mirror of https://github.com/docker/docs.git
Updated attributes note
This commit is contained in:
parent
7cdab60dfb
commit
3a95d3bb99
|
@ -10,7 +10,7 @@ SCIM provides automated user provisioning and de-provisioning for your Docker or
|
|||
|
||||
We currently support the following provisioning features: creating new users, push user profile updates, remove users, deactivate users and reactivate users. Group management is currently not supported.
|
||||
|
||||
The table below lists the supported attributes.
|
||||
The table below lists the supported attributes. Note, that your attribute mappings must match for SAML to prevent duplicating your members.
|
||||
|
||||
| Attribute | Description
|
||||
|:---------------------------------------------------------------|:-------------------------------------------------------------------------------------------|
|
||||
|
@ -20,7 +20,7 @@ The table below lists the supported attributes.
|
|||
|
||||
## Configure
|
||||
|
||||
SAML-based SSO must be properly set up and be functional for your organization before you start configuring automated provisioning. In addition, you must verify your company domain and have the appropriate connectors in your IdP. Your user email domain must be the same company domain you use for Single Sign-on (SSO). Enforcing SSO is not required to enable SCIM. However, you must [configure SAML SSO](../single-sign-on/index.md){: target="_blank" rel="noopener" class="_"} before you enable SCIM.
|
||||
SSO must be properly set up and be functional for your organization before you start configuring automated provisioning. In addition, you must verify your company domain and have the appropriate connectors in your IdP. Your user email domain must be the same company domain you use for Single Sign-on (SSO). Enforcing SSO is not required to enable SCIM. However, you must [configure SSO](../single-sign-on/index.md){: target="_blank" rel="noopener" class="_"} before you enable SCIM.
|
||||
|
||||
Before you make SCIM configuration changes in your IdP, navigate to [Docker Hub](https://hub.docker.com){: target="_blank" rel="noopener" class="_"} and select **Organizations** > **Settings** > **Security**. SCIM is locked until you complete the SSO configuration and verify your company domain. Enable SCIM and access your Base URL and API Token. You can also generate a new API token.
|
||||
|
||||
|
|
|
@ -3,7 +3,7 @@ description: Single Sign-on
|
|||
keywords: Single Sign-on, SSO, sign-on
|
||||
title: Configure Single Sign-on
|
||||
---
|
||||
This section is for administrators who want to enable Docker Single Sign-on (SSO) for their businesses. Docker SSO allows users to authenticate using their identity providers (IdPs) to access Docker. Docker currently supports SAML 2.0 and Azure AD authentication methods. You can enable SSO on organizations that are part of the Docker Business subscription. To upgrade your existing account to a Docker Business subscription, see [Upgrade your subscription](../subscription/upgrade/){:target="blank" rel="noopener" class=""}.
|
||||
This section is for administrators who want to enable Docker Single Sign-on (SSO) for their businesses. Docker SSO allows users to authenticate using their identity providers (IdPs) to access Docker. You can enable SSO on organizations that are part of the Docker Business subscription. To upgrade your existing account to a Docker Business subscription, see [Upgrade your subscription](../subscription/upgrade/){:target="blank" rel="noopener" class=""}.
|
||||
|
||||
When SSO is enabled, users are redirected to your provider’s authentication page to log in. They cannot authenticate using their Docker login credentials (Docker ID and password). Docker currently supports Service Provider Initiated SSO flow. Your users must sign in to Docker Hub or Docker Desktop to initiate the SSO authentication process.
|
||||
|
||||
|
|
Loading…
Reference in New Issue