Source | Azure Portal | ||||||||||||||
Display name | Container registries should have repository scoped access token disabled. | ||||||||||||||
Id | ff05e24e-195c-447e-b322-5e90c9f9f366 | ||||||||||||||
Version | 1.0.0 Details on versioning |
||||||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.0 Built-in Versioning [Preview] |
||||||||||||||
Category | Container Registry Microsoft Learn |
||||||||||||||
Description | Disable repository scoped access tokens for your registry so that repositories are not accessible by tokens. Disabling local authentication methods like admin user, repository scoped access tokens and anonymous pull improves security by ensuring that container registries exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/acr/authentication. | ||||||||||||||
Mode | All | ||||||||||||||
Type | BuiltIn | ||||||||||||||
Preview | False | ||||||||||||||
Deprecated | False | ||||||||||||||
Effect | Default Audit Allowed Audit, Deny, Disabled |
||||||||||||||
RBAC role(s) | none | ||||||||||||||
Rule aliases | IF (1)
|
||||||||||||||
Rule resource types | IF (1) Microsoft.ContainerRegistry/registries/tokens |
||||||||||||||
Compliance | Not a Compliance control | ||||||||||||||
Initiatives usage |
|
||||||||||||||
History |
|
||||||||||||||
JSON compare | n/a | ||||||||||||||
JSON |
|