Skip to content

Commit aceebb0

Browse files
committed
this was awful; redirect nightmare
1 parent a8b9c55 commit aceebb0

5 files changed

Lines changed: 12 additions & 12 deletions

File tree

content/guides/admin-user-management/onboard.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,4 +67,4 @@ It also:
6767
- Ensures consistent access control policies.
6868
- Help you scale permissions as teams grow or change.
6969

70-
For more information on how it works, see [Group mapping](/provisioning/scim/group-mapping).
70+
For more information on how it works, see [Group mapping](/enterprise/security/provisioning/scim/group-mapping).

content/manuals/enterprise/security/provisioning/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ grid:
1818
- title: "Group mapping"
1919
description: "Configure role-based access control using IdP groups. Perfect for strict access control requirements."
2020
icon: "group"
21-
link: "group-mapping/"
21+
link: "scim/group-mapping/"
2222
---
2323

2424
{{< summary-bar feature_name="SSO" >}}

content/manuals/enterprise/security/provisioning/just-in-time.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,6 @@ Users are provisioned with JIT by default. If you enable SCIM, you can disable J
8484

8585
## Next steps
8686

87-
- Configure [SCIM provisioning](/manuals/enterprise/security/provisioning/scim.md) for advanced user management.
88-
- Set up [group mapping](/manuals/enterprise/security/provisioning/scim/group-mapping.md) to automatically assign users to teams.
87+
- Configure [SCIM provisioning](/enterprise/security/provisioning/scim/) for advanced user management.
88+
- Set up [group mapping](/enterprise/security/provisioning/scim/group-mapping) to automatically assign users to teams.
8989
- Review [Troubleshoot provisioning](/manuals/enterprise/troubleshoot/troubleshoot-provisioning.md).

content/manuals/enterprise/security/provisioning/scim/group-mapping.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ This page explains how group mapping works, and how to set up group mapping.
1919

2020
> [!TIP]
2121
>
22-
> Group mapping is ideal for adding users to multiple organizations or multiple teams within one organization. If you don't need to set up multi-organization or multi-team assignment, SCIM [user-level attributes](scim.md#set-up-role-mapping) may be a better fit for your needs.
22+
> Group mapping is ideal for adding users to multiple organizations or multiple teams within one organization. If you don't need to set up multi-organization or multi-team assignment, SCIM [user-level attributes](provision-scim.md#set-up-role-mapping) may be a better fit for your needs.
2323
2424
## Prerequisites
2525

@@ -125,7 +125,7 @@ The next time you sync your groups with Docker, your users will map to the Docke
125125

126126
## Configure group mapping with SCIM
127127

128-
Use group mapping with SCIM for more advanced user lifecycle management. Before you begin, make sure you [set up SCIM](./scim.md#enable-scim) first.
128+
Use group mapping with SCIM for more advanced user lifecycle management. Before you begin, make sure you [set up SCIM](./provision-scim.md#enable-scim) first.
129129

130130
{{< tabs >}}
131131
{{< tab name="Okta" >}}
@@ -190,4 +190,4 @@ Once complete, a user who signs in to Docker through SSO is automatically added
190190

191191
> [!TIP]
192192
>
193-
> [Enable SCIM](scim.md) to take advantage of automatic user provisioning and de-provisioning. If you don't enable SCIM users are only automatically provisioned. You have to de-provision them manually.
193+
> [Enable SCIM](provision-scim.md) to take advantage of automatic user provisioning and de-provisioning. If you don't enable SCIM users are only automatically provisioned. You have to de-provision them manually.

content/manuals/enterprise/security/provisioning/scim/scim.md renamed to content/manuals/enterprise/security/provisioning/scim/provision-scim.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ Next, [set up role mapping](#set-up-role-mapping).
150150

151151
## Set up role mapping
152152

153-
You can assign [Docker roles](../roles-and-permissions.md) to
153+
You can assign [Docker roles](/enterprise/security/roles-and-permissions/) to
154154
users by adding optional SCIM attributes in your IdP. These attributes override
155155
default role and team values set in your SSO configuration.
156156

@@ -164,7 +164,7 @@ The following table lists the supported optional user-level attributes:
164164

165165
| Attribute | Possible values | Notes |
166166
| ------------ | ---------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
167-
| `dockerRole` | `member`, `editor`, or `owner` | If not set, the user defaults to the `member` role. Setting this attribute overrides the default.<br><br>For role definitions, see [Roles and permissions](../roles-and-permissions.md). |
167+
| `dockerRole` | `member`, `editor`, or `owner` | If not set, the user defaults to the `member` role. Setting this attribute overrides the default.<br><br>For role definitions, see [Roles and permissions](/enterprise/security/roles-and-permissions/). |
168168
| `dockerOrg` | Docker `organizationName` (e.g., `moby`) | Overrides the default organization configured in your SSO connection.<br><br>If unset, the user is provisioned to the default organization. If `dockerOrg` and `dockerTeam` are both set, the user is provisioned to the team within the specified organization. |
169169
| `dockerTeam` | Docker `teamName` (e.g., `developers`) | Provisions the user to the specified team in the default or specified organization. If the team doesn't exist, it is automatically created.<br><br>You can still use [group mapping](group-mapping.md) to assign users to multiple teams across organizations. |
170170

@@ -176,7 +176,7 @@ This value is required in your identity provider when creating custom SCIM attri
176176

177177
### Step one: Set up role mapping in Okta
178178

179-
1. Setup [SSO](../single-sign-on/connect.md) and SCIM first.
179+
1. Setup [SSO](/enterprise/security/single-sign-on/connect) and SCIM first.
180180
1. In the Okta admin portal, go to **Directory**, select **Profile Editor**,
181181
and then **User (Default)**.
182182
1. Select **Add Attribute** and configure the values for the role, organization,
@@ -368,5 +368,5 @@ To disable SCIM:
368368

369369
## Next steps
370370

371-
- Set up [Group mapping](/manuals/enterprise/security/provisioning/scim/group-mapping.md).
372-
- [Troubleshoot provisioning](/manuals/enterprise/troubleshoot/troubleshoot-provisioning.md).
371+
- Set up [Group mapping](/enterprise/security/provisioning/scim/group-mapping/).
372+
- [Troubleshoot provisioning](/enterprise/troubleshoot/troubleshoot-provisioning/).

0 commit comments

Comments
 (0)