Templated deployments
Supports out-of-box templates for quick deployment and production-ready configurations and custom templates.
YAML deployments
Customizable YAML deployment method to fully control the configuration of the Harbor instance using Helm values.
Container Registry
Secure storage and distribution of Docker, Helm, OCI, and other container images with role-based access control.
Enhanced Robot Accounts
Improved robot account functionality with additional configuration options for better integration and security management in CI/CD processes.
Speed Limit for Proxy Cache
Control network bandwidth when pulling artifacts from proxy cache projects to optimize resource usage.
Enhanced LDAP Onboarding
Improved LDAP onboarding process for better user login performance and smoother authentication experience.
Multi-Registry Integration
Seamless replication of images to and from various registries including ACR & ACR EE, enhancing interoperability.
Vulnerability Scanning
Built-in vulnerability scanning for container images with support for multiple scanners.
Artifact Management
Comprehensive artifact management with tagging, signing, and retention policies.
Prometheus Metrics
Export Harbor statistics as Prometheus metrics for monitoring and observability.
Project-Level Quotas
Set storage quotas at the project level to control resource usage.
RBAC Security
Fine-grained Role-Based Access Control for users and resources.
For more details about Harbor v2.12 features, please visit Harbor v2.12 Documentation.
IPv6 Network Support
Deploy and operate Harbor instances in IPv6-only or dual-stack network environments, ensuring compatibility with modern network infrastructures.
ARM Architecture Compatibility
Full support for ARM-based infrastructure, enabling deployment on energy-efficient and cost-effective ARM processors for improved performance-to-power ratio.
Security Enhancements
Addresses critical system and application vulnerabilities with proactive patching and security hardening. Includes fixes for CVE-identified issues in core components, dependency security updates, and remediation of potential privilege escalation vectors.