You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/manuals/security/for-admins/access-tokens.md
+37-29Lines changed: 37 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,14 +15,11 @@ params:
15
15
16
16
> [!WARNING]
17
17
>
18
-
> Organization access tokens (OATs) are not intended to be used with Docker
19
-
> Desktop, and are incompatible.
18
+
> Organization access tokens (OATs) are not intended to be used with Docker
19
+
> Desktop or Docker Scout, and are incompatible.
20
20
>
21
-
> OATs are also currently incompatible with the following services:
22
-
>
23
-
> - Docker Scout
24
-
>
25
-
> If you use Docker Desktop or one of these services, you must use personal access tokens instead.
21
+
> If you use Docker Desktop or Docker Scout, you must use personal
22
+
> access tokens instead.
26
23
27
24
An organization access token (OAT) is like a [personal access token
28
25
(PAT)](/security/for-developers/access-tokens/), but an OAT is associated with
@@ -37,12 +34,14 @@ OATs provide the following advantages:
37
34
if you find any suspicious activity.
38
35
- You can limit what each OAT has access to, which limits the impact if an OAT
39
36
is compromised.
40
-
- All company or organization owners can manage OATs. If one owner leaves the
37
+
- All company or organization owners can manage OATs. If one owner leaves the
41
38
organization, the remaining owners can still manage the OATs.
42
39
- OATs have their own Docker Hub usage limits that don't count towards your
43
40
personal account's limits.
44
41
45
-
If you have existing [service accounts](/docker-hub/service-accounts/), Docker recommends that you replace the service accounts with OATs. OATs offer the following advantages over service accounts:
42
+
If you have existing [service accounts](/docker-hub/service-accounts/),
43
+
Docker recommends that you replace the service accounts with OATs. OATs offer
44
+
the following advantages over service accounts:
46
45
47
46
- Access permissions are easier to manage with OATs. You can assign access
48
47
permissions to OATs, while service accounts require using teams for access
@@ -60,13 +59,14 @@ If you have existing [service accounts](/docker-hub/service-accounts/), Docker r
60
59
61
60
> [!IMPORTANT]
62
61
>
63
-
> Treat access tokens like a password and keep them secret. Store your tokens
62
+
> Treat access tokens like a password and keep them secret. Store your tokens
64
63
> securely in a credential manager for example.
65
64
66
-
Company or organization owners can create up to 10 organization access tokens
67
-
(OATs) for organizations with a Team subscription and up to 100 OATs for
68
-
organizations with a Business subscription. Expired tokens count towards the
69
-
total amount of tokens.
65
+
Company or organization owners can create up to:
66
+
- 10 OATs for organizations with a Team subscription
67
+
- 100 OATs for organizations with a Business subscription
68
+
69
+
Expired tokens count towards the total amount of tokens.
70
70
71
71
To create an OAT:
72
72
@@ -78,23 +78,31 @@ To create an OAT:
78
78
79
79
4. Select **Generate access token**.
80
80
81
-
5. Add a label and optional description for your token. Use something that indicates the use case or purpose of the token.
81
+
5. Add a label and optional description for your token. Use something that
82
+
indicates the use case or purpose of the token.
82
83
83
84
6. Select the expiration date for the token.
84
85
85
-
7. Select the repository access for the token.
86
-
87
-
The access permissions are scopes that set restrictions in your repositories.
88
-
For example, for Read & Write permissions, an automation pipeline can build
89
-
an image and then push it to a repository. However, it can't delete the
90
-
repository. You can select one of the following options:
91
-
92
-
-**Public repositories (read only)**
93
-
-**All repositories**: You can select read access, or read and write access.
94
-
-**Select repositories**: You can select up to 50 repositories, and then
95
-
select read access, or read and write access for each repository.
96
-
97
-
8. Select **Generate token** and then copy the token that appears on the screen
86
+
7. Expand the **Repository** drop-down to set access permission
87
+
scopes for your token. To set Repository access scopes:
88
+
1. Optional. Select **Read public repositories**.
89
+
2. Select **Add repository** and choose a repository from the drop-down.
90
+
3. Set the scopes for your repository —**Image Push** or
91
+
**Image Pull**.
92
+
4. Add more repositories as needed. You can add up to 50 repositories.
93
+
94
+
8. Optional. Expand the **Organization** drop-down and select the
95
+
**Allow management access to this organization's resources** checkbox. This
96
+
setting enables organization management scopes for your token. The following
97
+
organization management scopes are available:
98
+
- **Member Edit**: Edit members of the organization
99
+
- **Member Read**: Read members of the organization
100
+
- **Invite Edit**: Invite members to the organization
101
+
- **Invite Read**: Read invites to the organization
102
+
- **Group Edit**: Edit groups of the organization
103
+
- **Group Read**: Read groups of the organization
104
+
105
+
9. Select **Generate token**. Copy the token that appears on the screen
98
106
and save it. You won't be able to retrieve the token once you exit the
99
107
screen.
100
108
@@ -123,7 +131,7 @@ deactivate, or delete a token as needed.
123
131
124
132
3. Under **Security and access**, select **Access tokens**.
125
133
126
-
4. Select the actions menu on the far right of a token row, then select
134
+
4. Select the actions menu in the token row, then select
127
135
**Deactivate**, **Edit**, or **Delete** to modify the token. For **Inactive**
0 commit comments