Kaspersky Container Security

Minimum sufficient rights for integration with registries

To integrate with external image registries, a Kaspersky Container Security account must have a certain set of rights, which differs depending on the registry type. The list of the minimum account rights required for integration is given below for each registry type.

GitLab

To integrate the solution with a GitLab user's registry, you should define the parameter values as follows:

  • User role in the project or group: Reporter.
  • Level of access to the project: Reporter.
  • Rights assigned to the user token: read_api, read_registry.

JFrog Artifactory

To integrate the solution with a JFrog user's registry, you should define the parameter values as follows:

  • User role in the project or group: Manage Reports.
  • Project access: Can Update Profile.
  • User rights: the right to read any repository (ANY repository).

Harbor

To integrate the solution with a Harbor user's registry, you should define the parameter values as follows:

  • Member type: user. To do this, specify User in the Member Type column of the table in the ProjectsMembers section.
  • User role in the project or group: user with limited rights. To do this, you must specify Guest in the Role column of the table in the ProjectsMembers section.
  • User rights: user without administrator rights. To do this, you must select No in the Administrator column of the table in the Users section.

Nexus

To integrate the solution with a Nexus user's registry, you should define the parameter values as follows:

  • User role in the project or group: user.
  • Rights assigned to the user role in the project or group: nx-apikey-all, nx-repository-view-docker-*-browse, nx-repository-view-docker-*-read.

Docker Hub

The solution integrates with a Docker Hub user's registry after authorization using the user name and password.

This Docker Hub registry integration option only applies to a personal namespace.

RedHat Quay

To integrate the solution with a RedHat Quay user's registry, the following rights and permissions are required:

  • User permissions for correct operation of the Test Connection functionality: user with the Administer Organization permissions.
  • View all visible repositories permissions.
  • Read/Write to any accessible repositories permissions.

Yandex

To integrate the solution with a Yandex user's registry, you should define the parameter values as follows:

  • User role in the project or group: container-registry.viewer.
  • Permissions given to a user role in a project or group: view container registries.

Amazon Elastic Container Registry

To integrate the solution with an Amazon Elastic Container Registry user's registry, you should define the parameter values as follows:

  • AWS policy for accessing a project or group: AmazonEC2ContainerRegistryReadOnly.
  • Permissions given to a user role in a project or group: view and read.