mirror of https://github.com/docker/docs.git
Merge pull request #1338 from traci-morrison/add-ucp-config-point
Add the new UCP configuration point
This commit is contained in:
commit
0170e73772
|
|
@ -105,20 +105,20 @@ email address, for example, `jane.doe@subsidiary1.com`.
|
|||
## Configure the LDAP integration
|
||||
|
||||
To configure UCP to create and authenticate users by using an LDAP directory,
|
||||
go to the UCP web interface, navigate to the **Admin Settings** page and click
|
||||
go to the UCP web interface, navigate to the **Admin Settings** page, and click
|
||||
**Authentication & Authorization** to select the method used to create and
|
||||
authenticate users.
|
||||
authenticate users. [Learn about additional UCP configuration options](../../configure/ucp-configuration-file.md#configuration-options).
|
||||
|
||||

|
||||
|
||||
In the **LDAP Enabled** section, click **Yes** to The LDAP settings appear.
|
||||
In the **LDAP Enabled** section, click **Yes**.
|
||||
Now configure your LDAP directory integration.
|
||||
|
||||
## Default role for all private collections
|
||||
|
||||
Use this setting to change the default permissions of new users.
|
||||
|
||||
Click the dropdown to select the permission level that UCP assigns by default
|
||||
Click the drop-down menu to select the permission level that UCP assigns by default
|
||||
to the private collections of new users. For example, if you change the value
|
||||
to `View Only`, all users who log in for the first time after the setting is
|
||||
changed have `View Only` access to their private collections, but permissions
|
||||
|
|
@ -141,13 +141,16 @@ Click **Yes** to enable integrating UCP users and teams with LDAP servers.
|
|||
| No simple pagination | If your LDAP server doesn't support pagination. |
|
||||
| Just-In-Time User Provisioning | Whether to create user accounts only when users log in for the first time. The default value of `true` is recommended. If you upgraded from UCP 2.0.x, the default is `false`. |
|
||||
|
||||
> **Note**: LDAP connections using certificates created with TLS v1.2 do not currently advertise support for sha512WithRSAEncryption in the TLS handshake which leads to issues establishing connections with some clients. Support for advertising sha512WithRSAEncryption will be added in UCP 3.1.0.
|
||||
> Note
|
||||
>
|
||||
> LDAP connections using certificates created with TLS v1.2 do not currently advertise support for sha512WithRSAEncryption in the TLS handshake which leads to issues establishing connections with
|
||||
> some clients. Support for advertising sha512WithRSAEncryption will be added in UCP 3.1.0.
|
||||
|
||||
{: .with-border}
|
||||
|
||||
Click **Confirm** to add your LDAP domain.
|
||||
|
||||
To integrate with more LDAP servers, click **Add LDAP Domain**.
|
||||
To integrate with more LDAP servers, click **Add LDAP Domain**.
|
||||
|
||||
## LDAP user search configurations
|
||||
|
||||
|
|
|
|||
|
|
@ -82,6 +82,7 @@ docker container run --rm {{ page.ucp_org }}/{{ page.ucp_repo }}:{{ page.ucp_ver
|
|||
| `lifetime_minutes` | no | The initial session lifetime, in minutes. The default is 60 minutes. |
|
||||
| `renewal_threshold_minutes` | no | The length of time, in minutes, before the expiration of a session where, if used, a session will be extended by the current configured lifetime from then. A zero value disables session extension. The default is 20 minutes. |
|
||||
| `per_user_limit` | no | The maximum number of sessions that a user can have active simultaneously. If creating a new session would put a user over this limit, the least recently used session will be deleted. A value of zero disables limiting the number of sessions that users may have. The default is 10. |
|
||||
| `store_token_per_session` | no | If set, the user token is stored in `sessionStorage` instead of `localStorage`. Note that this option will log the user out and require them to log back in since they are actively changing how their authentication is stored. |
|
||||
|
||||
### registries array (optional)
|
||||
|
||||
|
|
@ -107,7 +108,9 @@ Configures audit logging options for UCP components.
|
|||
|
||||
Specifies scheduling options and the default orchestrator for new nodes.
|
||||
|
||||
> **Note**: If you run the `kubectl` command, such as `kubectl describe nodes`, to view scheduling rules on Kubernetes nodes, it does not reflect what is configured in UCP Admin settings. UCP uses taints to control container scheduling on nodes and is unrelated to kubectl's `Unschedulable` boolean flag.
|
||||
> Note
|
||||
>
|
||||
> If you run the `kubectl` command, such as `kubectl describe nodes`, to view scheduling rules on Kubernetes nodes, it does not reflect what is configured in UCP Admin settings. UCP uses taints to control container scheduling on nodes and is unrelated to kubectl's `Unschedulable` boolean flag.
|
||||
|
||||
| Parameter | Required | Description |
|
||||
|:------------------------------|:---------|:-------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
|
|
@ -136,7 +139,9 @@ Specifies whether DTR images require signing.
|
|||
|
||||
### log_configuration table (optional)
|
||||
|
||||
> Note: This feature has been deprecated. Refer to the [Deprecation notice](https://docs.docker.com/ee/ucp/release-notes/#deprecation-notice) for additional information.
|
||||
> Note
|
||||
>
|
||||
> This feature has been deprecated. Refer to the [Deprecation notice](https://docs.docker.com/ee/ucp/release-notes/#deprecation-notice) for additional information.
|
||||
|
||||
Configures the logging options for UCP components.
|
||||
|
||||
|
|
@ -223,8 +228,9 @@ components. Assigning these values overrides the settings in a container's
|
|||
| `worker_kube_reserved_resources` | no | Reserve resources for Docker UCP and Kubernetes components which are running on worker nodes. |
|
||||
| `kubelet_max_pods` | yes | Set Number of Pods that can run on a node. Default is `110`.
|
||||
|
||||
|
||||
*dev indicates that the functionality is only for development and testing. Arbitrary Kubernetes configuration parameters are not tested and supported under the Docker Enterprise Software Support Agreement.
|
||||
> Note
|
||||
>
|
||||
> dev indicates that the functionality is only for development and testing. Arbitrary Kubernetes configuration parameters are not tested and supported under the Docker Enterprise Software Support Agreement.
|
||||
|
||||
### iSCSI (optional)
|
||||
Configures iSCSI options for UCP.
|
||||
|
|
|
|||
Loading…
Reference in New Issue