diff --git a/ee/dtr/images/access-tokens-1.png b/ee/dtr/images/access-tokens-1.png index 533f018c94..4f539a8686 100644 Binary files a/ee/dtr/images/access-tokens-1.png and b/ee/dtr/images/access-tokens-1.png differ diff --git a/ee/dtr/images/access-tokens-2.png b/ee/dtr/images/access-tokens-2.png index 42c6b7dbb7..0d8c54fc79 100644 Binary files a/ee/dtr/images/access-tokens-2.png and b/ee/dtr/images/access-tokens-2.png differ diff --git a/ee/dtr/images/access-tokens-3.png b/ee/dtr/images/access-tokens-3.png new file mode 100644 index 0000000000..ed14462894 Binary files /dev/null and b/ee/dtr/images/access-tokens-3.png differ diff --git a/ee/dtr/images/create-repository-1.png b/ee/dtr/images/create-repository-1.png index 44975b7656..ff9dc37058 100644 Binary files a/ee/dtr/images/create-repository-1.png and b/ee/dtr/images/create-repository-1.png differ diff --git a/ee/dtr/images/create-repository-2.png b/ee/dtr/images/create-repository-2.png index 692d0c2e27..c57a266729 100644 Binary files a/ee/dtr/images/create-repository-2.png and b/ee/dtr/images/create-repository-2.png differ diff --git a/ee/dtr/images/create-repository-3.png b/ee/dtr/images/create-repository-3.png new file mode 100644 index 0000000000..8274ba7c2e Binary files /dev/null and b/ee/dtr/images/create-repository-3.png differ diff --git a/ee/dtr/images/view-job-logs-3.png b/ee/dtr/images/view-job-logs-3.png deleted file mode 100644 index adbe26a998..0000000000 Binary files a/ee/dtr/images/view-job-logs-3.png and /dev/null differ diff --git a/ee/dtr/user/access-tokens.md b/ee/dtr/user/access-tokens.md index 3dff13582d..d29ecd4eea 100644 --- a/ee/dtr/user/access-tokens.md +++ b/ee/dtr/user/access-tokens.md @@ -7,33 +7,32 @@ redirect_from: - /datacenter/dtr/2.5/guides/user/access-tokens/ --- -Docker Trusted Registry allows you to issue access tokens so that you can -integrate with other services without having to give those services your -credentials. An access token is issued for a user and has the same DTR -permissions the user has. +Docker Trusted Registry allows you to create and distribute access tokens to enable programmatic access to DTR. Access tokens are linked to a particular user account and duplicate whatever permissions that account has at time of use. If the account changes permissions, so will the token. -It's better to use access tokens to build integrations since you can issue -multiple tokens, one for each integration, and revoke them at any time. +Access tokens are useful in cases such as building integrations since you can issue multiple tokens – one for each integration – and revoke them at any time. ## Create an access token -In the **DTR web UI**, navigate to your user profile, and choose **Access tokens**. +1. To create an access token for the first time, log in to `https:// Access Tokens**. -Click **New access token**, and assign a meaningful name to your token. -Choose a name that indicates where the token is going to be used, or what’s the -purpose for the token. Administrators can also create tokens for other users. + ![Token list](../images/access-tokens-1.png){: .with-border} + +3. Add a description for your token. Specify something which indicates where the token is going to be used, or set a purpose for the token. Administrators can also create tokens for other users. ![Create token](../images/access-tokens-2.png){: .with-border} -Once the token is created you won’t be able to see it again, but you can -rename it if needed. +## Modify an access token + +Once the token is created, you will not be able to see it again. You do have the option to rename, deactivate or delete the token as needed. You can delete the token by selecting it and clicking **Delete**, or you can click **View Details**: + +![Create token](../images/access-tokens-3.png){: .with-border} ## Use the access token -You can use an access token in any place that requires your DTR password. -As an example you can use access tokens to login in from your Docker CLI client: +You can use an access token anywhere that requires your DTR password. +As an example you can pass your access token to the `--password` or `-p` option when logging in from your Docker CLI client: ```bash docker login dtr.example.org --username --password diff --git a/ee/dtr/user/manage-images/index.md b/ee/dtr/user/manage-images/index.md index 36267e4cd0..8538534ea2 100644 --- a/ee/dtr/user/manage-images/index.md +++ b/ee/dtr/user/manage-images/index.md @@ -9,36 +9,48 @@ redirect_from: Since DTR is secure by default, you need to create the image repository before being able to push the image to DTR. -In this example, we'll create the 'golang' repository in DTR. +In this example, we'll create the `wordpress` repository in DTR. ## Create a repository -To create a new repository, navigate to the **DTR web application**, and click -the **New repository** button. +1. To create an image repository for the first time, log in to `https:////`. In this example, the full -name of our repository will be `dtr.example.org/dave.lauper/golang`. +name of our repository will be `dtr-example.com/test-user-1/wordpress`. + +6. Optional: Click **Show advanced settings** to make your tags immutable or set your image scanning trigger. + + ![](../../images/create-repository-3.png){: .with-border} + +> Immutable Tags and Tag Limit +> +> Starting in DTR 2.6, repository admins can enable tag pruning by [setting a tag limit](tag-pruning/#set-a-tag-limit). This can only be set if you turn off **Immutability** and allow your repository tags to be overwritten. > Image name size for DTR > > When creating an image name for use with DTR ensure that the organization and repository name has less than 56 characters and that the entire image name which includes domain, organization and repository name does not exceed 255 characters. > -> The 56 character `` limit in DTR is due to an underlying limitation in how the image name information is stored within DTR metadata in RethinkDB. RethinkDB currently has a Primary Key length limit of 127 characters. +> The 56-character `` limit in DTR is due to an underlying limitation in how the image name information is stored within DTR metadata in RethinkDB. RethinkDB currently has a Primary Key length limit of 127 characters. > > When DTR stores the above data it appends a sha256sum comprised of 72 characters to the end of the value to ensure uniqueness within the database. If the `` exceeds 56 characters it will then exceed the 127 character limit in RethinkDB (72+56=128). {: .important}