From bb94c5077cacfbda25107a5f165ec3af26ba60cc Mon Sep 17 00:00:00 2001 From: Jessica Frazelle Date: Sat, 14 Nov 2015 18:01:24 -0800 Subject: [PATCH] WIP: Update security docs for seccomp/apparmor Signed-off-by: Mary Anthony Updaing and slight re-arrangement of security information Signed-off-by: Mary Anthony Updating security files Signed-off-by: Mary Anthony Updating links to the security documentation Signed-off-by: Mary Anthony removing some extra spaces Signed-off-by: Mary Anthony Correcting spelling Signed-off-by: Mary Anthony --- docs/reference/commandline/login.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/reference/commandline/login.md b/docs/reference/commandline/login.md index b79c18b2c6..faf3615a00 100644 --- a/docs/reference/commandline/login.md +++ b/docs/reference/commandline/login.md @@ -30,7 +30,7 @@ adding the server name. `docker login` requires user to use `sudo` or be `root`, except when: 1. connecting to a remote daemon, such as a `docker-machine` provisioned `docker engine`. -2. user is added to the `docker` group. This will impact the security of your system; the `docker` group is `root` equivalent. See [Docker Daemon Attack Surface](https://docs.docker.com/articles/security/#docker-daemon-attack-surface) for details. +2. user is added to the `docker` group. This will impact the security of your system; the `docker` group is `root` equivalent. See [Docker Daemon Attack Surface](https://docs.docker.com/security/security/#docker-daemon-attack-surface) for details. You can log into any public or private repository for which you have credentials. When you log in, the command stores encoded credentials in