added scim

This commit is contained in:
Jerae Duffin 2022-06-23 07:51:32 -05:00
parent 2e14be9598
commit f1234e96e6
9 changed files with 67 additions and 0 deletions

View File

@ -1537,6 +1537,8 @@ manuals:
title: Configure title: Configure
- path: /single-sign-on/faqs/ - path: /single-sign-on/faqs/
title: FAQs title: FAQs
- path: /docker-hub/scim/
title: System for Cross-domain Identity Management
- path: /docker-hub/image-access-management/ - path: /docker-hub/image-access-management/
title: Image Access Management title: Image Access Management
- path: /docker-hub/registry-access-management/ - path: /docker-hub/registry-access-management/

Binary file not shown.

After

Width:  |  Height:  |  Size: 39 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 80 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 38 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 51 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 110 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 27 KiB

63
docker-hub/scim.md Normal file
View File

@ -0,0 +1,63 @@
---
description: System for Cross-domain Identity Maagement
keywords: SCIM, SSO
title: System for Cross-domain Identity Management
---
> **Important**
>
> SCIM for Okta is now available for early access. SCIM support for Azure AD is
> coming soon.
{: .important}
This section is for administrators who want to enable System for Cross-domain Identity Management (SCIM) 2.0 for their business. SCIM is a provisioning system that lets you manage users within your identity provider (IdP). You can enable SCIM on organizations that are part of the Docker Business subscription. To upgrade your existing account to a Docker Business subscription, see Upgrade your subscription.
SCIM provides automated user provisioning and de-provisioning for your Docker organization through your Identity Provider (IdP). The SCIM-synced changes apply to newly assigned users. The status of those already under your subscription will be supplemented but might not be overwritten in that the changes are applied. For instance, other members are unaffected if your IDP sends an update containing changes to User1.
We currently support the following provisioning features: creating new users, pushing user profile updates, removing users, deactivating users, reactivating users, and updating emails.
## Configure
SAML-based SSO must be properly set up and functional for your organization before you start configuring automated provisioning. In addition, you must verify your company domain and have the appropriate connectors in your IdP. Your user email domain must be the same company domain you use for Single Sign-on (SSO). Enforcing SSO is not required to enable SCIM. However, you must [configure SAML SSO](../single-sign-on/index.md){: target="_blank" rel="noopener" class="_"} before you enable SCIM.
### Okta IdP
Before making SCIM configuration changes in your IdP, navigate to [Docker Hub](https://hub.docker.com){: target="_blank" rel="noopener" class="_"} and select **Organizations** > **Settings** > **Security**. SCIM is locked until you complete the SSO configuration and verify your company domain. Enable SCIM and access your **Base URL** and **API Token** ( the same as Bearer Token in Okta).
![scim-provisioning](images/scim-provisioning.png){:width="700px"}
1. In Okta, navigate to **Applications** > **Create App Integration**, **SAML 2.0**, and click **Next**.
2. In the **General** tab, select **Edit App Settings** to enable SCIM provisioning and click **Save**.
3. In the Provisioning tab, edit the SCIM Connection and complete the following:
* **SCIM connector base URL**: SCIM Base URL from Docker Hub
* **Unique identifier field for users**: enter **email**
* **Supported Provisioning actions**: select **Push New Users**, **Push Profile Updates**
* **Authorization/Bearer**: SCIM API Token from Docker Hub
4. Click **Test Connection Configuration** to complete the configuration and **Save**.
5. Navigate to **Provisioning** > **To App** > **Edit** and enable **Create Users**, **Update User Attributes** and **Deactivates Users**, and click **Save**.
![scim-app-provisioning](images/scim-app-provisioning.png){:width="700px"}
The synchronization of user data is now automated, and the members in your Docker organization will now be automatically provisioned, updated, and de-provisioned based on the access control managed through your identity provider, Okta.
### Generate a full-sync
You must run full-sync after enabling SCIM, if you already have users assigned to the Docker Hub app when you enable SCIM. The full sync provisions the users that are assigned in the IdP Directory to Docker Hub.
1. Navigate to **Applications** > **Applications** and select the Docker Hub app.
2. In the **Assignments** tab, click **Provision User** if you have pending users.
3. Click **Apply to All** > **Reapply Mappings** and **Confirm**.
> **Note**
>
> Any user that was not previously provisioned is now provisioned in Docker Hub.
![scim-full-sync](images/scim-full-sync.png){:width="700px"}
## Disabling SCIM
If SCIM is disabled, any user provisioned through SCIM will remain in the organization. Future changes for your users will not sync from your IdP. Users provisioning is through just-in-time provisioning from SSO.
![scim-disable](images/scim-disable.png){:width="700px"}

View File

@ -142,6 +142,8 @@ To verify ownership of a domain, add a TXT record to your Domain Name System (DN
4. In the Security section of your Docker organization, click **Verify** next to the domain you want to verify after 72 hours. 4. In the Security section of your Docker organization, click **Verify** next to the domain you want to verify after 72 hours.
Once you've verified your domain, you can move forward to test your configuration and enforce SSO, or you can [Configure your System Cross-domain Identity Management (SCIM)](../docker-hub/scim.md).
## Test your SSO configuration ## Test your SSO configuration
After youve completed the SSO configuration process in Docker Hub, you can test the configuration when you log in to Docker Hub using an incognito browser. Login using your domain email address and IdP password. You will then get redirected to your identity providers login page to authenticate. After youve completed the SSO configuration process in Docker Hub, you can test the configuration when you log in to Docker Hub using an incognito browser. Login using your domain email address and IdP password. You will then get redirected to your identity providers login page to authenticate.