The operations that are performed by the Harbor system administrator are the following.
- Select database, LDAP/Active Directory, or OIDC based authentication. For information, see .
- Add users in database authentication mode and assign the system administrator role to other users. For information, see Managing Users.
- Configure global settings, such as setting the registry to read-only mode, and restriction who can create projects. For information, see .
- Apply resource quotas to projects. For information, see Configure Project Quotas.
- Set up replication of images between Harbor and another Harbor instance or a 3rd party replication target. For information, see .
- Set up vulnerability scanners to check the images in the registry for CVE vulnerabilities. For information, see Vulnerability Scanning.
- Perform garbage collection, to remove unnecessary data from Harbor. For information, see .
- Manage audit logs by configuring an audit log retention window and setting a syslog endpoint to forward audit logs.For information, see Log Rotation.
- Set up P2P preheat provider instances to preheat the specified images into the P2P network. For information, see .
- Details of defining a user-defined OCI artifact so that Harbor can manage it. For information, see user-defined OCI artifact.