15 KiB
description | keywords | title | toc_min | toc_max |
---|---|---|---|---|
Get started onboarding with Docker Business | business, organizations, get started, onboarding | Get started onboarding with Docker Business | 1 | 2 |
The following section contains step-by-step instructions on how to get started onboarding your organization after you obtain a Docker Business subscription.
Prerequisites
Before you start to on board your organization, ensure that you've completed the following:
- You have a Docker Business subscription. Get in touch with us if you haven't subscribed to Docker Business yet.
- Your Docker Business subscription is new. If you upgraded your Docker Team subscription or renewed your Docker Business subscription, see what's next.
- Your Docker Business subscription has started. You cannot complete all the steps until after your subscription start date.
Step 1: Identify your Docker users and their Docker accounts
To begin, you should identify which users you will need to add to your Docker Business organization. Identifying your users will help you efficiently allocate your subscription's seats and manage access.
Note
If you will use Docker Single Sign-on (SSO), users from your identity provider (IdP) are automatically provisioned in your organization when they sign in. You can identify which users have signed in to Docker Hub by viewing your organization's members in Docker Hub. You can also perform the steps below to identify users before you configure SSO.
- Identify the Docker users in your organization.
- If your organization uses device management software, like MDM or JAMF, you may use the device management software to help identify Docker users. See your device management software's documentation for details. You can identify Docker users by checking if Docker Desktop is installed at the following location on each user's machine:
- Mac:
/Applications/Docker.app
- Windows:
C:\Program Files\Docker\Docker
- Mac:
- If your organization does not use device management software, you may survey your users.
- If your organization uses device management software, like MDM or JAMF, you may use the device management software to help identify Docker users. See your device management software's documentation for details. You can identify Docker users by checking if Docker Desktop is installed at the following location on each user's machine:
- Instruct all your Docker users in your organization to update their existing Docker account's email address to an address that's in your organization's domain, or to create a new account using an email address in your organization's domain.
- To update an account's email address, instruct your users to sign in to Docker Hub{: target="blank" rel="noopener" class=""}, go to Account Settings{: target="blank" rel="noopener" class=""}, and update the email address to their email address in your organization's domain.
- To create a new account, instruct your users to go sign up{: target="blank" rel="noopener" class=""} using their email address in your organization's domain.
- Ask your Docker sales representative to provide a list of Docker accounts that use an email address in your organization's domain.
Step 2: Add your Docker Business subscription to an organization
On the day that your Docker Business subscription starts, your organization's primary contact will receive a welcome email from Docker to guide you through creating a new organization or to let you choose an existing organization for your Docker Business subscription.
Note
If your organization's primary contact does not receive a welcome email from Docker on the day that your subscription starts:
- Check your email spam folder.
- Use the steps below to verify that your Docker Business organization does not already exist.
- Contact your Docker sales representative to verify your primary contact's email address.
After completing the steps from the welcome email, verify that your organization exists and your organization has a Docker Business subscription:
- Go to Billing Details{: target="blank" rel="noopener" class=""} and then select on your organization's name.
- Under Plan, view your subscription. If you organization has a Docker Business subscription, you will see Docker Business.
Step 3: Add members
Now that you have a Docker Business organization, it's time to start adding members. You can automatically add members to your organization by configuring Docker Single Sign-on (SSO), or invite members based their email address or Docker ID.
Note
If you are not ready to configure SSO, you can invite members using their email address or Docker ID and then configure SSO at a later time. Any members you invite by email address or Docker ID can continue to have access after configuring SSO.
In addition, when SSO is configured, you can still invite members not in your identity provider (IdP) by using their email address or Docker ID.
- Configure Single Sign-on
- Invite members
Configure Single Sign-on
The following steps will help you quickly set up SSO. For more details, see Configure Single Sign-on{: target="blank" rel="noopener" class=""} and Single Sign-on FAQs{: target="blank" rel="noopener" class=""}.
-
Ensure that all members have at least Docker Desktop{: target="blank" rel="noopener" class=""} 4.4.2 installed on their machines.
-
If you have existing Docker CI/CD pipelines in your organization, replace their passwords with Personal Access Tokens. See Create a Personal Access (PAT){: target="blank" rel="noopener" class=""} for more details.
-
Configure either your SAML 2.0 identity provider (IdP) or your Azure AD IdP with Open ID Connect.
- SAML 2.0 IdP configuration
- Azure AD IdP configuration with Open ID Connect
-
Sign in to Docker Hub{: target="blank" rel="noopener" class=""} as an administrator and navigate to Organizations and select the organization that you want to enable SSO on.
-
Select Settings and select the Security tab.
-
Select an authentication method for SAML 2.0.
-
In the Identity Provider Set Up, copy the Entity ID, ACS URL and Certificate Download URL.
-
Log in to your IdP to complete the IdP server configuration process. Refer to your IdP documentation for detailed instructions.
Note
The NameID is your email address and is set as the default. For example, yourname@mycompany.com. We also support the optional name attribute. This attribute name must be lower-cased. The following is an example of this attribute in Okta.
-
Complete the fields in the Configuration Settings section and select Save. If you want to change your IdP, you must delete your existing provider and configure SSO with your new IdP.
