Skip to content

Commit 2defa7d

Browse files
authored
Merge branch 'docker:main' into patch-3
2 parents 66e9554 + e377628 commit 2defa7d

File tree

12 files changed

+356
-80
lines changed

12 files changed

+356
-80
lines changed

content/get-started/docker-concepts/the-basics/what-is-an-image.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -32,9 +32,9 @@ These two principles let you to extend or add to existing images. For example, i
3232

3333
Docker Hub provides a variety of Docker-supported and endorsed images known as Docker Trusted Content. These provide fully managed services or great starters for your own images. These include:
3434

35-
- [Docker Official Images](https://hub.docker.com/search?q=&type=image&image_filter=official) - a curated set of Docker repositories, serve as the starting point for the majority of users, and are some of the most secure on Docker Hub
36-
- [Docker Verified Publishers](https://hub.docker.com/search?q=&image_filter=store) - high-quality images from commercial publishers verified by Docker
37-
- [Docker-Sponsored Open Source](https://hub.docker.com/search?q=&image_filter=open_source) - images published and maintained by open-source projects sponsored by Docker through Docker's open source program
35+
- [Docker Official Images](https://hub.docker.com/search?badges=official) - a curated set of Docker repositories, serve as the starting point for the majority of users, and are some of the most secure on Docker Hub
36+
- [Docker Verified Publishers](https://hub.docker.com/search?badges=verified_publisher) - high-quality images from commercial publishers verified by Docker
37+
- [Docker-Sponsored Open Source](https://hub.docker.com/search?badges=open_source) - images published and maintained by open-source projects sponsored by Docker through Docker's open source program
3838

3939
For example, [Redis](https://hub.docker.com/_/redis) and [Memcached](https://hub.docker.com/_/memcached) are a few popular ready-to-go Docker Official Images. You can download these images and have these services up and running in a matter of seconds. There are also base images, like the [Node.js](https://hub.docker.com/_/node) Docker image, that you can use as a starting point and add your own files and configurations.
4040

content/get-started/introduction/build-and-push-first-image.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ In [Develop with containers](develop-with-containers.md), you used the following
4040
- [phpmyadmin](https://hub.docker.com/_/phpmyadmin) - provides phpMyAdmin, a web-based interface to the MySQL database
4141
- [traefik](https://hub.docker.com/_/traefik) - provides Traefik, a modern HTTP reverse proxy and load balancer that routes requests to the appropriate container based on routing rules
4242

43-
Explore the full catalog of [Docker Official Images](https://hub.docker.com/search?image_filter=official&q=), [Docker Verified Publishers](https://hub.docker.com/search?q=&image_filter=store), and [Docker Sponsored Open Source Software](https://hub.docker.com/search?q=&image_filter=open_source) images to see more of what there is to run and build on.
43+
Explore the full catalog of [Docker Official Images](https://hub.docker.com/search?badges=official), [Docker Verified Publishers](https://hub.docker.com/search?badges=verified_publisher), and [Docker Sponsored Open Source Software](https://hub.docker.com/search?badges=open_source) images to see more of what there is to run and build on.
4444

4545
## Try it out
4646

content/manuals/build/building/best-practices.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,17 +45,17 @@ The first step towards achieving a secure image is to choose the right base
4545
image. When choosing an image, ensure it's built from a trusted source and keep
4646
it small.
4747

48-
- [Docker Official Images](https://hub.docker.com/search?image_filter=official)
48+
- [Docker Official Images](https://hub.docker.com/search?badges=official)
4949
are a curated collection that have clear documentation, promote best
5050
practices, and are regularly updated. They provide a trusted starting point
5151
for many applications.
5252

53-
- [Verified Publisher](https://hub.docker.com/search?image_filter=store) images
53+
- [Verified Publisher](https://hub.docker.com/search?badges=verified_publisher) images
5454
are high-quality images published and maintained by the organizations
5555
partnering with Docker, with Docker verifying the authenticity of the content
5656
in their repositories.
5757

58-
- [Docker-Sponsored Open Source](https://hub.docker.com/search?image_filter=open_source)
58+
- [Docker-Sponsored Open Source](https://hub.docker.com/search?badges=open_source)
5959
are published and maintained by open source projects sponsored by Docker
6060
through an [open source program](../../docker-hub/image-library/trusted-content.md#docker-sponsored-open-source-software-images).
6161

content/manuals/build/concepts/dockerfile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@ use this notation to name your images. There are many public images you can
148148
leverage in your projects, by importing them into your build steps using the
149149
Dockerfile `FROM` instruction.
150150

151-
[Docker Hub](https://hub.docker.com/search?image_filter=official&q=&type=image)
151+
[Docker Hub](https://hub.docker.com/search?badges=official)
152152
contains a large set of official images that you can use for this purpose.
153153

154154
### Environment setup

content/manuals/docker-hub/release-notes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,13 +47,13 @@ known issues for each Docker Hub release.
4747

4848
## 2023-08-28
4949

50-
- Organizations with SSO enabled can assign members to roles, organizations, and teams with [SCIM role mapping](scim.md#set-up-role-mapping).
50+
- Organizations with SSO enabled can assign members to roles, organizations, and teams with [SCIM role mapping](scim.md#set-up-role-mapping).
5151

5252
## 2023-07-26
5353

5454
### New
5555

56-
- Organizations can assign the [editor role](roles-and-permissions.md) to members to grant additional permissions without full administrative access.
56+
- Organizations can assign the [editor role](/manuals/enterprise/security/roles-and-permissions/_index.md) to members to grant additional permissions without full administrative access.
5757

