Registry Access Management

Early Access

Docker Admin is an early access product.

It's currently available to all company owners and organization owners that have a Docker Business or Docker Team subscription. You can still manage companies and organizations in Docker Hub. For details about managing companies or organizations in Docker Hub, see Administration and security.


Registry Access Management is available to Docker Business customers only.

With Registry Access Management (RAM), administrators can ensure that their developers using Docker Desktop only access registries that are allowed. This is done through the Registry Access Management dashboard on Docker Hub.

Registry Access Management supports both cloud and on-prem registries. Example registries administrators can allow include:

  • Docker Hub. This is enabled by default.
  • Amazon ECR
  • GitHub Container Registry
  • Google Container Registry
  • Nexus
  • Artifactory


You need to configure a registry.json to enforce sign-in. For Registry Access Management to take effect, Docker Desktop users must authenticate to your organization.

Configure Registry Access Management permissions

To configure Registry Access Management permissions, perform the following steps:

  1. Sign in to Docker Adminopen_in_new.

  2. Select Organizations, your organization, Settings, and then select Registry Access.

  3. Enable Registry Access Management to set the permissions for your registry.


    When enabled, the Docker Hub registry is set by default, however you can also restrict this registry for your developers.

  4. Select Add and enter your registry details in the applicable fields, and then select Create to add the registry to your list.

  5. Verify that the registry appears in your list and select Save & Apply.


    Once you add a registry, it can take up to 24 hours for the changes to be enforced on your developers’ machines. If you want to apply the changes sooner, you must force a Docker logout on your developers’ machine and have the developers re-authenticate for Docker Desktop. Also, there is no limit on the number of registries you can add. See the Caveats section below to learn more about limitations when using this feature.


    Since RAM sets policies about where content can be fetched from, the ADD instruction of the Dockerfile, when the parameter of the ADD instruction is a URL, is also subject to registry restrictions. It's recommended that you add the domains of URL parameters to the list of allowed registry addresses under the Registry Access Management settings of your organization.

Verify the restrictions

The new Registry Access Management policy takes effect after the developer successfully authenticates to Docker Desktop using their organization credentials. If a developer attempts to pull an image from a disallowed registry via the Docker CLI, they receive an error message that the organization has disallowed this registry.


There are certain limitations when using Registry Access Management; they are as follows:

  • Windows image pulls, and image builds are not restricted
  • Builds such as docker buildx using a Kubernetes driver are not restricted
  • Builds such as docker buildx using a custom docker-container driver are not restricted
  • Blocking is DNS-based; you must use a registry's access control mechanisms to distinguish between “push” and “pull”
  • WSL 2 requires at least a 5.4 series Linux kernel (this does not apply to earlier Linux kernel series)
  • Under the WSL 2 network, traffic from all Linux distributions is restricted (this will be resolved in the updated 5.15 series Linux kernel)

Also, Registry Access Management operates on the level of hosts, not IP addresses. Developers can bypass this restriction within their domain resolution, for example by running Docker against a local proxy or modifying their operating system's sts file. Blocking these forms of manipulation is outside the remit of Docker Desktop.