Skip to content

Commit 4c4c51b

Browse files
authored
fast follows (#24832)
Fast follow ups: - Returned aliases with new alias to one doc - Updated provision index page to accurately reflect different methods - reorganized table to reflect popularity of methods based off sme info (scim is the vogue, then JIT, then auto provision) - Updated grid to link correctly to auto provisioning doc - Created more opinionated left nav to reflect recommendations around security SCIM > JIT > auto - Fixed `*`s to be `-`s - Updated Migrate doc heading levels
1 parent 60fdb3c commit 4c4c51b

7 files changed

Lines changed: 31 additions & 27 deletions

File tree

content/manuals/enterprise/security/domain-management.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,8 +118,8 @@ CSV file. For more information on bulk inviting users, see
118118

119119
[Auto-provisioning](/manuals/enterprise/security/provisioning/auto-provisioning.md) uses verified domains to associate organization members with email address that match the verified domains. To override auto-provisioning, you can configure one of the two alternative methods:
120120

121-
* [Just-in-Time (JIT)](/manuals/enterprise/security/provisioning/just-in-time.md) provisioning
122-
* [System for Cross-domain Identity Management (SCIM)](/manuals/enterprise/security/provisioning/scim/_index.md)
121+
- [Just-in-Time (JIT)](/manuals/enterprise/security/provisioning/just-in-time.md) provisioning
122+
- [System for Cross-domain Identity Management (SCIM)](/manuals/enterprise/security/provisioning/scim/_index.md)
123123

124124
## Delete a domain
125125

content/manuals/enterprise/security/provisioning/_index.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,10 +7,6 @@ weight: 20
77
aliases:
88
- /security/for-admins/provisioning/
99
grid:
10-
- title: "Auto-provisioning"
11-
description: "Associate members to an organization when email addresses match a verified domain."
12-
icon: "group"
13-
link: "scim/group-mapping/"
1410
- title: "SCIM provisioning"
1511
description: "Enable continuous user data synchronization between your IdP and Docker. Best for larger organizations."
1612
icon: "sync"
@@ -19,6 +15,10 @@ grid:
1915
description: "Set up automatic user creation on first sign-in. Ideal for smaller teams with minimal setup requirements."
2016
icon: "schedule"
2117
link: "just-in-time/"
18+
- title: "Auto-provisioning"
19+
description: "Associate members to an organization when email addresses match a verified domain."
20+
icon: "group"
21+
link: "auto-provisioning/"
2222
---
2323

2424
{{< summary-bar feature_name="SSO" >}}
@@ -29,13 +29,14 @@ This page provides an overview of user provisioning and the supported provisioni
2929

3030
## What is provisioning?
3131

32-
Provisioning helps manage users by automating tasks like account creation, updates, and deactivation based on data from your identity provider (IdP). There are three methods for user provisioning, each offering benefits for different organizational needs:
32+
Provisioning helps manage users by automating tasks like account creation, updates, and deactivation based on data from your identity provider (IdP). There are several methods for user provisioning, each offering benefits for different organizational needs:
3333

3434
| Provisioning method | Description | Default setting in Docker | Recommended for |
3535
| :--- | :--- | :------------- | :--- |
36-
| Just-in-Time (JIT) | Automatically creates and provisions user accounts when they first sign in via SSO | Enabled by default | Organizations needing minimal setup, smaller teams, or low-security environments |
3736
| System for Cross-domain Identity Management (SCIM) | Continuously syncs user data between your IdP and Docker, ensuring user attributes remain updated without manual intervention | Disabled by default | Larger organizations or environments with frequent changes in user information or roles |
3837
| Group mapping | Maps user groups from your IdP to specific roles and permissions within Docker, enabling fine-grained access control based on group membership | Disabled by default | Organizations requiring strict access control and role-based user management |
38+
| Just-in-Time (JIT) | Automatically creates and provisions user accounts when they first sign in via SSO | Enabled by default | Organizations needing minimal setup, smaller teams, or low-security environments |
39+
| Auto-provision | Adds users when email addresses match a verified domain | Disabled by default | Orgs without SSO that need to add existing Docker users by domain |
3940

4041
## Default provisioning setup
4142

content/manuals/enterprise/security/provisioning/auto-provisioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Auto-provisioning
33
linkTitle: Auto-provision
44
description: Auto-provision users by associating members to your organization when email addresses match a verified domain.
55
keywords: user provisioning, just-in-time provisioning, JIT, autoprovision, Docker Admin, admin, security
6-
weight: 10
6+
weight: 30
77
---
88

99
Auto-provisioning automatically adds users to your organization when they sign in with email addresses that match your verified domains. You must verify a domain before enabling auto-provisioning.