5858
## 2023-05-09
5959

content/manuals/docker-hub/repos/manage/trusted-content/dsos-program.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ aliases:
77
- /trusted-content/dsos-program/
88
---
99

10-
[Docker-Sponsored Open Source images](https://hub.docker.com/search?q=&image_filter=open_source) are published and maintained by open-source projects sponsored by Docker through the program.
10+
[Docker-Sponsored Open Source images](https://hub.docker.com/search?badges=open_source) are published and maintained by open-source projects sponsored by Docker through the program.
1111

1212
Images that are part of this program have a special badge on Docker Hub making it easier for users to identify projects that Docker has verified as trusted, secure, and active open-source projects.
1313

content/manuals/docker-hub/repos/manage/trusted-content/dvp-program.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ toc_max: 2
1818
---
1919

2020
[The Docker Verified Publisher
21-
Program](https://hub.docker.com/search?q=&image_filter=store) provides
21+
Program](https://hub.docker.com/search?badges=verified_publisher) provides
2222
high-quality images from commercial publishers verified by Docker.
2323

2424
These images help development teams build secure software supply chains,

content/manuals/engine/install/debian.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -116,10 +116,14 @@ Docker from the repository.
116116
sudo chmod a+r /etc/apt/keyrings/docker.asc
117117

118118
# Add the repository to Apt sources:
119-
echo \
120-
"deb [arch=$(dpkg --print-architecture) signed-by=/etc/apt/keyrings/docker.asc] {{% param "download-url-base" %}} \
121-
$(. /etc/os-release && echo "$VERSION_CODENAME") stable" | \
122-
sudo tee /etc/apt/sources.list.d/docker.list > /dev/null
119+
sudo tee /etc/apt/sources.list.d/docker.sources <<EOF
120+
Types: deb
121+
URIs: {{% param "download-url-base" %}}
122+
Suites: $(. /etc/os-release && echo "$VERSION_CODENAME")
123+
Components: stable
124+
Signed-By: /etc/apt/keyrings/docker.asc
125+
EOF
126+
123127
sudo apt-get update
124128
```
125129
Lines changed: 74 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,74 @@
1+
---
2+
title: Roles and permissions
3+
linkTitle: Roles and permissions
4+
description: Control access to content, registry, and organization management with Docker's role system
5+
keywords: roles, permissions, custom roles, core roles, access control, organization management, docker hub, admin console, security
6+
tags: [admin]
7+
aliases:
8+
- /admin/organization/roles/
9+
- /security/for-admins/roles-and-permissions/
10+
grid:
11+
- title: "Core roles"
12+
description: Learn about Docker's built-in Member, Editor, and Owner roles with predefined permissions.
13+
icon: "admin_panel_settings"
14+
link: /enterprise/security/roles-and-permissions/core-roles/
15+
- title: "Custom roles"
16+
description: Create tailored permission sets that match your organization's specific needs.
17+
icon: "tune"
18+
link: /enterprise/security/roles-and-permissions/custom-roles/
19+
weight: 40
20+
---
21+
22+
{{< summary-bar feature_name="General admin" >}}
23+
24+
Roles control what users can do in your Docker organization. When you invite users or create teams, you assign them roles that determine their permissions for repositories, teams, and organization settings.
25+
26+
Docker provides two types of roles to meet different organizational needs:
27+
28+
- [Core roles](/manuals/enterprise/security/roles-and-permissions/core-roles.md) with predefined permissions
29+
- [Custom roles](/manuals/enterprise/security/roles-and-permissions/custom-roles.md) that you can tailor to your specific requirements
30+
31+
## Docker roles
32+
33+
### Core roles
34+
35+
Core roles are Docker's built-in roles with predefined permission sets:
36+
37+
- **Member**: Non-administrative role with basic access. Members can view other organization members and pull images from repositories they have access to.
38+
- **Editor**: Partial administrative access. Editors can create, edit, and delete repositories, and manage team permissions for repositories.
39+
- **Owner**: Full administrative access. Owners can manage all organization settings, including repositories, teams, members, billing, and security features.
40+
41+
### Custom roles
42+
43+
Custom roles allow you to create tailored permission sets by selecting specific permissions from categories like user management, team management, billing, and Hub permissions. Use custom roles when Docker's core roles don't fit your needs.
44+
45+
## When to use each role
46+
47+
Use core roles when:
48+
49+
- Docker's predefined permission sets match your organizational structure
50+
- You want simple, straightforward role assignments
51+
- You're getting started with Docker organization management
52+
- Your access control needs are standard and don't require fine-grained permissions
53+
54+
Use custom roles when:
55+
56+
- You need specific permission combinations not available in core roles
57+
- You want to create specialized roles like billing administrators, security auditors, or repository managers
58+
- You need department-specific access control
59+
- You want to implement the principle of least privilege with precise permission grants
60+
61+
## How roles work together
62+
63+
Users and teams can be assigned either a core role or a custom role, but not both. However, roles work in combination with team permissions:
64+
65+
1. **Role permissions**: Applied organization-wide (core or custom role). Custom roles can grant permissions to both organization-wide settings and repository access.
66+
2. **Team permissions**: Additional repository-specific permissions when users are added to teams. This is a separate permission system from role-based permissions.
67+
68+
This layered approach gives you flexibility to provide broad organizational access through roles and specific repository access through team memberships.
69+
70+
## Next steps
71+
72+
Choose the role type that best fits your organization's needs:
73+
74+
{{< grid >}}

0 commit comments

Comments
 (0)