Chapter 2. The managed configuration approach


In enterprise environments, administrators can enforce specific configuration values that users cannot override. This capability allows them to manage configurations, such as proxy servers, telemetry policies, and security policies, ensuring users operate within a controlled environment. Administrators can review and edit the configurations in the user settings file before applying the changes globally to all enterprise users. This managed configuration approach improves operational consistency and compliance while reducing security risks.

Also, administrators can implement default configurations that follow the company’s internal registries, workflows, and settings. These configurations accelerate the adoption of Red Hat build of Podman Desktop among users.

2.1. Purpose

Managed configuration enables enterprise administrators to do the following:

  • Enforce corporate policies across all user installations
  • Control proxy settings for network compliance
  • Manage telemetry and privacy settings
  • Apply consistent security policies
  • Prevent users from overriding critical settings
  • Define an internal mirror for container images

2.2. Benefits

  • Centralized Management: Apply configuration changes globally across the enterprise
  • Policy Enforcement: Ensure compliance with corporate policies
  • Security: Lock critical settings to prevent unauthorized changes
  • Transparency: Users are notified when settings are managed by administrators

2.3. Configuration file types and their purpose

Red Hat build of Podman Desktop stores configuration values in three separate JSON files:

  • User configuration (settings.json file): Editable values for user customization. Users can modify these settings through the Red Hat build of Podman Desktop UI or by editing the file directly. The file is stored in the user’s home directory.
  • Managed defaults configuration (default-settings.json file): Read-only administrator-enforced default values that cannot be edited by the user. These values serve as fallback values when a setting is not configured in the user configuration file. On startup, Red Hat build of Podman Desktop checks the default-settings.json file and automatically does the following:

    • Applies only those default settings that do not exist in the user’s settings.json file.
    • Does not apply a setting if it is already defined or set to the default value in the user’s settings.json file. This allows administrators to preconfigure settings for new users while respecting existing user preferences.
  • Locked configuration (locked.json file): Read-only administrator-enforced list of keys that must use values from the managed defaults configuration file. When a key is locked, users cannot override its value, even if they attempt to modify it in their user configuration settings.json file or through the UI.

    • If a setting is locked in the locked.json file, its value is always read from the default-settings.json file, ignoring the user’s file.
    • Administrators use the locked settings to enforce compliance.

When a configuration changes, Red Hat build of Podman Desktop returns a value after checking the user configuration files in the following priority order:

  1. Locked keys - Return a value from the managed defaults configuration file, which is of highest priority
  2. Unlocked keys - Return a value from the user configuration file
  3. Default value - Return the default value built into Red Hat build of Podman Desktop

2.3.1. Locked configuration impact on users

In Red Hat build of Podman Desktop, a setting locked by an administrator restricts user interaction with that setting.

User interface impact

When a setting is locked, users can see its impact in the following aspects:

  • Red Hat build of Podman Desktop UI: The setting appears grayed out or displays a lock icon.
  • settings.json file: Changes to locked keys in the user’s settings file are ignored.
  • Log output: Log messages indicate when locked values, with a Managed label or lock icon next to the setting, are being used. This ensures transparency about which settings users can and cannot control.

Other constraints

  • Locked settings cannot be modified through the Red Hat build of Podman Desktop UI.
  • Attempts to edit locked keys in the user configuration file are ignored.
  • Red Hat build of Podman Desktop always uses the value from the managed defaults configuration file for locked keys.
  • Users can view the locked values but cannot change them.

This reference provides a quick lookup table for all configuration file locations across different operating systems.

Expand
Table 2.1. Location of configuration files
Configuration TypeLinuxmacOSWindows

User configuration

~/.local/share/redhat/podman-desktop/configuration/settings.json

~/.local/share/redhat/podman-desktop/configuration/settings.json

%USERPROFILE%\.local\share\redhat\podman-desktop\configuration\settings.json

Managed defaults

/usr/share/rh-podman-desktop/default-settings.json

/Library/Application Support/com.redhat.PodmanDesktop/default-settings.json

%PROGRAMDATA%\Red Hat\Podman Desktop\default-settings.json

Locked configuration

/usr/share/rh-podman-desktop/locked.json

/Library/Application Support/com.redhat.PodmanDesktop/locked.json

%PROGRAMDATA%\Red Hat\Podman Desktop\locked.json

2.4.1. Permissions

Expand
Table 2.2. Permission granted to configuration files
Configuration TypeRequired Permissions

User configuration

User read/write

Managed defaults

Root/Administrator only

Locked configuration

Root/Administrator only

Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2026 Red Hat
Back to top