You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In order to use custom images, you need to store them in a container registry. Azure Container Instances (ACR) is highly recommended for that. Due to its tight integration with ADE, the image can be published without allowing public anonymous pull access.
239
+
In order to use custom images, you need to store them in a container registry. Azure Container Registry (ACR) is highly recommended for that. Due to its tight integration with ADE, the image can be published without allowing public anonymous pull access.
240
240
241
241
It's also possible to store the image in a different container registry such as Docker Hub, but in that case it needs to be publicly accessible.
242
242
243
243
> [!Caution]
244
-
> Enabling anonymous (unauthenticated) pull access makes all registry content publicly available for read (pull) actions.
244
+
> Storing your container image in a registry with anonymous (unauthenticated) pull access makes it publicly accessible. Don't do that if your image contains any sensitive information. Instead, store it in Azure Container Registry (ACR) with anonymous pull access disabled.
245
245
246
-
To use a custom image stored in ACR, you need to ensure that ADE has appropriate permissions to access your image. Anonymous pull access is disabled by default in ACR.
246
+
To use a custom image stored in ACR, you need to ensure that ADE has appropriate permissions to access your image. When you create an ACR instance, it's secure by default and only allows authenticated users to gain access.
247
247
248
-
To create a registry, which can be done through the Azure CLI, the Azure portal, PowerShell commands, and more, follow one of the [quickstarts](/azure/container-registry/container-registry-get-started-azure-cli).
248
+
To create an instance of ACR, which can be done through the Azure CLI, the Azure portal, PowerShell commands, and more, follow one of the [quickstarts](/azure/container-registry/container-registry-get-started-azure-cli).
249
249
250
250
#### Use a public registry with anonymous pull
251
251
@@ -310,6 +310,7 @@ In this configuration, ADE uses the Managed Identity for the PET, whether system
310
310
311
311
> [!Tip]
312
312
> This role assignment has to be made for every project environment type. It can be automated through the Azure CLI.
313
+
313
314
When you're ready to push your image to your registry, run the following command:
0 commit comments