Skip to content

Feat(MPR): create new guide about IAM authentication #8162

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 2 commits into
base: develop
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions pages/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -1058,6 +1058,7 @@
+ [Scanning Docker images for vulnerabilities with OVHcloud Managed Private Registry](public_cloud/containers_orchestration/managed_private_registry/scan-docker-images-vulnerabilities)
+ [Sign OCI artifacts with Cosign on OVHcloud Managed Private Registry](public_cloud/containers_orchestration/managed_private_registry/sign-artifacts-with-cosign)
+ [Configure the authentication via an OIDC provider on an OVHcloud Managed Private Registry](public_cloud/containers_orchestration/managed_private_registry/configure-oidc-provider-authentication)
+ [Configure access control using OVHcloud IAM on an OVHcloud Managed Private Registry](public_cloud/containers_orchestration/managed_private_registry/managing-iam-authentication)
+ [Adding IP restrictions on an OVHcloud Managed Private Registry](public_cloud/containers_orchestration/managed_private_registry/add-ip-restrictions)
+ [Managed Rancher Service (MRS)](products/public-cloud-containers-orchestration-managed-rancher-service)
+ [Getting started](public-cloud-containers-orchestration-managed-rancher-service-getting-started)
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,114 @@
---
title: 'Configure access control using OVHcloud IAM on an OVHcloud Managed Private Registry'
excerpt: 'Learn how to enable and manage OVHcloud IAM authentication to control access to your Managed Private Registry (MPR) using centralized identities and roles.'
updated: 2025-07-21
---

## Objective

OVHcloud Managed Private Registry (MPR) supports authentication through OVHcloud IAM, allowing you to manage access using centralized user identities and roles. This guide explains how to enable IAM authentication and control user access to your registry using OVHcloud IAM users and roles.

## Requirements

- An OVHcloud Managed Private Registry (see the [creating a private registry](/pages/public_cloud/containers_orchestration/managed_private_registry/creating-a-private-registry) guide for more information)
- An access to the Harbor UI to operate the private registry (see the [connecting to the UI](/pages/public_cloud/containers_orchestration/managed_private_registry/connecting-to-the-ui) guide for more information)

## Instructions

### Introduction to OVHcloud IAM

OVHcloud IAM (Identity and Access Management) is a centralized system that lets you manage who can access your OVHcloud services and what they are allowed to do. It provides fine-grained access control through users, groups, and roles.

When used with Managed Private Registry (MPR), OVHcloud IAM replaces Harbor’s local user database. This enables you to:

- Use SSO (Single Sign-On) with your OVHcloud credentials to access Harbor.
- Assign predefined IAM roles (admin, standard) to control access levels.
- Manage permissions at scale using IAM groups and projects.

By integrating IAM with your registry, you ensure consistent access control across your OVHcloud services — reducing manual management and improving security.

### Activate/Disable authentication via OVHcloud IAM

> [!warning]
>
> When you enable OVHcloud IAM authentication on your Managed Private Registry:
>
> - All existing Harbor users and robot accounts will be removed.
> - Existing robot accounts will continue to function, but you will no longer be able to create or manage them directly in Harbor.
> - From this point on, access is fully managed via OVHcloud IAM users and roles.
>

Log in to the [OVHcloud Control Panel](/links/manager), navigate to the `Public Cloud`{.action} section, and select the relevant project. Then, in the left-hand menu under **Containers & Orchestration**, click on `Managed Private Registry`{.action}.

In the list of registries, click the `...`{.action} button on the relevant line, then choose:

- `Activate authentication via OVHcloud IAM`{.action} to enable it.

![activate IAM](images/activate_iam.png){.thumbnail}

- `Disable authentication via OVHcloud IAM`{.action} to disable it.

![diasable IAM](images/disable_iam.png){.thumbnail}

### Authentication using SSO with OVHcloud IAM users

Once IAM authentication is enabled, access to the Harbor UI is handled via OVHcloud Single Sign-On (SSO). Users no longer log in with Harbor-local credentials but authenticate directly using their OVHcloud IAM identity.

To log in via SSO:

- Open the `Harbor user interface`{.action} from the Control Panel.

