mirror of https://github.com/docker/docs.git
Merge pull request #708 from docker/orchestration-saml-666
Orchestration saml 666
This commit is contained in:
commit
828eeab13a
|
|
@ -1560,6 +1560,8 @@ manuals:
|
||||||
title: Add labels to cluster nodes
|
title: Add labels to cluster nodes
|
||||||
- path: /ee/ucp/admin/configure/add-sans-to-cluster/
|
- path: /ee/ucp/admin/configure/add-sans-to-cluster/
|
||||||
title: Add SANs to cluster certificates
|
title: Add SANs to cluster certificates
|
||||||
|
- path: /ee/ucp/admin/configure/enable-saml-authentication
|
||||||
|
title: Enable SAML authentication
|
||||||
- path: /ee/ucp/admin/configure/external-auth/
|
- path: /ee/ucp/admin/configure/external-auth/
|
||||||
title: Integrate with LDAP
|
title: Integrate with LDAP
|
||||||
- path: /ee/ucp/admin/configure/external-auth/enable-ldap-config-file/
|
- path: /ee/ucp/admin/configure/external-auth/enable-ldap-config-file/
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1,87 @@
|
||||||
|
---
|
||||||
|
title: Enable SAML authentication
|
||||||
|
description: Learn how to configure user authentication with SAML 2.0
|
||||||
|
keywords: SAML, ucp, authentication, SSO, Okta, ADFS
|
||||||
|
---
|
||||||
|
|
||||||
|
> Beta disclaimer
|
||||||
|
>
|
||||||
|
> This is beta content. It is not yet complete and should be considered a work in progress. This content is subject to change without notice.
|
||||||
|
|
||||||
|
Ping Identity integration requires these values:
|
||||||
|
|
||||||
|
SAML is commonly supported by enterprise authentication systems. SAML-based single sign-on (SSO) gives you access to UCP through a SAML 2.0-compliant identity provider.
|
||||||
|
|
||||||
|
SAML-based single sign-on (SSO) gives you access to UCP through a SAML 2.0-compliant identity provider. UCP supports SAML for authentication as a service provider integrated with your identity provider.
|
||||||
|
|
||||||
|
For more information about SAML, see the [SAML XML website] (http://saml.xml.org/).
|
||||||
|
|
||||||
|
UCP supports these identity providers:
|
||||||
|
|
||||||
|
- (Okta) [https://www.okta.com/]
|
||||||
|
- (ADFS) [https://docs.microsoft.com/en-us/windows-server/identity/active-directory-federation-services]
|
||||||
|
|
||||||
|
## Configure identity provider integration
|
||||||
|
|
||||||
|
There are values your identity provider needs for successful integration with UCP, as follows. These values can vary between identity providers. Consult your identity provider documentation for instructions on providing these values as part of their integration process.
|
||||||
|
|
||||||
|
### Okta integration values
|
||||||
|
|
||||||
|
Okta integration requires these values:
|
||||||
|
|
||||||
|
- URL for single signon (SSO). This value is the URL for UCP, qualified with `/enzi/v0/saml/acs`. For example, `https://<^>111.111.111.111<^^>/enzi/v0/saml/acs`.
|
||||||
|
- Service provider audience URI. This value is the URL for UCP, qualified with `/enzi/v0/saml/metadata`. For example, `https://<^>111.111.111.111<^^>/enzi/v0/saml/metadata`.
|
||||||
|
- NameID format. Select Unspecified.
|
||||||
|
- Application username. Email (For example, a custom `${f:substringBefore(user.email, "@")}` specifies the username portion of the email address.
|
||||||
|
- Attribute Statements:
|
||||||
|
- Name: `fullname`, Value: `user.displayName`.
|
||||||
|
- Group Attribute Statement:
|
||||||
|
Name: `member-of`, Filter: (user defined) for associate group membership. The group name is returned with the assertion.
|
||||||
|
Name: `is-admin`, Filter: (user defined) for identifying if the user is an admin.
|
||||||
|
|
||||||
|
|
||||||
|
### ADFS integration values
|
||||||
|
|
||||||
|
ADFS integration requires these values:
|
||||||
|
|
||||||
|
- Service provider metadata URI. This value is the URL for UCP, qualified with `/enzi/v0/saml/metadata`. For example, `https://<^>111.111.111.111<^^>/enzi/v0/saml/metadata`.
|
||||||
|
- Attribute Store: Active Directory.
|
||||||
|
- Add LDAP Attribute = Email Address; Outgoing Claim Type: Email Address
|
||||||
|
- Add LDAP Attribute = Display-Name; Outgoing Claim Type: Common Name
|
||||||
|
- Claim using Custom Rule. For example, `c:[Type == "http://schemas.xmlsoap.org/claims/CommonName"]
|
||||||
|
=> issue(Type = "fullname", Issuer = c.Issuer, OriginalIssuer = c.OriginalIssuer, Value = c.Value, ValueType = c.ValueType);`
|
||||||
|
- Outgoing claim type: Name ID
|
||||||
|
- Outgoing name ID format: Transient Identifier
|
||||||
|
- Pass through all claim values
|
||||||
|
|
||||||
|
## Configure the SAML integration
|
||||||
|
|
||||||
|
To enable SAML authentication:
|
||||||
|
|
||||||
|
1 Go to the UCP web UI.
|
||||||
|
2. Navigate to the **Admin Settings**.
|
||||||
|
3. Select **Authentication & Authorization**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. In the **SAML Enabled** section, select **Yes** to display the required settings.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. In **IdP Metadata URL** enter the URL for the identity provider's metadata.
|
||||||
|
6. In **UCP Host** enter the URL that includes the IP address of your UCP console.
|
||||||
|
7. Select **Save** to complete the integration.
|
||||||
|
|
||||||
|
## Security considerations
|
||||||
|
|
||||||
|
You can download a client bundle to access UCP. A client bundle is a group of certificates downloadable directly from UCP web interface that enables command line as well as API access to UCP. It lets you authorize a remote Docker engine to access specific user accounts managed in Docker EE, absorbing all associated RBAC controls in the process. You can now execute docker swarm commands from your remote machine that take effect on the remote cluster. You can download the client bundle in the **Admin Settings** under **My Profile**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
> Caution
|
||||||
|
>
|
||||||
|
>Users who have been previously authorized using a Client Bundle will continue to be able to access UCP regardless of the newly configured SAML access controls. To ensure that access from the client bundle is synced with the identity provider, we recommend the following steps. Otherwise, a previously-authorized user could get access to UCP through their existing client bundle.
|
||||||
|
>
|
||||||
|
> - Remove the user account from UCP that grants the client bundle access.
|
||||||
|
> - If group membership in the identity provider changes, replicate this change in UCP.
|
||||||
|
> - Continue to use LDAP to sync group membership.
|
||||||
Binary file not shown.
|
After Width: | Height: | Size: 66 KiB |
Binary file not shown.
|
After Width: | Height: | Size: 116 KiB |
Binary file not shown.
|
After Width: | Height: | Size: 89 KiB |
Loading…
Reference in New Issue