mirror of https://github.com/docker/docs.git
Merge pull request #22647 from sarahsanders-docker/SCIM
security: improve SCIM intro
This commit is contained in:
parent
4fd64ac50b
commit
287a9eff13
|
@ -70,7 +70,12 @@ This is applicable only when using Docker Hub's application-level password versu
|
|||
|
||||
### How do we de-provision users who are not part of our IdP? We use SSO but not SCIM
|
||||
|
||||
If SCIM isn't enabled, you have to manually remove users from the organization in our system. Using SCIM automates this.
|
||||
If SCIM isn't enabled, you have to manually remove users from the organization.
|
||||
SCIM can automate this if your users are added after SCIM is enabled. Any users
|
||||
added to your organization before SCIM is enabled must be removed manually.
|
||||
|
||||
For more information on manually removing users, see
|
||||
[Manage organization members](/manuals/admin/organization/members.md).
|
||||
|
||||
### What metadata is collected from container images that Scout analyzes?
|
||||
|
||||
|
|
|
@ -11,31 +11,46 @@ weight: 30
|
|||
|
||||
{{< summary-bar feature_name="SSO" >}}
|
||||
|
||||
System for Cross-domain Identity Management (SCIM) is available for Docker Business customers. This guide provides an overview of SCIM provisioning.
|
||||
System for Cross-domain Identity Management (SCIM) is available for Docker
|
||||
Business customers. This guide provides an overview of SCIM provisioning.
|
||||
|
||||
## How SCIM works
|
||||
|
||||
SCIM offers automated user provisioning and de-provisioning for Docker through your identity provider (IdP). Once SCIM is enabled, users assigned to the Docker application in your IdP are automatically provisioned and added to your Docker organization. If a user is unassigned, they are removed from Docker.
|
||||
SCIM automates user provisioning and de-provisioning for Docker through your
|
||||
identity provider (IdP). After you enable SCIM, any user assigned to your
|
||||
Docker application in your IdP is automatically provisioned and added to your
|
||||
Docker organization. When a user is removed from the Docker application in your
|
||||
IdP, SCIM deactivates and removes them from your Docker organization.
|
||||
|
||||
SCIM also syncs user profile updates, such as name changes, made in your IdP. SCIM can be used with Docker’s default Just-in-Time (JIT) provisioning configuration, or on its own with JIT disabled.
|
||||
In addition to provisioning and removal, SCIM also syncs profile updates like
|
||||
name changes—made in your IdP. You can use SCIM alongside Docker’s default
|
||||
Just-in-Time (JIT) provisioning or on its own with JIT disabled.
|
||||
|
||||
SCIM automates:
|
||||
|
||||
SCIM supports the automation of:
|
||||
- Creating users
|
||||
- Updating user profiles
|
||||
- Removing and deactivating users
|
||||
- Re-activating users
|
||||
- Group mapping
|
||||
|
||||
> [!NOTE]
|
||||
>
|
||||
> SCIM only manages users provisioned through your IdP after SCIM is enabled.
|
||||
It cannot remove users who were manually added to your Docker organization
|
||||
before SCIM was set up.
|
||||
>
|
||||
> To remove those users, delete them manually from your Docker organization.
|
||||
For more information, see [Manage organization members](/manuals/admin/organization/members.md).
|
||||
|
||||
## Supported attributes
|
||||
|
||||
> [!IMPORTANT]
|
||||
>
|
||||
> Docker uses JIT provisioning by default for SSO configurations. If you enable SCIM, JIT values still overwrite the attribute
|
||||
values set by SCIM provisioning. To avoid conflicts, your JIT attribute values must match your SCIM attribute values. To avoid conflicts between SCIM and JIT, you can also disable JIT provisioning. See [Just-in-Time](/manuals/security/for-admins/provisioning/just-in-time.md) for more information.
|
||||
SCIM uses attributes (e.g., name, email) to sync user information between your
|
||||
IdP and Docker. Properly mapping these attributes in your IdP ensures that user
|
||||
provisioning works smoothly and prevents issues like duplicate user accounts
|
||||
when using single sign-on (SSO).
|
||||
|
||||
Attributes are pieces of user information, such as name and email, that are synchronized between your IdP and Docker when using SCIM. Proper mapping of these attributes is essential for seamless user provisioning and to prevent duplicate entries when using SSO.
|
||||
|
||||
The following table lists the supported attributes for SCIM:
|
||||
Docker supports the following SCIM attributes:
|
||||
|
||||
| Attribute | Description |
|
||||
|:---------------------------------------------------------------|:-------------------------------------------------------------------------------------------|
|
||||
|
@ -46,6 +61,16 @@ The following table lists the supported attributes for SCIM:
|
|||
|
||||
For additional details about supported attributes and SCIM, see [Docker Hub API SCIM reference](/reference/api/hub/latest/#tag/scim).
|
||||
|
||||
> [!IMPORTANT]
|
||||
>
|
||||
> By default, Docker uses Just-in-Time (JIT) provisioning for SSO. If SCIM is
|
||||
enabled, JIT values still take precedence and will overwrite attribute values
|
||||
set by SCIM. To avoid conflicts, make sure your JIT attribute values match your
|
||||
SCIM values.
|
||||
>
|
||||
> Alternatively, you can disable JIT provisioning to rely solely on SCIM.
|
||||
For details, see [Just-in-Time](/manuals/security/for-admins/provisioning/just-in-time.md).
|
||||
|
||||
## Enable SCIM in Docker
|
||||
|
||||
You must [configure SSO](../single-sign-on/configure/_index.md) before you enable SCIM. Enforcing SSO isn't required to use SCIM.
|
||||
|
|
|
@ -80,6 +80,7 @@
|
|||
"Mac-with-Apple-silicon",
|
||||
"Mac-with-Intel-chip",
|
||||
"Manually-create-assets",
|
||||
"Manually-set-it-up",
|
||||
"NetworkManager",
|
||||
"Node",
|
||||
"Non-compliant",
|
||||
|
@ -113,8 +114,10 @@
|
|||
"Use-OpenAI",
|
||||
"Using-the-CLI",
|
||||
"Using-the-GUI",
|
||||
"Using-the-MCP-Toolkit-Recommended",
|
||||
"VS-Code",
|
||||
"Vue",
|
||||
"WSL-2-backend-Arm-Early-Access",
|
||||
"WSL-2-backend-x86_64",
|
||||
"Web-browser",
|
||||
"What-are-the-key-features-of-Docker-Desktop",
|
||||
|
|
Loading…
Reference in New Issue