The operations that are performed by the Harbor system administrator are the following.

    • Select database, LDAP/Active Directory, or OIDC based authentication. For information, see .
    • Add users in database authentication mode and assign the system administrator role to other users. For information, see Managing Users.
    • Configure global settings, such as configuring an email server, setting the registry to read-only mode, and restriction who can create projects. For information, see .
    • Apply resource quotas to projects. For information, see Configure Project Quotas.
    • Set up vulnerability scanners to check the images in the registry for CVE vulnerabilities. For information, see .
    • Perform garbage collection, to remove unnecessary data from Harbor. For information, see Garbage Collection.
    • Upgrade Harbor when a new version becomes available. For information, see .