Skip to content

Commit af55845

Browse files
Merge pull request #22379 from docker/published-update
publish updates from main
2 parents 505903c + 16711cd commit af55845

File tree

4 files changed

+73
-20
lines changed

4 files changed

+73
-20
lines changed

content/manuals/billing/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ grid_core:
1212
description: Learn how to add or update a payment method for your personal account or organization.
1313
link: /billing/payment-method/
1414
icon: credit_score
15-
- title: Update the billing information
15+
- title: Update billing information
1616
description: Discover how to update the billing information for your personal account or organization.
1717
link: /billing/details/
1818
icon: contract_edit

content/manuals/security/_index.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,14 @@ grid_admins:
5555
description: Learn how to configure and set up a private marketplace with a curated list of extensions for your Docker Desktop users.
5656
icon: storefront
5757
link: /desktop/extensions/private-marketplace/
58+
- title: Organization access tokens
59+
description: Create organization access tokens as an alternative to a password.
60+
link: /security/for-admins/access-tokens/
61+
icon: password
62+
- title: Enforce sign-in
63+
description: Enforce your users to sign in to Docker Desktop.
64+
link: /security/for-admins/enforce-sign-in/
65+
icon: login
5866
grid_developers:
5967
- title: Set up two-factor authentication
6068
description: Add an extra layer of authentication to your Docker account.

content/manuals/security/for-admins/hardened-desktop/registry-access-management.md

Lines changed: 38 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,16 @@ weight: 30
1313

1414
{{< summary-bar feature_name="Registry access management" >}}
1515

16-
With Registry Access Management (RAM), administrators can ensure that their developers using Docker Desktop only access allowed registries. This is done through the Registry Access Management dashboard in Docker Hub or the Docker Admin Console.
16+
With Registry Access Management (RAM), administrators can ensure that their
17+
developers using Docker Desktop only access allowed registries. This is done
18+
through the Registry Access Management dashboard in Docker Hub or the
19+
Docker Admin Console.
1720

18-
Registry Access Management supports both cloud and on-prem registries. This feature operates at the DNS level and therefore is compatible with all registries. You can add any hostname or domain name you’d like to include in the list of allowed registries. However, if the registry redirects to other domains such as `s3.amazon.com`, then you must add those domains to the list.
21+
Registry Access Management supports both cloud and on-prem registries. This
22+
feature operates at the DNS level and therefore is compatible with all
23+
egistries. You can add any hostname or domain name you’d like to include in the
24+
list of allowed registries. However, if the registry redirects to other domains
25+
such as `s3.amazon.com`, then you must add those domains to the list.
1926

2027
Example registries administrators can allow include:
2128

@@ -29,7 +36,7 @@ Example registries administrators can allow include:
2936

3037
## Prerequisites
3138

32-
You need to [enforce sign-in](../enforce-sign-in/_index.md). For Registry Access
39+
You must [enforce sign-in](../enforce-sign-in/_index.md). For Registry Access
3340
Management to take effect, Docker Desktop users must authenticate to your
3441
organization. Enforcing sign-in ensures that your Docker Desktop developers
3542
always authenticate to your organization, even though they can authenticate
@@ -53,21 +60,39 @@ feature always takes effect.
5360

5461
## Verify the restrictions
5562

56-
The new Registry Access Management policy takes effect after the developer successfully authenticates to Docker Desktop using their organization credentials. If a developer attempts to pull an image from a disallowed registry via the Docker CLI, they receive an error message that the organization has disallowed this registry.
63+
The new Registry Access Management policy takes effect after the developer
64+
successfully authenticates to Docker Desktop using their organization
65+
credentials. If a developer attempts to pull an image from a disallowed
66+
registry via the Docker CLI, they receive an error message that the organization
67+
has disallowed this registry.
5768

