content/manuals/enterprise/security/hardened-desktop/registry-access-management.md
{{< summary-bar feature_name="Registry access management" >}}
Registry Access Management (RAM) lets administrators control which container registries developers can access through Docker Desktop. This DNS-level filtering ensures developers only pull and push images from approved registries, improving supply chain security.
RAM works with all registry types including cloud services, on-premises registries, and registry mirrors. You can allow any hostname or domain, but must include redirect domains (like s3.amazonaws.com for some registries) in your allowlist.
Registry Access Management works with any container registry, including:
Before configuring Registry Access Management, you must:
[!IMPORTANT]
Registry Access Management only takes effect when users are signed in to Docker Desktop with organization credentials.
To configure registry permissions:
Changes can take up to 24 hours to take effect. To apply them sooner, have developers sign out and back in to Docker Desktop.
[!IMPORTANT]
Starting with Docker Desktop 4.36, if a developer belongs to multiple organizations with different RAM policies, only the policy for the first organization in the configuration file is enforced.
[!TIP]
RAM restrictions also apply to Dockerfile
ADDinstructions that fetch content via URL. Include trusted registry domains in your allowlist when usingADDwith URLs.
RAM is designed for container registries, not general-purpose URLs like package mirrors or storage services. Adding too many domains may cause errors or hit system limits.
After users sign in to Docker Desktop with their organization credentials, Registry Access Management takes effect immediately.
When users try to pull from a blocked registry:
$ docker pull blocked-registry.com/image:tag
Error response from daemon: registry access to blocked-registry.com is not allowed
Allowed registry access works normally:
$ docker pull allowed-registry.com/image:tag
# Pull succeeds
Registry restrictions apply to all Docker operations including pulls, pushes, and builds that reference external registries.
Registry Access Management has these limits and platform-specific behaviors:
These scenarios are not restricted by Registry Access Management:
Users can potentially bypass Registry Access Management through:
To maximize security effectiveness:
Include all registry domains: Some registries redirect to multiple domains. For AWS ECR, include:
your-account.dkr.ecr.us-west-2.amazonaws.com
amazonaws.com
s3.amazonaws.com
Practice regular allowlist maintenance:
Test configuration changes: