mirror of https://github.com/docker/docs.git
parent
1f379b6ab9
commit
34fe60ac0d
|
@ -6,7 +6,7 @@ title: Create and manage a team
|
|||
|
||||
A team is a group of Docker users that belong to an organization. An
|
||||
organization can have multiple teams. When you first create an organization,
|
||||
you’ll see that you have a team, the owners team, with a single member. An
|
||||
you’ll see that you have a team (called 'Company') and the owners team, with a single member. An
|
||||
organization owner can then create new teams and add members to an existing team
|
||||
using their Docker ID or email address and by selecting a team the user should be part of.
|
||||
|
||||
|
|
|
@ -77,7 +77,9 @@ After you’ve completed the SSO configuration process in Docker Hub, you can te
|
|||
|
||||
>**Important**
|
||||
>
|
||||
> SSO has Just-In-Time (JIT) Provisioning enabled by default, but this can be changed on a per-app basis. To prevent auto-provisioning users, you can create a security group in your IdP and configure the SSO app to authenticate and authorize only those users that are in the security group. Follow the instructions provided by your IdP:
|
||||
> SSO has Just-In-Time (JIT) Provisioning enabled by default. This means your users are auto-provisioned into a team called 'Company' within your organization on Docker Hub.
|
||||
>
|
||||
>You can change this on a per-app basis. To prevent auto-provisioning users, you can create a security group in your IdP and configure the SSO app to authenticate and authorize only those users that are in the security group. Follow the instructions provided by your IdP:
|
||||
> - [Okta](https://help.okta.com/en-us/Content/Topics/Security/policies/configure-app-signon-policies.htm)
|
||||
> - [AzureAD](https://learn.microsoft.com/en-us/azure/active-directory/develop/howto-restrict-your-app-to-a-set-of-users)
|
||||
{: .important}
|
||||
|
|
|
@ -63,7 +63,9 @@ When you disable SSO, you can delete the connection to remove the configuration
|
|||
|
||||
>**Important**
|
||||
>
|
||||
> SSO has Just-In-Time (JIT) Provisioning enabled by default, but this can be changed on a per-app basis. To prevent auto-provisioning users, you can create a security group in your IdP and configure the SSO app to authenticate and authorize only those users that are in the security group. Follow the instructions provided by your IdP:
|
||||
> SSO has Just-In-Time (JIT) Provisioning enabled by default. This means your users are auto-provisioned into a team called 'Company' within your organization on Docker Hub.
|
||||
>
|
||||
>You can change this on a per-app basis. To prevent auto-provisioning users, you can create a security group in your IdP and configure the SSO app to authenticate and authorize only those users that are in the security group. Follow the instructions provided by your IdP:
|
||||
> - [Okta](https://help.okta.com/en-us/Content/Topics/Security/policies/configure-app-signon-policies.htm)
|
||||
> - [AzureAD](https://learn.microsoft.com/en-us/azure/active-directory/develop/howto-restrict-your-app-to-a-set-of-users)
|
||||
{: .important}
|
||||
|
|
Loading…
Reference in New Issue