You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Windows containers offer two default user accounts, ContainerUser and ContainerAdministrator.
36
-
The differences between these two user accounts are covered in
37
-
[When to use ContainerAdmin and ContainerUser user accounts](https://docs.microsoft.com/virtualization/windowscontainers/manage-containers/container-security#when-to-use-containeradmin-and-containeruser-user-accounts)
38
-
within Microsoft's _Secure Windows containers_ documentation.
39
-
40
-
Local users can be added to container images during the container build process.
41
-
42
-
{{< note >}}
43
-
44
-
*[Nano Server](https://hub.docker.com/_/microsoft-windows-nanoserver) based images run as
45
-
`ContainerUser` by default
46
-
*[Server Core](https://hub.docker.com/_/microsoft-windows-servercore) based images run as
47
-
`ContainerAdministrator` by default
48
-
49
-
{{< /note >}}
50
-
51
-
Windows containers can also run as Active Directory identities by utilizing
52
-
[Group Managed Service Accounts](/docs/tasks/configure-pod-container/configure-gmsa/)
53
-
54
-
## Pod-level security isolation
55
-
56
-
Linux-specific pod security context mechanisms (such as SELinux, AppArmor, Seccomp, or custom
57
-
POSIX capabilities) are not supported on Windows nodes.
58
-
59
-
Privileged containers are [not supported](/docs/concepts/windows/intro/#compatibility-v1-pod-spec-containers-securitycontext)
0 commit comments