Note
This section is for users who only want to configure Open ID Connect with Azure AD. This connection is a basic OIDC connection, and there are no special customizations available when using it.
-
Sign in to Docker Hub{: target="blank" rel="noopener" class=""} as an administrator and navigate to Organizations and select the organization that you want to enable SSO on.
-
Select Settings and select the Security tab.
-
Select an authentication method for Azure AD.
-
In the Identity Provider Set Up, copy the Redirect URL / Reply URL.
-
Log in to your IdP to complete the IdP server configuration process. Refer to your IdP documentation for detailed instructions.
Note
The NameID is your email address and is set as the default. For example: yourname@mycompany.com.
-
Complete the fields in the Configuration Settings section and select Save. If you want to change your IdP, you must delete your existing provider and configure SSO with your new IdP.
-
Select Add Domain and specify the corporate domain you'd like to manage with SSO. Domains should be formatted without protocol or www information, for example, yourcompany.com. Docker currently supports multiple domains that are part of your IdP. Make sure that your domain is reachable through email.
Note
This should include all email domains and sub-domains users will use to access Docker. Public domains such as gmail.com and outlook.com are not permitted. Also, the email domain should be set as the primary email.
-
Perform the following steps to verify ownership of your domain by adding a TXT record to your Domain Name System (DNS) setting.
-
Copy the provided TXT record value and navigate to your DNS host and locate the Settings page to add a new record.
-
Select the option to add a new record and paste the TXT record value into the applicable field. For example, the Value, Answer or Description field.
Your DNS record may have the following fields:
- Record type: enter your 'TXT' record value
- Name/Host/Alias: leave the default (@ or blank)
- Time to live (TTL): enter 86400
-
After you have updated the fields, select Save.
Note
It can take up to 72 hours for DNS changes to take effect, depending on your DNS host. The Domains table will have an Unverified status during this time.
-
In the Security section of your Docker organization, select Verify next to the domain you want to verify after 72 hours.
-
-
Perform the following to verify that SSO has been configured successfully.
- Open an incognito browser.
- Navigate to Docker Hub{: target="blank" rel="noopener" class=""}.
- Authenticate through email instead of using your Docker ID. If you are able to authenticate, then SSO has been configured successfully.
-
To access Docker Hub through the CLI, each member of your organization must create a Personal Access Token. See Create an access token{: target="blank" rel="noopener" class=""} for details.
-
Perform the following to force users to sign in to Docker Hub using SSO.
- In Docker Hub{: target="blank" rel="noopener" class=""}, select Organizations, select your organization, select Settings, and then select the Security tab.
- Select Turn ON Enforcement.
Invite members
All members in your organization need to be in at least one team. Teams are used to apply access control permissions to image repositories and organization settings.
Your organization will have at least one default team, the owners team, with at least a single member (you). Members of the owners team can help manage users, teams, and repositories in the organization. Learn more{: target="blank" rel="noopener" class=""}.
In the steps below, you will create a members team. Members that you invite to the members team will not be able to modify your organization settings.
To create the members team:
- Select Organizations in Docker Hub{: target="blank" rel="noopener" class=""} and then select your organization.
- Click Teams and then click Create Team.
- Specify
members
for Team name and then click Create.
To invite a member to the members team in your organization:
- Navigate to Organizations in Docker Hub, and select your organization.
- In the Members tab, click Invite Member.
- Enter the invitee's Docker ID or email, and select the members team from the drop-down list.
- Click Invite to confirm.
Step 4: Enforce sign in for Docker Desktop
At this point, your users can sign in to Docker Desktop on their machines using any Docker account, including accounts that are not a member of your Docker organization. You can force your users to sign in to a Docker account that is a member of your organization.
Enforcing sign in is not required, but it does offer the following benefits:
- Allows you to configure features such as Image Access Management and Registry Access Management.
- Authenticated users get a higher pull rate limit compared to anonymous users.
- Blocks users from accessing Docker Desktop until they are added to your organization.
To enforce sign in, first inform your users that they must sign in to Docker Desktop using only their Docker account that is a member of your organization, and then you need to create a registry.json
file on each user's computer with the following contents, where myorg
is replaced with your organization's name.
{
"allowedOrgs":["myorg"]
}
Based on your users' operating systems, you must create the registry.json file at:
- Mac:
/Library/Application Support/com.docker.docker/registry.json
- Windows:
/ProgramData/DockerDesktop/registry.json
Note
Ensure that only administrators have permission to modify the registry.json file. Users should not be able to edit the file.
The Docker Desktop installer can create this file as part of the installation process or you can use other methods to deploy this file. For more details and examples of different ways to create the registry.json file, see Create a registry.json file{: target="blank" rel="noopener" class=""}
What's next
Get the most out of your Docker Business subscription by leveraging these popular features:
- If you haven't configured Docker Single Sign-on yet, configure it now for centralized account management.
- Create repositories to share container images.
- Create teams and configure repository permissions.
- Control which images your members can access with Image Access Management.
- Control which registries your members can access with Registry Access Management.
Your Docker Business subscription provides many more additional features. Learn more.