Azure Container Registry Now Supports Entra ABAC for Repository and Namespace Permissions
johshmsft outlines the new support for Microsoft Entra ABAC in Azure Container Registry, showing how teams can enforce least-privilege boundaries for repositories and namespaces with fine-grained security controls.
Azure Container Registry Repository Permissions with Attribute-based Access Control (ABAC)
Overview
Microsoft has announced general availability for Attribute-Based Access Control (ABAC) support in Azure Container Registry (ACR), powered by Microsoft Entra ID. This addition allows organizations to enforce least-privilege permissions with fine granularity at the repository and namespace level. ABAC integrates with the existing Azure RBAC model, letting teams scope role assignments to specific repositories or entire logical namespaces—ideal for modern multi-tenant platforms where central registries serve many domains.
Why ABAC Matters
Centralized container registries increasingly host artifacts for multiple business units. With ABAC:
- CI/CD pipelines can push images only to authorized namespaces and repositories.
- Consumers like Azure Kubernetes Service (AKS) clusters, Azure Container Apps (ACA), and Azure Container Instances (ACI) can pull images only from permitted locations.
- Explicit permission boundaries align with zero trust and supply chain hardening strategies using standard Microsoft Entra identities.
Configuring ABAC in ACR
ACR registries now offer a “RBAC Registry + ABAC Repository Permissions” mode:
- Registry admins can add optional ABAC conditions during Azure RBAC assignments.
- Conditions scope permissions to specific repositories or namespace prefixes.
- ABAC is available for new and existing registries across all SKUs.
How to Enable ABAC
- Set “RBAC Registry + ABAC Repository Permissions” during registry creation, or change in Portal Properties for existing registries.
Built-in ABAC-Enabled Roles
Three new ABAC-scoped roles are available:
- Container Registry Repository Reader: Pull images, read metadata, resolve tags.
- Container Registry Repository Writer: Includes reader permissions plus image/tag push rights.
- Container Registry Repository Contributor: Reader and writer rights plus delete permissions.
Note: Listing repositories requires “Container Registry Repository Catalog Lister”, which does not support ABAC scoping—assigning it grants list permissions across the whole registry.
Important Role Changes in ABAC Mode
In ABAC-enabled registries:
- Legacy roles (AcrPull/AcrPush/AcrDelete) are no longer honored. Use new ABAC-enabled roles instead.
- Broad roles (Owner, Contributor, Reader) now only grant control plane permissions; they do not allow image push/pull/delete or repository listing.
- Tasks and quick builds no longer inherit default data-plane permissions—explicit ABAC-based role assignments are mandatory.
Role Assignment Scenarios
ABAC uses Microsoft Entra assignments for:
- Individual users, groups, service principals
- Managed identities for workloads (AKS, ACA, ACI kubelets)
Next Steps
- Begin enforcing least-privilege boundaries in ACR registries using ABAC for CI/CD and runtime scenarios.
- ABAC is recommended for multi-tenant platforms and central registry deployments.
- For setup instructions, see the official ACR ABAC documentation
References
Version
Published Nov 05, 2025 Version 1.0
Author: johshmsft
This post appeared first on “Microsoft Tech Community”. Read the entire article here