Skip to content

Commit 3c7d225

Browse files
authored
ENGDOCS-2217 (#20860)
* ENGDOCS-2217 * Update content/manuals/security/for-admins/hardened-desktop/registry-access-management.md * Update content/manuals/security/for-admins/hardened-desktop/registry-access-management.md
1 parent b5728b7 commit 3c7d225

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

content/manuals/security/for-admins/hardened-desktop/registry-access-management.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,7 @@ There are certain limitations when using Registry Access Management:
6868
- Blocking is DNS-based; you must use a registry's access control mechanisms to distinguish between “push” and “pull”
6969
- WSL 2 requires at least a 5.4 series Linux kernel (this does not apply to earlier Linux kernel series)
7070
- Under the WSL 2 network, traffic from all Linux distributions is restricted (this will be resolved in the updated 5.15 series Linux kernel)
71+
- Images pulled by Docker Desktop when Docker Debug or Kubernetes is enabled, are not restricted by default even if Docker Hub is blocked by RAM.
7172

7273
Also, Registry Access Management operates on the level of hosts, not IP addresses. Developers can bypass this restriction within their domain resolution, for example by running Docker against a local proxy or modifying their operating system's `sts` file. Blocking these forms of manipulation is outside the remit of Docker Desktop.
7374

0 commit comments

Comments
 (0)