![harbor user interface](images/harbor_interface.png){.thumbnail}

- You will be redirected to the OVHcloud authentication page, log in using your OVHcloud IAM credentials.

![login with SSO](images/iam_authentication.png){.thumbnail}

- Access to Harbor is granted based on the IAM role associated with your user account.

> [!primary]
>
> Only users with the appropriate IAM role (admin or standard) can access the registry after IAM authentication is enabled.
>

### Managing access rights with OVHcloud IAM

OVHcloud IAM provides two predefined roles for managing access to your Managed Private Registry (MPR):

- Standard
- Admin

> [!primary]
>
> **Admin** role: Regardless of the user group defined in the Identities section, assigning the Admin role will grant full administrative privileges on the selected registry.
>
> **Standard** role: Make sure users assigned to the Standard role do not belong to the Default group in the `Identities` section. This group has elevated rights by default (including admin-level access with limited capabilities, such as no user creation). To ensure clean separation of roles, we recommend:
>
> - Organizing users into clearly defined groups.
> - After changing a user’s group and assigning the Standard role, fine-tune their permissions directly in Harbor for better control and consistency. See the different roles in Harbor [here.](https://goharbor.io/docs/1.10/administration/managing-users/user-permissions-by-role/){.external}
>

These roles are assigned through IAM policies. To create and configure a policy: pour configurer une policy, navigate to the `Identity, Security & Operations`{.action} sectiont. Then, in the left-hand menu under **Identity and Access management**, click on `Policies`{.action} and click on `Create a policy`{.action} button.

In the OVHcloud Control Panel, go to the `Identity, Security & Operations`{.action} section. In the left-hand menu, under `Identity and Access Management`, click on `Policies`{.action} and `Create a policy`{.action}.

![Create policy](images/managing_iam.png){.thumbnail}

Define users and groups, name your policy, add the users you want to include and optionally, add user groups if they have already been created.

![Create policy users](images/create_policy.png){.thumbnail width="700"}

Set permissions for MPR, in the `Product types` section, select `Public Cloud Project/Managed Registry`. In `Resources`, choose the specific MPR instance to which the policy will apply.

![Create policy product types](images/create_policy_product_types.png){.thumbnail}

Expand `Public Cloud Project/Managed Registry` and select the desired role for the users defined in the policy.

![Create policy roles](images/create_policy_action.png){.thumbnail width="700"}

### Go further

To go further you can look at our guides on:

- [Managing users and projects](/pages/public_cloud/containers_orchestration/managed_private_registry/managing-users-and-projects).
- [Creating and using a private image](/pages/public_cloud/containers_orchestration/managed_private_registry/creating-and-using-a-private-image).
Original file line number Diff line number Diff line change
@@ -0,0 +1,114 @@
---
title: 'Configure access control using OVHcloud IAM on an OVHcloud Managed Private Registry'
excerpt: 'Learn how to enable and manage OVHcloud IAM authentication to control access to your Managed Private Registry (MPR) using centralized identities and roles.'
updated: 2025-07-21
---

## Objective

OVHcloud Managed Private Registry (MPR) supports authentication through OVHcloud IAM, allowing you to manage access using centralized user identities and roles. This guide explains how to enable IAM authentication and control user access to your registry using OVHcloud IAM users and roles.

## Requirements

- An OVHcloud Managed Private Registry (see the [creating a private registry](/pages/public_cloud/containers_orchestration/managed_private_registry/creating-a-private-registry) guide for more information)
- An access to the Harbor UI to operate the private registry (see the [connecting to the UI](/pages/public_cloud/containers_orchestration/managed_private_registry/connecting-to-the-ui) guide for more information)

## Instructions

### Introduction to OVHcloud IAM

OVHcloud IAM (Identity and Access Management) is a centralized system that lets you manage who can access your OVHcloud services and what they are allowed to do. It provides fine-grained access control through users, groups, and roles.

When used with Managed Private Registry (MPR), OVHcloud IAM replaces Harbor’s local user database. This enables you to:

- Use SSO (Single Sign-On) with your OVHcloud credentials to access Harbor.
- Assign predefined IAM roles (admin, standard) to control access levels.
- Manage permissions at scale using IAM groups and projects.

