Configure Settings Management with a JSON file

Subscription: Business
For: Administrators

Settings Management lets you configure and enforce Docker Desktop settings across your organization using an admin-settings.json file. This standardizes Docker Desktop environments and ensures consistent configurations for all users.

Prerequisites

Before you begin, make sure you have:

Docker Desktop only applies settings from the admin-settings.json file when both authentication and Docker Business license checks succeed.

Important

Users must be signed in and part of a Docker Business organization. If either condition isn't met, the settings file is ignored.

Step one: Create the settings file

You can create the admin-settings.json file in two ways:

  • Use the --admin-settings installer flag to auto-generate the file:
  • Create it manually and place it in the following locations:
    • Mac: /Library/Application\ Support/com.docker.docker/admin-settings.json
    • Windows: C:\ProgramData\DockerDesktop\admin-settings.json
    • Linux: /usr/share/docker-desktop/admin-settings.json
Important

Place the file in a protected directory to prevent unauthorized changes. Use Mobile Device Management (MDM) tools like Jamf to distribute the file at scale across your organization.

Step two: Configure settings

Tip

For a complete list of available settings, their supported platforms, and which configuration methods they work with, see the Settings reference.

The admin-settings.json file uses structured keys to define configurable settings and whether values are enforced.

Each setting supports a locked field that controls user permissions:

  • When locked is set to true, users can't change that value in Docker Desktop, the CLI, or config files.
  • When locked is set to false, the value acts like a default suggestion and users can still update it.

Settings where locked is set to false are ignored on existing installs if a user has already customized that value in settings-store.json, settings.json, or daemon.json.

Grouped settings

Docker Desktop groups some settings together with a single toggle that controls the entire section. These include:

  • Enhanced Container Isolation (ECI): Uses a main toggle (enhancedContainerIsolation) that enables/disables the entire feature, with sub-settings for specific configurations
  • Kubernetes: Uses a main toggle (kubernetes.enabled) with sub-settings for cluster configuration
  • Docker Scout: Groups settings under the scout object

When configuring grouped settings:

  1. Set the main toggle to enable the feature
  2. Configure sub-settings within that group
  3. When you lock the main toggle, users cannot modify any settings in that group

Example for enhancedContainerIsolation:

"enhancedContainerIsolation": {   "locked": true,  // This locks the entire ECI section   "value": true,   // This enables ECI   "dockerSocketMount": {  // These are sub-settings     "imageList": {       "images": ["docker.io/testcontainers/ryuk:*"]     }   } }

Example admin-settings.json file

The following sample is an admin-settings.json file with common enterprise settings configured. You can use this example as a template with the admin-settings.json configurations:

{   "configurationFileVersion": 2,   "exposeDockerAPIOnTCP2375": {     "locked": true,     "value": false   },   "proxy": {     "locked": true,     "mode": "system",     "http": "",     "https": "",     "exclude": [],     "windowsDockerdPort": 65000,     "enableKerberosNtlm": false   },   "containersProxy": {     "locked": true,     "mode": "manual",     "http": "",     "https": "",     "exclude": [],     "pac":"",     "transparentPorts": ""   },   "enhancedContainerIsolation": {     "locked": true,     "value": true,     "dockerSocketMount": {       "imageList": {         "images": [           "docker.io/localstack/localstack:*",           "docker.io/testcontainers/ryuk:*"         ]       },       "commandList": {         "type": "deny",         "commands": ["push"]       }     }   },   "linuxVM": {     "wslEngineEnabled": {       "locked": false,       "value": false     },     "dockerDaemonOptions": {       "locked": false,       "value":"{\"debug\": false}"     },     "vpnkitCIDR": {       "locked": false,       "value":"192.168.65.0/24"     }   },   "kubernetes": {      "locked": false,      "enabled": false,      "showSystemContainers": false,      "imagesRepository": ""   },   "windowsContainers": {     "dockerDaemonOptions": {       "locked": false,       "value":"{\"debug\": false}"     }   },   "disableUpdate": {     "locked": false,     "value": false   },   "analyticsEnabled": {     "locked": false,     "value": true   },   "extensionsEnabled": {     "locked": true,     "value": false   },   "scout": {     "locked": false,     "sbomIndexing": true,     "useBackgroundIndexing": true   },   "allowBetaFeatures": {     "locked": false,     "value": false   },   "blockDockerLoad": {     "locked": false,     "value": true   },   "filesharingAllowedDirectories": [     {       "path": "$HOME",       "sharedByDefault": true     },     {       "path":"$TMP",       "sharedByDefault": false     }   ],   "useVirtualizationFrameworkVirtioFS": {     "locked": true,     "value": true   },   "useVirtualizationFrameworkRosetta": {     "locked": true,     "value": true   },   "useGrpcfuse": {     "locked": true,     "value": true   },   "displayedOnboarding": {     "locked": true,     "value": true   },   "desktopTerminalEnabled": {     "locked": false,     "value": false   } }

Step three: Apply the settings

Settings take effect after Docker Desktop restarts and the user signs in.

