Merge pull request #647 from SvenDowideit/_global-group-has-global-access

Call out explicitly that there are user, team and org repo roles now,…
This commit is contained in:
Fred Lifton 2015-08-25 12:02:52 -07:00
commit 1888fd9400
2 changed files with 20 additions and 4 deletions

View File

@ -38,6 +38,10 @@ User owned repositories can only be accessed by the owner and other
individual user accounts, i.e., you cannot grant access to a user-owned individual user accounts, i.e., you cannot grant access to a user-owned
repository to a team of users in an organization. If a repository requires this level of control, consider moving it within an organization namespace. repository to a team of users in an organization. If a repository requires this level of control, consider moving it within an organization namespace.
Users that have been given the Global "read-only", "read-write", or Managed "admin"
roles using the DTR web admin tool will have that access to all repositories. These
roles can be accessed or modified using the API using the `_global` organization.
### Organization accounts ### Organization accounts
System administrators can also create an Organization account, with its own System administrators can also create an Organization account, with its own

View File

@ -340,15 +340,22 @@ site. This is not recommended for any use other than testing.
### Managed authentication ### Managed authentication
With `Managed` authentication, the DTR admin can control users' access by setting username/password pairs. With `Managed` authentication, the DTR admin can control users' access by setting username/password pairs.
These users must then be given "admin", "read-write" or "read-only" roles. These users can then be given Global "admin", "read-write" or "read-only" roles, or be assigned
The "read-only" role can only pull images from the registry, "read-write" can [Organization, Team or User repository roles using the API](/docker-trusted-registry/api/).
push and pull images, and the "admin" role can push and pull and also access
The "read-only" role can pull all images from the registry, "read-write" can
push and pull all images, and the "admin" role can push and pull and also access
the web administration UI and metrics dashboard. the web administration UI and metrics dashboard.
When you create users that will be assigned roles via the API, you do not need
to select one of the roles on the DTR web admin UI.
![Managed authentication settings page</admin/settings#auth>](../assets/admin-settings-authentication-basic.png) ![Managed authentication settings page</admin/settings#auth>](../assets/admin-settings-authentication-basic.png)
* Choose the appropriate button to add one user, or to upload a CSV file containing username, * Choose the appropriate button to add one user, or to upload a CSV file containing username,
password pairs, and selection boxes for "admin", "read-write", and "read-only" roles. password pairs, and selection boxes for "admin", "read-write", and "read-only" roles.
* You can also create, or allow others to create the username, password pair using the
[Account API](/docker-trusted-registry/api/dtr_1_3_accounts/#create-an-account)
### LDAP authentication ### LDAP authentication
@ -361,13 +368,18 @@ Interval*. User passwords are not transferred during syncing; DTR will defer to
> **Note**: LDAP syncing does not create new user accounts or teams in DTR. It > **Note**: LDAP syncing does not create new user accounts or teams in DTR. It
> will only manage existing teams that have been specified to sync with LDAP. > will only manage existing teams that have been specified to sync with LDAP.
> You can use the [DTR APIs](/docker-trusted-registry/api/)
> to create new users and teams from your LDAP server.
You can configure the "userFilter" to select the set of users that are candidates You can configure the "userFilter" to select the set of users that are candidates
for each of the "admin", "read-write", and "read-only" roles. Unlike "Managed" for each of the "admin", global "read-write", and global "read-only" roles. Unlike "Managed"
authentication, the "admin" role is separate from the registry access roles, so authentication, the "admin" role is separate from the registry access roles, so
LDAP users in the "admin" role won't have access to DTR images unless they are LDAP users in the "admin" role won't have access to DTR images unless they are
also given the "read-write" or "read-only" role. also given the "read-write" or "read-only" role.
Alternativly, you can assign
[Organization, Team or User repository roles using the API](/docker-trusted-registry/api/).
Because connecting to LDAP involves existing infrastructure external to DTR and Because connecting to LDAP involves existing infrastructure external to DTR and
Docker, you will need to gather the details required to configure DTR for your Docker, you will need to gather the details required to configure DTR for your
organization's particular LDAP implementation. organization's particular LDAP implementation.