5869
## Caveats
5970

6071
There are certain limitations when using Registry Access Management:
6172

62-
- Windows image pulls and image builds are not restricted by default. For Registry Access Management to take effect on Windows Container mode, you must allow the Windows Docker daemon to use Docker Desktop's internal proxy by selecting the [Use proxy for Windows Docker daemon](/manuals/desktop/settings-and-maintenance/settings.md#proxies) setting.
63-
- Builds such as `docker buildx` using a Kubernetes driver are not restricted
64-
- Builds such as `docker buildx` using a custom docker-container driver are not restricted
65-
- Blocking is DNS-based; you must use a registry's access control mechanisms to distinguish between “push” and “pull”
66-
- WSL 2 requires at least a 5.4 series Linux kernel (this does not apply to earlier Linux kernel series)
67-
- Under the WSL 2 network, traffic from all Linux distributions is restricted (this will be resolved in the updated 5.15 series Linux kernel)
68-
- Images pulled by Docker Desktop when Docker Debug or Kubernetes is enabled, are not restricted by default even if Docker Hub is blocked by RAM.
69-
70-
Also, Registry Access Management operates on the level of hosts, not IP addresses. Developers can bypass this restriction within their domain resolution, for example by running Docker against a local proxy or modifying their operating system's `sts` file. Blocking these forms of manipulation is outside the remit of Docker Desktop.
73+
- You can add up to 100 registries/domains.
74+
- Windows image pulls and image builds are not restricted by default. For
75+
Registry Access Management to take effect on Windows Container mode, you must
76+
allow the Windows Docker daemon to use Docker Desktop's internal proxy by
77+
selecting the [Use proxy for Windows Docker daemon](/manuals/desktop/settings-and-maintenance/settings.md#proxies)
78+
setting.
79+
- Builds such as `docker buildx` using a Kubernetes driver are not restricted.
80+
- Builds such as `docker buildx` using a custom docker-container driver are not
81+
restricted.
82+
- Blocking is DNS-based. You must use a registry's access control mechanisms to
83+
distinguish between “push” and “pull”.
84+
- WSL 2 requires at least a 5.4 series Linux kernel (this does not apply to
85+
earlier Linux kernel series).
86+
- Under the WSL 2 network, traffic from all Linux distributions is restricted.
87+
This will be resolved in the updated 5.15 series Linux kernel.
88+
- Images pulled by Docker Desktop when Docker Debug or Kubernetes is enabled,
89+
are not restricted by default even if Docker Hub is blocked by RAM.
90+
91+
Also, Registry Access Management operates on the level of hosts, not IP
92+
addresses. Developers can bypass this restriction within their domain
93+
resolution, for example by running Docker against a local proxy or modifying
94+
their operating system's `sts` file. Blocking these forms of manipulation is
95+
outside the remit of Docker Desktop.
7196

7297
## More resources
7398

layouts/shortcodes/admin-registry-access.html

Lines changed: 26 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -13,19 +13,39 @@
1313

1414
> [!NOTE]
1515
>
16-
> When enabled, the Docker Hub registry is set by default, however you can also restrict this registry for your developers.
16+
> When enabled, the Docker Hub registry is set by default; however you can
17+
> also restrict this registry for your developers.
1718

18-
4. Select **Add registry** and enter your registry details in the applicable fields, and then select **Create** to add the registry to your list. There is no limit on the number of registries you can add.
19+
4. Select **Add registry** and enter your registry details in the applicable
20+
fields, and then select **Create** to add the registry to your list. You can
21+
add up to 100 registries/domains.
1922
5. Verify that the registry appears in your list and select **Save changes**.
2023

21-
Once you add a registry, it can take up to 24 hours for the changes to be enforced on your developers’ machines.
24+
Once you add a registry, it can take up to 24 hours for the changes to be
25+
enforced on your developers’ machines.
2226

23-
If you want to apply the changes sooner, you must force a Docker signout on your developers’ machine and have the developers re-authenticate for Docker Desktop. See the [Caveats](#caveats) section below to learn more about limitations when using this feature.
27+
If you want to apply the changes sooner, you must force a Docker signout on your
28+
developers’ machine and have the developers re-authenticate for Docker Desktop.
29+
See the [Caveats](#caveats) section below to learn more about limitations.
2430

2531
> [!IMPORTANT]
2632
>
27-
> Starting with Docker Desktop version 4.36, you can enforce sign-in for multiple organizations. If a developer belongs to multiple organizations with different RAM policies, only the RAM policy for the first organization listed in the `registry.json` file, `.plist` file, or registry key is enforced.
33+
> Starting with Docker Desktop version 4.36, you can enforce sign-in for
34+
multiple organizations. If a developer belongs to multiple organizations with
35+
different RAM policies, only the RAM policy for the first organization listed
36+
in the `registry.json` file, `.plist` file, or registry key is enforced.
2837

2938
> [!TIP]
3039
>
31-
> Since RAM sets policies about where content can be fetched from, the [ADD](/reference/dockerfile/#add) instruction of the Dockerfile, when the parameter of the ADD instruction is a URL, is also subject to registry restrictions. It's recommended that you add the domains of URL parameters to the list of allowed registry addresses under the Registry Access Management settings of your organization.
40+
> Since RAM sets policies about where content can be fetched from, the
41+
[ADD](/reference/dockerfile/#add) instruction of the Dockerfile when the
42+
parameter of the ADD instruction is a URL is also subject to registry
43+
restrictions.
44+
>
45+
> If you're using ADD to fetch an image or artifact from a trusted registry via
46+
> URL, make sure the registry's domain is included in your organzation's
47+
> allowed registries list.
48+
>
49+
> RAM is not intended to restrict access to general-purpose external URLs, for
50+
> example, package mirrors or storage services. Attempting to add too many domains
51+
> may cause errors or hit system limits.

0 commit comments

Comments
 (0)