Skip to content

Commit b192768

Browse files
security: steps for migrating from service accounts (#23444)
## Description - Adds section on migrating from service accounts to OATs ## Related issues or tickets Backlog item: https://docker.atlassian.net/browse/ENGDOCS-2493 --------- Co-authored-by: Craig Osterhout <[email protected]>
1 parent 341f358 commit b192768

File tree

1 file changed

+28
-0
lines changed

1 file changed

+28
-0
lines changed

content/manuals/enterprise/security/access-tokens.md

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,34 @@ organization.
104104
- **Delete**
105105
1. Select **Save** after making changes to a token.
106106

107+
## Migrate from service accounts
108+
109+
[Enhanced Service Account add-ons](/manuals/docker-hub/service-accounts.md)
110+
are deprecated and no longer available for
111+
new purchases as of December 10, 2024.
112+
113+
Organization access tokens provide a
114+
modern, secure replacement with additional benefits:
115+
116+
| Feature | Service accounts | Organization access tokens |
117+
|---------|------------------|----------------------------|
118+
| Authentication | Username/password | Organization name + token |
119+
| Cost | Tiered add-on pricing | Included with subscription |
120+
| Management | Individual account-based | Organization owner managed |
121+
| Repository access | Full account access | Granular repository permissions |
122+
| Security | Basic password auth | Token-based with expiration |
123+
| Rate limits | Separate tiered limits | Organization subscription limits |
124+
125+
### Migration steps
126+
127+
To migrate from service accounts to OATs, use the following steps:
128+
129+
1. Document current service accounts and their purposes.
130+
1. Generate organization access tokens with appropriate repository permissions.
131+
1. Replace service account credentials in your systems.
132+
1. Validate all automated workflows work correctly.
133+
1. Remove deprecated service account credentials.
134+
107135
## Organization access token best practices
108136

109137
- Regular token rotation: Set reasonable expiration dates and rotate tokens regularly to minimize security risks.

0 commit comments

Comments
 (0)