For new installations:

  1. Launch Docker Desktop.
  2. Sign in with your Docker account.

For existing installations:

  1. Quit Docker Desktop completely.
  2. Relaunch Docker Desktop.
Important

You must fully quit and reopen Docker Desktop. Restarting from the menu isn't sufficient.

admin-settings.json configurations

The following tables describe all available settings in the admin-settings.json file.

Note

Some settings are platform-specific or require minimum Docker Desktop versions. Check the Version column for requirements.

General settings

ParameterOSDescriptionVersion
configurationFileVersionSpecifies the version of the configuration file format.
analyticsEnabledIf value is set to false, Docker Desktop doesn't send usage statistics to Docker.
disableUpdateIf value is set to true, checking for and notifications about Docker Desktop updates is disabled.
extensionsEnabledIf value is set to false, Docker extensions are disabled.
blockDockerLoadIf value is set to true, users are no longer able to run docker load and receive an error if they try to.
displayedOnboardingIf value is set to true, the onboarding survey will not be displayed to new users. Setting value to false has no effect.Docker Desktop version 4.30 and later
desktopTerminalEnabledIf value is set to false, developers cannot use the Docker terminal to interact with the host machine and execute commands directly from Docker Desktop.
exposeDockerAPIOnTCP2375Windows onlyExposes the Docker API on a specified port. If value is set to true, the Docker API is exposed on port 2375. Note: This is unauthenticated and should only be enabled if protected by suitable firewall rules.

File sharing and emulation

ParameterOSDescriptionVersion
filesharingAllowedDirectoriesSpecify which paths your developers can add file shares to. Also accepts $HOME, $TMP, or $TEMP as path variables. When a path is added, its subdirectories are allowed. If sharedByDefault is set to true, that path will be added upon factory reset or when Docker Desktop first starts.
useVirtualizationFrameworkVirtioFSmacOS onlyIf value is set to true, VirtioFS is set as the file sharing mechanism. Note: If both useVirtualizationFrameworkVirtioFS and useGrpcfuse have value set to true, VirtioFS takes precedence. Likewise, if both useVirtualizationFrameworkVirtioFS and useGrpcfuse have value set to false, osxfs is set as the file sharing mechanism.
useGrpcfusemacOS onlyIf value is set to true, gRPC Fuse is set as the file sharing mechanism.
useVirtualizationFrameworkRosettamacOS onlyIf value is set to true, Docker Desktop turns on Rosetta to accelerate x86_64/amd64 binary emulation on Apple Silicon. Note: This also automatically enables Use Virtualization framework.Docker Desktop version 4.29 and later.

Docker Scout

ParameterOSDescriptionVersion
scoutSetting useBackgroundIndexing to false disables automatic indexing of images loaded to the image store. Setting sbomIndexing to false prevents users from being able to index image by inspecting them in Docker Desktop or using docker scout CLI commands.

Proxy settings

ParameterOSDescriptionVersion
proxyIf mode is set to system instead of manual, Docker Desktop gets the proxy values from the system and ignores and values set for http, https and exclude. Change mode to manual to manually configure proxy servers. If the proxy port is custom, specify it in the http or https property, for example "https": "http://myotherproxy.com:4321". The exclude property specifies a comma-separated list of hosts and domains to bypass the proxy.
       windowsDockerdPortWindows onlyExposes Docker Desktop's internal proxy locally on this port for the Windows Docker daemon to connect to. If it is set to 0, a random free port is chosen. If the value is greater than 0, use that exact value for the port. The default value is -1 which disables the option.
       enableKerberosNtlmWhen set to true, Kerberos and NTLM authentication is enabled. Default is false. For more information, see the settings documentation.Docker Desktop version 4.32 and later.

