Merge pull request #22647 from sarahsanders-docker/SCIM

security: improve SCIM intro
This commit is contained in:
Sarah Sanders 2025-05-16 11:19:47 -04:00 committed by GitHub
parent 4fd64ac50b
commit 287a9eff13
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
3 changed files with 45 additions and 12 deletions

View File

@ -70,7 +70,12 @@ This is applicable only when using Docker Hub's application-level password versu
### How do we de-provision users who are not part of our IdP? We use SSO but not SCIM
If SCIM isn't enabled, you have to manually remove users from the organization in our system. Using SCIM automates this.
If SCIM isn't enabled, you have to manually remove users from the organization.
SCIM can automate this if your users are added after SCIM is enabled. Any users
added to your organization before SCIM is enabled must be removed manually.
For more information on manually removing users, see
[Manage organization members](/manuals/admin/organization/members.md).
### What metadata is collected from container images that Scout analyzes?

View File

@ -11,31 +11,46 @@ weight: 30
{{< summary-bar feature_name="SSO" >}}
System for Cross-domain Identity Management (SCIM) is available for Docker Business customers. This guide provides an overview of SCIM provisioning.
System for Cross-domain Identity Management (SCIM) is available for Docker
Business customers. This guide provides an overview of SCIM provisioning.
## How SCIM works
SCIM offers automated user provisioning and de-provisioning for Docker through your identity provider (IdP). Once SCIM is enabled, users assigned to the Docker application in your IdP are automatically provisioned and added to your Docker organization. If a user is unassigned, they are removed from Docker.
SCIM automates user provisioning and de-provisioning for Docker through your
identity provider (IdP). After you enable SCIM, any user assigned to your
Docker application in your IdP is automatically provisioned and added to your
Docker organization. When a user is removed from the Docker application in your
IdP, SCIM deactivates and removes them from your Docker organization.
SCIM also syncs user profile updates, such as name changes, made in your IdP. SCIM can be used with Dockers default Just-in-Time (JIT) provisioning configuration, or on its own with JIT disabled.
In addition to provisioning and removal, SCIM also syncs profile updates like
name changes—made in your IdP. You can use SCIM alongside Dockers default
Just-in-Time (JIT) provisioning or on its own with JIT disabled.
SCIM automates:
SCIM supports the automation of:
- Creating users
- Updating user profiles
- Removing and deactivating users
- Re-activating users
- Group mapping
> [!NOTE]
>
> SCIM only manages users provisioned through your IdP after SCIM is enabled.
It cannot remove users who were manually added to your Docker organization
before SCIM was set up.
>
> To remove those users, delete them manually from your Docker organization.
For more information, see [Manage organization members](/manuals/admin/organization/members.md).
## Supported attributes
> [!IMPORTANT]
>
> Docker uses JIT provisioning by default for SSO configurations. If you enable SCIM, JIT values still overwrite the attribute
values set by SCIM provisioning. To avoid conflicts, your JIT attribute values must match your SCIM attribute values. To avoid conflicts between SCIM and JIT, you can also disable JIT provisioning. See [Just-in-Time](/manuals/security/for-admins/provisioning/just-in-time.md) for more information.
SCIM uses attributes (e.g., name, email) to sync user information between your
IdP and Docker. Properly mapping these attributes in your IdP ensures that user
provisioning works smoothly and prevents issues like duplicate user accounts
when using single sign-on (SSO).
Attributes are pieces of user information, such as name and email, that are synchronized between your IdP and Docker when using SCIM. Proper mapping of these attributes is essential for seamless user provisioning and to prevent duplicate entries when using SSO.
The following table lists the supported attributes for SCIM:
Docker supports the following SCIM attributes:
| Attribute | Description |
|:---------------------------------------------------------------|:-------------------------------------------------------------------------------------------|
@ -46,6 +61,16 @@ The following table lists the supported attributes for SCIM:
For additional details about supported attributes and SCIM, see [Docker Hub API SCIM reference](/reference/api/hub/latest/#tag/scim).
> [!IMPORTANT]
>
> By default, Docker uses Just-in-Time (JIT) provisioning for SSO. If SCIM is
enabled, JIT values still take precedence and will overwrite attribute values
set by SCIM. To avoid conflicts, make sure your JIT attribute values match your
SCIM values.
>
> Alternatively, you can disable JIT provisioning to rely solely on SCIM.
For details, see [Just-in-Time](/manuals/security/for-admins/provisioning/just-in-time.md).
## Enable SCIM in Docker
You must [configure SSO](../single-sign-on/configure/_index.md) before you enable SCIM. Enforcing SSO isn't required to use SCIM.

View File

@ -80,6 +80,7 @@
"Mac-with-Apple-silicon",
"Mac-with-Intel-chip",
"Manually-create-assets",
"Manually-set-it-up",
"NetworkManager",
"Node",
"Non-compliant",
@ -113,8 +114,10 @@
"Use-OpenAI",
"Using-the-CLI",
"Using-the-GUI",
"Using-the-MCP-Toolkit-Recommended",
"VS-Code",
"Vue",
"WSL-2-backend-Arm-Early-Access",
"WSL-2-backend-x86_64",
"Web-browser",
"What-are-the-key-features-of-Docker-Desktop",