The operations that are performed by the Harbor system administrator are the following.
- Select database, LDAP/Active Directory, or OIDC based authentication. For information, see .
- Add users in database authentication mode and assign the system administrator role to other users. For information, see Managing Users.
- Configure global settings, such as configuring an email server, setting the registry to read-only mode, and restriction who can create projects. For information, see .
- Apply resource quotas to projects. For information, see Configure Project Quotas.
- Set up vulnerability scanners to check the images in the registry for CVE vulnerabilities. For information, see .
- Perform garbage collection, to remove unnecessary data from Harbor. For information, see Garbage Collection.
- Upgrade Harbor when a new version becomes available. For information, see .