Container proxy

ParameterOSDescriptionVersion
containersProxyCreates air-gapped containers. For more information see Air-Gapped Containers.Docker Desktop version 4.29 and later.

Linux VM settings

ParameterOSDescriptionVersion
linuxVMParameters and settings related to Linux VM options - grouped together here for convenience.
       wslEngineEnabledWindows onlyIf value is set to true, Docker Desktop uses the WSL 2 based engine. This overrides anything that may have been set at installation using the --backend=<backend name> flag.
       dockerDaemonOptionsIf value is set to true, it overrides the options in the Docker Engine config file. See the Docker Engine reference. Note that for added security, a few of the config attributes may be overridden when Enhanced Container Isolation is enabled.
       vpnkitCIDROverrides the network range used for vpnkit DHCP/DNS for *.docker.internal

Windows containers

ParameterOSDescriptionVersion
windowsContainersParameters and settings related to windowsContainers options - grouped together here for convenience.
       dockerDaemonOptionsOverrides the options in the Linux daemon config file. See the Docker Engine reference.
Note

This setting is not available to configure via the Docker Admin Console.

Kubernetes settings

ParameterOSDescriptionVersion
kubernetesIf enabled is set to true, a Kubernetes single-node cluster is started when Docker Desktop starts. If showSystemContainers is set to true, Kubernetes containers are displayed in the Docker Desktop Dashboard and when you run docker ps. The imagesRepository setting lets you specify which repository Docker Desktop pulls control-plane Kubernetes images from.
Note

When using imagesRepository with Enhanced Container Isolation (ECI), add these images to the ECI Docker socket mount image list:

[imagesRepository]/desktop-cloud-provider-kind: [imagesRepository]/desktop-containerd-registry-mirror:

These containers mount the Docker socket, so you must add them to the ECI images list. Otherwise, ECI blocks the mount and Kubernetes won't start.

Networking settings

ParameterOSDescriptionVersion
defaultNetworkingModeWindows and Mac onlyDefines the default IP protocol for new Docker networks: dual-stack (IPv4 + IPv6, default), ipv4only, or ipv6only.Docker Desktop version 4.43 and later.
dnsInhibitionWindows and Mac onlyControls DNS record filtering returned to containers. Options: auto (recommended), ipv4, ipv6, noneDocker Desktop version 4.43 and later.

For more information, see Networking.

Beta features

Important

For Docker Desktop versions 4.41 and earlier, some of these settings lived under the Experimental features tab on the Features in development page.

ParameterOSDescriptionVersion
allowBetaFeaturesIf value is set to true, beta features are enabled.
enableDockerAIIf allowBetaFeatures is true, setting enableDockerAI to true enables Docker AI (Ask Gordon) by default. You can independently control this setting from the allowBetaFeatures setting.
enableInferenceIf allowBetaFeatures is true, setting enableInference to true enables Docker Model Runner by default. You can independently control this setting from the allowBetaFeatures setting.
        enableInferenceTCPEnable host-side TCP support. This setting requires Docker Model Runner setting to be enabled first.
        enableInferenceTCPPortSpecifies the exposed TCP port. This setting requires Docker Model Runner setting to be enabled first.
        enableInferenceCORSSpecifies the allowed CORS origins. Empty string to deny all,* to accept all, or a list of comma-separated values. This setting requires Docker Model Runner setting to be enabled first.
enableDockerMCPToolkitIf allowBetaFeatures is true, setting enableDockerMCPToolkit to true enables the MCP Toolkit feature by default. You can independently control this setting from the allowBetaFeatures setting.
allowExperimentalFeaturesIf value is set to true, experimental features are enabled.Docker Desktop version 4.41 and earlier

Enhanced Container Isolation

ParameterOSDescriptionVersion
enhancedContainerIsolationIf value is set to true, Docker Desktop runs all containers as unprivileged, via the Linux user-namespace, prevents them from modifying sensitive configurations inside the Docker Desktop VM, and uses other advanced techniques to isolate them. For more information, see Enhanced Container Isolation.
       dockerSocketMountBy default, enhanced container isolation blocks bind-mounting the Docker Engine socket into containers (e.g., docker run -v /var/run/docker.sock:/var/run/docker.sock ...). This lets you relax this in a controlled way. See ECI Configuration for more info.
              imageListIndicates which container images are allowed to bind-mount the Docker Engine socket.
              commandListRestricts the commands that containers can issue via the bind-mounted Docker Engine socket.