mirror of https://github.com/docker/docs.git
Call out explicitly that there are user, team and org repo roles now, and that the ones configured in the web UI are global
Signed-off-by: Sven Dowideit <SvenDowideit@home.org.au>
This commit is contained in:
parent
6fed1222a2
commit
42cea4c520
|
@ -38,6 +38,10 @@ User owned repositories can only be accessed by the owner and other
|
|||
individual user accounts, i.e., you cannot grant access to a user-owned
|
||||
repository to a team of users in an organization. If a repository requires this level of control, consider moving it within an organization namespace.
|
||||
|
||||
Users that have been given the Global "read-only", "read-write", or Managed "admin"
|
||||
roles using the DTR web admin tool will have that access to all repositories. These
|
||||
roles can be accessed or modified using the API using the `_global` organization.
|
||||
|
||||
### Organization accounts
|
||||
|
||||
System administrators can also create an Organization account, with its own
|
||||
|
|
|
@ -321,15 +321,22 @@ site. This is not recommended for any use other than testing.
|
|||
### Managed authentication
|
||||
|
||||
With `Managed` authentication, the DTR admin can control users' access by setting username/password pairs.
|
||||
These users must then be given "admin", "read-write" or "read-only" roles.
|
||||
The "read-only" role can only pull images from the registry, "read-write" can
|
||||
push and pull images, and the "admin" role can push and pull and also access
|
||||
These users can then be given Global "admin", "read-write" or "read-only" roles, or be assigned
|
||||
[Organization, Team or User repository roles using the API](/docker-trusted-registry/api/).
|
||||
|
||||
The "read-only" role can pull all images from the registry, "read-write" can
|
||||
push and pull all images, and the "admin" role can push and pull and also access
|
||||
the web administration UI and metrics dashboard.
|
||||
|
||||
When you create users that will be assigned roles via the API, you do not need
|
||||
to select one of the roles on the DTR web admin UI.
|
||||
|
||||

|
||||
|
||||
* Choose the appropriate button to add one user, or to upload a CSV file containing username,
|
||||
password pairs, and selection boxes for "admin", "read-write", and "read-only" roles.
|
||||
* You can also create, or allow others to create the username, password pair using the
|
||||
[Account API](/docker-trusted-registry/api/dtr_1_3_accounts/#create-an-account)
|
||||
|
||||
### LDAP authentication
|
||||
|
||||
|
@ -342,13 +349,18 @@ Interval*. User passwords are not transferred during syncing; DTR will defer to
|
|||
|
||||
> **Note**: LDAP syncing does not create new user accounts or teams in DTR. It
|
||||
> will only manage existing teams that have been specified to sync with LDAP.
|
||||
> You can use the [DTR APIs](/docker-trusted-registry/api/)
|
||||
> to create new users and teams from your LDAP server.
|
||||
|
||||
You can configure the "userFilter" to select the set of users that are candidates
|
||||
for each of the "admin", "read-write", and "read-only" roles. Unlike "Managed"
|
||||
for each of the "admin", global "read-write", and global "read-only" roles. Unlike "Managed"
|
||||
authentication, the "admin" role is separate from the registry access roles, so
|
||||
LDAP users in the "admin" role won't have access to DTR images unless they are
|
||||
also given the "read-write" or "read-only" role.
|
||||
|
||||
Alternativly, you can assign
|
||||
[Organization, Team or User repository roles using the API](/docker-trusted-registry/api/).
|
||||
|
||||
Because connecting to LDAP involves existing infrastructure external to DTR and
|
||||
Docker, you will need to gather the details required to configure DTR for your
|
||||
organization's particular LDAP implementation.
|
||||
|
|
Loading…
Reference in New Issue