Azure Container Registry

You can integrate your Azure Container Registry with Aikido to scan your containers for known vulnerabilities.

Follow the simple steps below to activate this feature:

Step 1: Log into your Azure account and navigate to the container registry you wish to link. We'll have to gather the registry name (login server), a secret token and the token username. The registry name can be found at the top of the detail page of the registry (see screenshot)

Azure resource details: group, location, login server, and creation date displayed.

Step 2: To create a secret token that can pull the containers, scroll down in the left-hand menu to the 'Repository permission' section and click 'Tokens'. Name the token 'aikido' and create a new scope map. Aikido will need the 'content/read' scope to pull the images and the 'metadata/read' scope to list the images and tags available in your registry.

You can give Aikido access to all the images in the registry by using the '*' wildcard character in the repository field. Alternatively, you can only give Aikido access to certain images by adding the permissions for each one.

Creating a token with custom scope map and read-only repository permissions.

After creating the token you have to click it again to generate a password. That screen should look like the one below:

Password generation screen prompting user to securely save new password and Docker login command.

Step 3: Back in Aikido, go to settings, then containersarrow-up-right. Click 'Connect registry' and pick

Azure Container Registry. Enter the data from the previous steps. Username being the Token name.

Login form for accessing a private Azure container registry.

Step 4: Aikido will now find all container repositories you can access and list them.

Step 5: Repositories can be linked to a code repository in order to perform better deduplication of findings. This step is optional!

Step 6: In the action menu next to the registry, click 'scan repos in registry' to get started. Results will appear in the Feed!

Last updated

Was this helpful?