Skip to content

Commit 624214c

Browse files
Merge pull request #22231 from docker/published-update
publish updates from main
2 parents e9e9860 + 8aa7128 commit 624214c

File tree

1 file changed

+37
-29
lines changed

1 file changed

+37
-29
lines changed

content/manuals/security/for-admins/access-tokens.md

Lines changed: 37 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -15,14 +15,11 @@ params:
1515

1616
> [!WARNING]
1717
>
18-
> Organization access tokens (OATs) are not intended to be used with Docker
19-
> Desktop, and are incompatible.
18+
> Organization access tokens (OATs) are not intended to be used with Docker
19+
> Desktop or Docker Scout, and are incompatible.
2020
>
21-
> OATs are also currently incompatible with the following services:
22-
>
23-
> - Docker Scout
24-
>
25-
> If you use Docker Desktop or one of these services, you must use personal access tokens instead.
21+
> If you use Docker Desktop or Docker Scout, you must use personal
22+
> access tokens instead.
2623
2724
An organization access token (OAT) is like a [personal access token
2825
(PAT)](/security/for-developers/access-tokens/), but an OAT is associated with
@@ -37,12 +34,14 @@ OATs provide the following advantages:
3734
if you find any suspicious activity.
3835
- You can limit what each OAT has access to, which limits the impact if an OAT
3936
is compromised.
40-
- All company or organization owners can manage OATs. If one owner leaves the
37+
- All company or organization owners can manage OATs. If one owner leaves the
4138
organization, the remaining owners can still manage the OATs.
4239
- OATs have their own Docker Hub usage limits that don't count towards your
4340
personal account's limits.
4441

45-
If you have existing [service accounts](/docker-hub/service-accounts/), Docker recommends that you replace the service accounts with OATs. OATs offer the following advantages over service accounts:
42+
If you have existing [service accounts](/docker-hub/service-accounts/),
43+
Docker recommends that you replace the service accounts with OATs. OATs offer
44+
the following advantages over service accounts:
4645

4746
- Access permissions are easier to manage with OATs. You can assign access
4847
permissions to OATs, while service accounts require using teams for access
@@ -60,13 +59,14 @@ If you have existing [service accounts](/docker-hub/service-accounts/), Docker r
6059

6160
> [!IMPORTANT]
6261
>
63-
> Treat access tokens like a password and keep them secret. Store your tokens
62+
> Treat access tokens like a password and keep them secret. Store your tokens
6463
> securely in a credential manager for example.
6564
66-
Company or organization owners can create up to 10 organization access tokens
67-
(OATs) for organizations with a Team subscription and up to 100 OATs for
68-
organizations with a Business subscription. Expired tokens count towards the
69-
total amount of tokens.
65+
Company or organization owners can create up to:
66+
- 10 OATs for organizations with a Team subscription
67+
- 100 OATs for organizations with a Business subscription
68+
69+
Expired tokens count towards the total amount of tokens.
7070

7171
To create an OAT:
7272

@@ -78,23 +78,31 @@ To create an OAT:
7878

7979
4. Select **Generate access token**.
8080

81-
5. Add a label and optional description for your token. Use something that indicates the use case or purpose of the token.
81+
5. Add a label and optional description for your token. Use something that
82+
indicates the use case or purpose of the token.
8283

8384
6. Select the expiration date for the token.
8485

85-
7. Select the repository access for the token.
86-
87-
The access permissions are scopes that set restrictions in your repositories.
88-
For example, for Read & Write permissions, an automation pipeline can build
89-
an image and then push it to a repository. However, it can't delete the
90-
repository. You can select one of the following options:
91-
92-
- **Public repositories (read only)**
93-
- **All repositories**: You can select read access, or read and write access.
94-
- **Select repositories**: You can select up to 50 repositories, and then
95-
select read access, or read and write access for each repository.
96-
97-
8. Select **Generate token** and then copy the token that appears on the screen
86+
7. Expand the **Repository** drop-down to set access permission
87+
scopes for your token. To set Repository access scopes:
88+
1. Optional. Select **Read public repositories**.
89+
2. Select **Add repository** and choose a repository from the drop-down.
90+
3. Set the scopes for your repository — **Image Push** or
91+
**Image Pull**.
92+
4. Add more repositories as needed. You can add up to 50 repositories.
93+
94+
8. Optional. Expand the **Organization** drop-down and select the
95+
**Allow management access to this organization's resources** checkbox. This
96+
setting enables organization management scopes for your token. The following
97+
organization management scopes are available:
98+
- **Member Edit**: Edit members of the organization
99+
- **Member Read**: Read members of the organization
100+
- **Invite Edit**: Invite members to the organization
101+
- **Invite Read**: Read invites to the organization
102+
- **Group Edit**: Edit groups of the organization
103+
- **Group Read**: Read groups of the organization
104+
105+
9. Select **Generate token**. Copy the token that appears on the screen
98106
and save it. You won't be able to retrieve the token once you exit the
99107
screen.
100108

@@ -123,7 +131,7 @@ deactivate, or delete a token as needed.
123131

124132
3. Under **Security and access**, select **Access tokens**.
125133

126-
4. Select the actions menu on the far right of a token row, then select
134+
4. Select the actions menu in the token row, then select
127135
**Deactivate**, **Edit**, or **Delete** to modify the token. For **Inactive**
128136
tokens, you can only select **Delete**.
129137

0 commit comments

Comments
 (0)