Using the latest version?
JFrog Container Registry Guide

Skip to end of metadata
Go to start of metadata


JFrog Container Registry offers access tokens as a new and flexible means of authentication with a range of capabilities previously unavailable:

  • Cross-instance authentication
    Access tokens can be used for authentication, not only by the JFrog Container Registry instance or cluster where they were created, but also for other instances and clusters that are all part of the same "circle of trust".
  • User and non-user authentication
    The case for authenticating JFrog Container Registry users is clear, however access tokens can also be assigned to non-user entities such as CI server jobs.

  • Time-based access control 
    Access tokens have an expiry period so you can control the period of time for which you grant access. However, you may also delegate that control to the receiving user by making them refreshable

  • Flexible scope 
    By assigning Groups to tokens, you can control the level of access they provide.

Visit the JFrog Access User Guide

For more information, including full details on how to use Access Tokens, visit the Access Tokens page in the JFrog Access User Guide

Page Contents

  • No labels