content/manuals/enterprise/security/provisioning/just-in-time.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ description: Learn how Just-in-Time provisioning works with your SSO connection.
33
keywords: user provisioning, just-in-time provisioning, JIT, autoprovision, Docker Admin, admin, security
44
title: Just-in-Time provisioning
55
linkTitle: Just-in-Time
6-
weight: 30
6+
weight: 20
77
aliases:
88
- /security/for-admins/provisioning/just-in-time/
99
---

content/manuals/enterprise/security/provisioning/scim/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: SCIM overview
33
linkTitle: SCIM
4-
weight: 20
4+
weight: 10
55
description: Learn how System for Cross-domain Identity Management works and how to set it up.
66
keywords: SCIM, SSO, user provisioning, de-provisioning, role mapping, assign users
77
aliases:

content/manuals/enterprise/security/provisioning/scim/migrate-scim.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,12 @@ description: Learn how to migrate from just-in-time (JIT) to SCIM.
55
weight: 30
66
---
77

8-
## Migrate existing JIT users to SCIM
9-
108
If you already have users provisioned through Just-in-Time (JIT) and want to
119
enable full SCIM lifecycle management, you need to migrate them. Users
1210
originally created by JIT cannot be automatically de-provisioned through SCIM,
1311
even after SCIM is enabled.
1412

15-
### Why migrate
13+
## Why migrate
1614

1715
Organizations using JIT provisioning may encounter limitations with user
1816
lifecycle management, particularly around de-provisioning. Migrating to SCIM
@@ -35,7 +33,7 @@ provides:
3533
This migration is most critical for larger organizations that require fully
3634
automated user de-provisioning when employees leave the company.
3735

38-
### Prerequisites for migration
36+
## Prerequisites
3937

4038
Before migrating, ensure you have:
4139

@@ -48,9 +46,9 @@ Before migrating, ensure you have:
4846
> migration during a low-usage window and communicate the timeline to affected
4947
> users.
5048
51-
### Prepare for migration
49+
## Prepare for migration
5250

53-
#### Transfer ownership
51+
### Transfer ownership
5452

5553
Before removing users, ensure that any repositories, teams, or organization
5654
resources they own are transferred to another administrator or service account.
@@ -67,7 +65,7 @@ become inaccessible.
6765
> become inaccessible when the user is removed. Ensure all critical resources
6866
> are transferred before proceeding.
6967
70-
#### Verify identity provider configuration
68+
### Verify identity provider configuration
7169

7270
1. Confirm all JIT-provisioned users are assigned to the Docker application in
7371
your identity provider.
@@ -77,7 +75,7 @@ become inaccessible.
7775
Users not assigned to the Docker application in your identity provider are not
7876
re-created by SCIM after removal.
7977

80-
#### Export user records
78+
### Export user records
8179

8280
Export a list of JIT-provisioned users from Docker Admin Console:
8381

@@ -89,9 +87,9 @@ Export a list of JIT-provisioned users from Docker Admin Console:
8987

9088
Keep this CSV list of JIT-provisioned users as a rollback reference if needed.
9189

92-
### Complete the migration
90+
## Complete the migration
9391

94-
#### Disable JIT provisioning
92+
### Disable JIT provisioning
9593

9694
> [!IMPORTANT]
9795
>
@@ -108,7 +106,7 @@ Keep this CSV list of JIT-provisioned users as a rollback reference if needed.
108106
Disabling JIT prevents new users from being automatically added through SSO
109107
during the migration.
110108

111-
#### Remove JIT-origin users
109+
### Remove JIT-origin users
112110

113111
> [!IMPORTANT]
114112
>
@@ -132,7 +130,7 @@ user de-provisioning when employees leave the company.
132130
> SCIM was enabled with the current member list. Users who existed before SCIM
133131
> was enabled were likely provisioned via JIT.
134132
135-
#### Verify SCIM re-provisioning
133+
### Verify SCIM re-provisioning
136134

137135
After removing JIT users, SCIM automatically re-creates user accounts:
138136

@@ -141,7 +139,7 @@ After removing JIT users, SCIM automatically re-creates user accounts:
141139
2. In Docker Admin Console, confirm users reappear with SCIM provisioning.
142140
3. Verify users are added to the correct teams via group mapping.
143141

144-
#### Validate user access
142+
### Validate user access
145143

146144
Perform post-migration validation:
147145

@@ -153,7 +151,7 @@ Perform post-migration validation:
153151

154152
Keep audit exports and logs for compliance purposes.
155153

156-
### Migration results
154+
## Migration results
157155

158156
After completing the migration:
159157

@@ -162,7 +160,7 @@ After completing the migration:
162160
- No new JIT users are created
163161
- Consistent identity lifecycle management is maintained
164162

165-
### Troubleshoot migration issues
163+
## Troubleshoot migration issues
166164

167165
If a user fails to reappear after removal:
168166

content/manuals/enterprise/security/provisioning/scim/provision-scim.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,13 @@
11
---
22
title: Set up SCIM provisioning
3-
linkTitle: Set up
3+
linkTitle: Setup
44
description: Learn how System for Cross-domain Identity Management works and how to set it up.
55
weight: 10
6+
aliases:
7+
- /security/for-admins/scim/
8+
- /docker-hub/scim/
9+
- /security/for-admins/provisioning/scim/
10+
- /enterprise/security/provisioning/scim/
611
---
712

813
{{< summary-bar feature_name="SSO" >}}

0 commit comments

Comments
 (0)