By integrating IAM with your registry, you ensure consistent access control across your OVHcloud services — reducing manual management and improving security.

### Activate/Disable authentication via OVHcloud IAM

> [!warning]
>
> When you enable OVHcloud IAM authentication on your Managed Private Registry:
>
> - All existing Harbor users and robot accounts will be removed.
> - Existing robot accounts will continue to function, but you will no longer be able to create or manage them directly in Harbor.
> - From this point on, access is fully managed via OVHcloud IAM users and roles.
>

Log in to the [OVHcloud Control Panel](/links/manager), navigate to the `Public Cloud`{.action} section, and select the relevant project. Then, in the left-hand menu under **Containers & Orchestration**, click on `Managed Private Registry`{.action}.

In the list of registries, click the `...`{.action} button on the relevant line, then choose:

- `Activate authentication via OVHcloud IAM`{.action} to enable it.

![activate IAM](images/activate_iam.png){.thumbnail}

- `Disable authentication via OVHcloud IAM`{.action} to disable it.

![diasable IAM](images/disable_iam.png){.thumbnail}

### Authentication using SSO with OVHcloud IAM users

Once IAM authentication is enabled, access to the Harbor UI is handled via OVHcloud Single Sign-On (SSO). Users no longer log in with Harbor-local credentials but authenticate directly using their OVHcloud IAM identity.

To log in via SSO:

- Open the `Harbor user interface`{.action} from the Control Panel.

![harbor user interface](images/harbor_interface.png){.thumbnail}

- You will be redirected to the OVHcloud authentication page, log in using your OVHcloud IAM credentials.

![login with SSO](images/iam_authentication.png){.thumbnail}

- Access to Harbor is granted based on the IAM role associated with your user account.

> [!primary]
>
> Only users with the appropriate IAM role (admin or standard) can access the registry after IAM authentication is enabled.
>

### Managing access rights with OVHcloud IAM

OVHcloud IAM provides two predefined roles for managing access to your Managed Private Registry (MPR):

- Standard
- Admin

> [!primary]
>
> **Admin** role: Regardless of the user group defined in the Identities section, assigning the Admin role will grant full administrative privileges on the selected registry.
>
> **Standard** role: Make sure users assigned to the Standard role do not belong to the Default group in the `Identities` section. This group has elevated rights by default (including admin-level access with limited capabilities, such as no user creation). To ensure clean separation of roles, we recommend:
>
> - Organizing users into clearly defined groups.
> - After changing a user’s group and assigning the Standard role, fine-tune their permissions directly in Harbor for better control and consistency. See the different roles in Harbor [here.](https://goharbor.io/docs/1.10/administration/managing-users/user-permissions-by-role/){.external}
>

These roles are assigned through IAM policies. To create and configure a policy: pour configurer une policy, navigate to the `Identity, Security & Operations`{.action} sectiont. Then, in the left-hand menu under **Identity and Access management**, click on `Policies`{.action} and click on `Create a policy`{.action} button.

In the OVHcloud Control Panel, go to the `Identity, Security & Operations`{.action} section. In the left-hand menu, under `Identity and Access Management`, click on `Policies`{.action} and `Create a policy`{.action}.

![Create policy](images/managing_iam.png){.thumbnail}

Define users and groups, name your policy, add the users you want to include and optionally, add user groups if they have already been created.

![Create policy users](images/create_policy.png){.thumbnail width="700"}

Set permissions for MPR, in the `Product types` section, select `Public Cloud Project/Managed Registry`. In `Resources`, choose the specific MPR instance to which the policy will apply.

![Create policy product types](images/create_policy_product_types.png){.thumbnail}

Expand `Public Cloud Project/Managed Registry` and select the desired role for the users defined in the policy.

![Create policy roles](images/create_policy_action.png){.thumbnail width="700"}

### Go further

To go further you can look at our guides on:

- [Managing users and projects](/pages/public_cloud/containers_orchestration/managed_private_registry/managing-users-and-projects).
- [Creating and using a private image](/pages/public_cloud/containers_orchestration/managed_private_registry/creating-and-using-a-private-image).
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
id: 6a391b22-7e64-411b-a379-7c4468804d2e
full_slug: public-cloud-private-registry-iam-authentication