Chapter 4. Creating the first user


This section guides you through creating the initial administrative user for your Red Hat Quay registry. Completing this step confirms that your deployment is fully operational and grants you the necessary credentials to begin using and managing your registry. This can be completed by using the Red Hat Quay UI or by leveraging the API.

4.1. Creating the first user by using the UI

Creating the first user by using the UI offers a visual workflow and is often preferred after initial setup to ensure that the user interface is functional. For most users, the UI offers a simpler path to creating the first user, as it does not require additional configuration in the config.yaml file.

Prerequisites

  • You have deployed the Red Hat Quay registry.

Procedure

  1. On the OpenShift Container Platform web console, click Operators Installed Operators Red Hat Quay.
  2. On the Red Hat Quay Operators page, click Quay Registry, and then the name of your registry.
  3. On the QuayRegistry details page, click the Registry Endpoint link, for example, example-registry-quay.username-cluster-new.gcp.quaydev.org. You are navigated to the registry’s main page.
  4. Click Create Account.
  5. Enter the details for Username, Password, Email, and then click Create Account. After creating the first user, you are automatically logged in to the Red Hat Quay registry.

4.2. Using the API to create the first user

You can use the API to create the first user with administrative privileges for your registry.

Prerequisites

  • You have set FEATURE_USER_INITIALIZE: true and established a superuser in your config.yaml file. For example:

    # ...
    FEATURE_USER_INITIALIZE: true
    SUPER_USERS:
         -  <username>
    # ..
    Copy to Clipboard Toggle word wrap

    If you did not configure these settings upon registry creation, and need to re-configure your registry to enable these settings, see "Enabling features after deployment".

  • You have not created a user by using the Red Hat Quay UI.

Procedure

  1. On the command-line interface, generate a new user with a username, password, email, and access token by entering the following CURL command:

    $ curl -X POST -k  http:/</quay-server.example.com>/api/v1/user/initialize --header 'Content-Type: application/json' --data '{ "username": "<username>", "password":"<password>", "email": "<email>@example.com", "access_token": true}'
    Copy to Clipboard Toggle word wrap

    If successful, the command returns an object with the username, email, and encrypted password. For example:

    {"access_token":"123456789", "email":"quayadmin@example.com","encrypted_password":"<password>","username":"quayadmin"} # gitleaks:allow
    Copy to Clipboard Toggle word wrap

    If a user already exists in the database, an error is returned. For example:

    {"message":"Cannot initialize user in a non-empty database"}
    Copy to Clipboard Toggle word wrap

    If your password is not at least eight characters or contains whitespace, an error is returned. For example:

    {"message":"Failed to initialize user: Invalid password, password must be at least 8 characters and contain no whitespace."}
    Copy to Clipboard Toggle word wrap
  2. You can log in to your registry by navigating to the UI or by leveraging Podman on the CLI.

    1. Log in to the registry by running the following podman command:

      $ podman login -u <username> -p <password> http://<quay-server.example.com>
      Copy to Clipboard Toggle word wrap

      Example output

      Login Succeeded!
      Copy to Clipboard Toggle word wrap

Back to top
Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2025 Red Hat