You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/desktop/settings/windows.md
+19-5Lines changed: 19 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -199,11 +199,7 @@ HTTP/HTTPS proxies can be used when:
199
199
If the host uses a HTTP/HTTPS proxy configuration (static or via Proxy Auto-Configuration), Docker Desktop reads
200
200
this configuration
201
201
and automatically uses these settings for signing into Docker, for pulling and pushing images, and for
202
-
container Internet access. If the proxy requires authorization then Docker Desktop dynamically asks
203
-
the developer for a username and password. All passwords are stored securely in the OS credential store.
204
-
Note that only the `Basic` proxy authentication method is supported so we recommend using an `https://`
205
-
URL for your HTTP/HTTPS proxies to protect passwords while in transit on the network. Docker Desktop
206
-
supports TLS 1.3 when communicating with proxies.
202
+
container Internet access.
207
203
208
204
To set a different proxy for Docker Desktop, turn on **Manual proxy configuration** and enter a single
209
205
upstream proxy URL of the form `http://proxy:port` or `https://proxy:port`.
@@ -216,10 +212,28 @@ The HTTPS proxy settings used for scanning images are set using the `HTTPS_PROXY
216
212
If you are running Windows containers in Docker, you can allow the Windows Docker daemon to use Docker Desktop's internal proxy, with the **Use proxy for Windows Docker daemon** setting.
217
213
This is useful when a corporate proxy that requires authentication is manually configured or set at the system level. If you are an admin for your organization and have a Docker Business subscription, you can control this setting with [Settings management](../hardened-desktop/settings-management/configure.md) using the `windowsDockerdPort` parameter.
218
214
215
+
216
+
#### Proxy authentication
217
+
218
+
Docker Desktop supports Basic, Kerberos and NTLM proxy authentication methods.
219
+
220
+
##### Basic authentication
221
+
222
+
If your proxy uses Basic authentication, Docker Desktop prompts developers for a username and password and caches the credentials. All passwords are stored securely in the OS credential store. It will request re-authentication if that cache is removed.
223
+
224
+
It's recommended that you use an `https://` URL for HTTP/HTTPS proxies to protect passwords during network transit. Docker Desktop also supports TLS 1.3 for communication with proxies.
225
+
226
+
##### Kerberos and NTLM authentication
227
+
228
+
Kerberos and NTLM proxy authentication are available for Business subscribers with Docker Desktop version 4.30 and later. No additional configuration is needed beyond specifying the proxy IP address and port.
229
+
230
+
Developers are no longer interrupted by prompts for proxy credentials as authentication is centralized. This also reduces the risk of account lockouts due to incorrect sign in attempts.
231
+
219
232
> **Note**
220
233
>
221
234
> Docker Desktop also supports the use of [SOCKS5 proxies](../networking.md#socks5-proxy-support).
0 commit comments