The operations that are performed by the Harbor system administrator are the following.

    • Select database, LDAP/Active Directory, or OIDC based authentication. For information, see .
    • Add users in database authentication mode and assign the system administrator role to other users. For information, see Managing Users.
    • Configure global settings, such as configuring an email server, setting the registry to read-only mode, and restriction who can create projects. For information, see .
    • Apply resource quotas to projects. For information, see Configure Project Quotas.
    • Set up replication of images between Harbor and another Harbor instance or a 3rd party replication target. For information, see .
    • Set up vulnerability scanners to check the images in the registry for CVE vulnerabilities. For information, see Vulnerability Scanning.
    • Perform garbage collection, to remove unnecessary data from Harbor. For information, see .
    • Set up P2P preheat provider instances to preheat the specified images into the P2P network. For information, see P2P preheat.
    • Details of defining a user-defined OCI artifact so that Harbor can manage it. For information, see .