Skip to content

Commit d9e6af8

Browse files
authored
Merge pull request #106999 from cegraybl/cegraybl/tokens_ga_remove_premium
[container-registry] Remove references to 'Premium' SKU from Tokens and Scope Maps feature
2 parents 8026b8a + 41e5070 commit d9e6af8

File tree

1 file changed

+12
-13
lines changed

1 file changed

+12
-13
lines changed

articles/container-registry/container-registry-repository-scoped-permissions.md

Lines changed: 12 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Permissions to repositories in Azure Container Registry
3-
description: Create a token with permissions scoped to specific repositories in a Premium registry to pull or push images, or perform other actions
3+
description: Create a token with permissions scoped to specific repositories in a registry to pull or push images, or perform other actions
44
ms.topic: article
55
author: tejaswikolli-web
66
ms.author: tejaswikolli
@@ -11,24 +11,23 @@ ms.devlang: azurecli
1111

1212
# Create a token with repository-scoped permissions
1313

14-
This article describes how to create tokens and scope maps to manage access to specific repositories in your container registry. By creating tokens, a registry owner can provide users or services with scoped, time-limited access to repositories to pull or push images or perform other actions. A token provides more fine-grained permissions than other registry [authentication options](container-registry-authentication.md), which scope permissions to an entire registry.
14+
This article describes how to create tokens and scope maps to manage access to specific repositories in your container registry. By creating tokens, a registry owner can provide users or services with scoped, time-limited access to repositories to pull or push images or perform other actions. A token provides more fine-grained permissions than other registry [authentication options](container-registry-authentication.md), which scope permissions to an entire registry.
1515

1616
Scenarios for creating a token include:
1717

1818
* Allow IoT devices with individual tokens to pull an image from a repository
1919
* Provide an external organization with permissions to a specific repository
2020
* Limit repository access to different user groups in your organization. For example, provide write and read access to developers who build images that target specific repositories, and read access to teams that deploy from those repositories.
2121

22-
This feature is available in the **Premium** container registry service tier. For information about registry service tiers and limits, see [Azure Container Registry service tiers](container-registry-skus.md).
22+
This feature is available in all the service tiers. For information about registry service tiers and limits, see [Azure Container Registry service tiers](container-registry-skus.md)
2323

2424
## Limitations
2525

2626
* You can't currently assign repository-scoped permissions to an Azure Active Directory identity, such as a service principal or managed identity.
2727

28-
2928
## Concepts
3029

31-
To configure repository-scoped permissions, you create a *token* with an associated *scope map*.
30+
To configure repository-scoped permissions, you create a *token* with an associated *scope map*.
3231

3332
* A **token** along with a generated password lets the user authenticate with the registry. You can set an expiration date for a token password, or disable a token at any time.
3433

@@ -42,24 +41,24 @@ To configure repository-scoped permissions, you create a *token* with an associa
4241
|`metadata/read` | Read metadata from the repository | List tags or manifests |
4342
|`metadata/write` | Write metadata to the repository | Enable or disable read, write, or delete operations |
4443

45-
* A **scope map** groups the repository permissions you apply to a token, and can reapply to other tokens. Every token is associated with a single scope map.
44+
* A **scope map** groups the repository permissions you apply to a token, and can reapply to other tokens. Every token is associated with a single scope map.
4645

4746
With a scope map:
4847

49-
* Configure multiple tokens with identical permissions to a set of repositories
50-
* Update token permissions when you add or remove repository actions in the scope map, or apply a different scope map
48+
* Configure multiple tokens with identical permissions to a set of repositories
49+
* Update token permissions when you add or remove repository actions in the scope map, or apply a different scope map
5150

5251
Azure Container Registry also provides several system-defined scope maps you can apply when creating tokens. The permissions of system-defined scope maps apply to all repositories in your registry.The individual *actions* corresponds to the limit of [Repositories per scope map.](container-registry-skus.md)
5352

54-
The following image shows the relationship between tokens and scope maps.
53+
The following image shows the relationship between tokens and scope maps.
5554

5655
![Registry tokens and scope maps](media/container-registry-repository-scoped-permissions/token-scope-map-concepts.png)
5756

5857
## Prerequisites
5958

6059
* **Azure CLI** - Azure CLI command examples in this article require Azure CLI version 2.17.0 or later. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI](/cli/azure/install-azure-cli).
6160
* **Docker** - To authenticate with the registry to pull or push images, you need a local Docker installation. Docker provides installation instructions for [macOS](https://docs.docker.com/docker-for-mac/), [Windows](https://docs.docker.com/docker-for-windows/), and [Linux](https://docs.docker.com/engine/installation/#supported-platforms) systems.
62-
* **Container registry** - If you don't have one, create a Premium container registry in your Azure subscription, or upgrade an existing registry. For example, use the [Azure portal](container-registry-get-started-portal.md) or the [Azure CLI](container-registry-get-started-azure-cli.md).
61+
* **Container registry** - If you don't have one, create a container registry in your Azure subscription. For example, use the [Azure portal](container-registry-get-started-portal.md) or the [Azure CLI](container-registry-get-started-azure-cli.md).
6362

6463
## Create token - CLI
6564

@@ -165,7 +164,7 @@ After the token is validated and created, token details appear in the **Tokens**
165164

166165
### Add token password
167166

168-
To use a token created in the portal, you must generate a password. You can generate one or two passwords, and set an expiration date for each one. New passwords created for tokens are available immediately. Regenerating new passwords for tokens will take 60 seconds to replicate and be available.
167+
To use a token created in the portal, you must generate a password. You can generate one or two passwords, and set an expiration date for each one. New passwords created for tokens are available immediately. Regenerating new passwords for tokens will take 60 seconds to replicate and be available.
169168

170169
1. In the portal, navigate to your container registry.
171170
1. Under **Repository permissions**, select **Tokens**, and select a token.
@@ -401,7 +400,7 @@ In the portal, on the **Tokens** screen, select the token, and under **Scope map
401400
402401
## Disable or delete token
403402

404-
You might need to temporarily disable use of the token credentials for a user or service.
403+
You might need to temporarily disable use of the token credentials for a user or service.
405404

406405
Using the Azure CLI, run the [az acr token update][az-acr-token-update] command to set the `status` to `disabled`:
407406

@@ -412,7 +411,7 @@ az acr token update --name MyToken --registry myregistry \
412411

413412
In the portal, select the token in the **Tokens** screen, and select **Disabled** under **Status**.
414413

415-
To delete a token to permanently invalidate access by anyone using its credentials, run the [az acr token delete][az-acr-token-delete] command.
414+
To delete a token to permanently invalidate access by anyone using its credentials, run the [az acr token delete][az-acr-token-delete] command.
416415

417416
```azurecli
418417
az acr token delete --name MyToken --registry myregistry

0 commit comments

Comments
 (0)