After authenticating with a token, the user or service can perform one or more *actions* scoped to one or more repositories.
3737

@@ -166,7 +166,7 @@ After the token is validated and created, token details appear in the **Tokens**
166166

167167
### Add token password
168168

169-
To use a token created in the portal, you must generate a password. You can generate one or two passwords, and set an expiration date for each one.
169+
To use a token created in the portal, you must generate a password. You can generate one or two passwords, and set an expiration date for each one. New passwords created for tokens are available immediately. Regenerating new passwords for tokens will take 60 seconds to replicate and be available.
170170

171171
1. In the portal, navigate to your container registry.
172172
1. Under **Repository permissions**, select **Tokens (Preview)**, and select a token.
@@ -374,7 +374,7 @@ az acr token list --registry myregistry --output table
374374

375375
### Regenerate token passwords
376376

377-
If you didn't generate a token password, or you want to generate new passwords, run the [az acr token credential generate][az-acr-token-credential-generate] command.
377+
If you didn't generate a token password, or you want to generate new passwords, run the [az acr token credential generate][az-acr-token-credential-generate] command.Regenerating new passwords for tokens will take 60 seconds to replicate and be available.
378378

379379
The following example generates a new value for password1 for the *MyToken* token, with an expiration period of 30 days. It stores the password in the environment variable `TOKEN_PWD`. This example is formatted for the bash shell.
380380

@@ -448,4 +448,4 @@ In the portal, select the token in the **Tokens (Preview)** screen, and select *
448448
[az-acr-token-delete]: /cli/azure/acr/token/#az_acr_token_delete
449449
[az-acr-token-create]: /cli/azure/acr/token/#az_acr_token_create
450450
[az-acr-token-update]: /cli/azure/acr/token/#az_acr_token_update
451-
[az-acr-token-credential-generate]: /cli/azure/acr/token/credential/#az_acr_token_credential_generate
451+
[az-acr-token-credential-generate]: /cli/azure/acr/token/credential/#az_acr_token_credential_generate

docfx.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -648,7 +648,7 @@
648648
"articles/cognitive-services/Translator/**/*.md": "lajanuar",
649649
"articles/connectors/*.md": "estfan",
650650
"articles/container-instances/**/*.md": "macolso",
651-
"articles/container-registry/**/*.md": "danlep",
651+
"articles/container-registry/**/*.md": "tejaswikolli",
652652
"articles/data-lake-analytics/*.md": "xujiang1",
653653
"articles/defender-for-cloud/*.md": "elkrieger",
654654
"articles/defender-for-iot/organizations/*.md": "shhazam",
@@ -1226,4 +1226,4 @@
12261226
}
12271227

12281228
}
1229-
}
1229+
}

0 commit comments

Comments
 (0)