Chapter 2. Set up a custom registry


You can configure authentication for any container registry, including custom registries that are not available in the pre-configured list. In the Red Hat build of Podman Desktop UI, you can add and authenticate with any registry by providing the registry location and your credentials.

Note

As an administrator, you can edit the managed defaults and locked configuration files to lock the values for the registries.defaults option. This helps in configuring default registries and their mirrors for your enterprise needs. For more details, refer to Deploy a managed user environment.

Prerequisites

Ensure that you have:

  • Authentication details for your container registry:

    • Registry URL (for example, https://myregistry.tld)
    • User name
    • Password or OAuth secret
  • The fully qualified name of a private image stored in your registry, such as my-registry.tld/my-repository/my-image.
  • The fully qualified image name that your registry requires to push an image, such as my-registry.tld/my-repository/my-image.

Procedure

  1. Go to the Settings > Registries page from the left navigation pane.
  2. Click Add registry at the top right corner of the screen. A pop-up opens.
  3. Enter your registry details:

    1. URL (HTTPS only): Enter your repository URL, such as https://myregistry.tld.
    2. Username: Enter your user name.
    3. Password: Enter your password or OAuth secret.
    4. Click Add.

Verification

  • Red Hat build of Podman Desktop authenticates Podman with your custom registry using the credentials you provided. You can now pull and push images to and from the custom registry.
Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2026 Red Hat
Back to top