You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/manuals/enterprise/security/provisioning/scim/group-mapping.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ This page explains how group mapping works, and how to set up group mapping.
19
19
20
20
> [!TIP]
21
21
>
22
-
> Group mapping is ideal for adding users to multiple organizations or multiple teams within one organization. If you don't need to set up multi-organization or multi-team assignment, SCIM [user-level attributes](scim.md#set-up-role-mapping) may be a better fit for your needs.
22
+
> Group mapping is ideal for adding users to multiple organizations or multiple teams within one organization. If you don't need to set up multi-organization or multi-team assignment, SCIM [user-level attributes](provision-scim.md#set-up-role-mapping) may be a better fit for your needs.
23
23
24
24
## Prerequisites
25
25
@@ -125,7 +125,7 @@ The next time you sync your groups with Docker, your users will map to the Docke
125
125
126
126
## Configure group mapping with SCIM
127
127
128
-
Use group mapping with SCIM for more advanced user lifecycle management. Before you begin, make sure you [set up SCIM](./scim.md#enable-scim) first.
128
+
Use group mapping with SCIM for more advanced user lifecycle management. Before you begin, make sure you [set up SCIM](./provision-scim.md#enable-scim) first.
129
129
130
130
{{< tabs >}}
131
131
{{< tab name="Okta" >}}
@@ -190,4 +190,4 @@ Once complete, a user who signs in to Docker through SSO is automatically added
190
190
191
191
> [!TIP]
192
192
>
193
-
> [Enable SCIM](scim.md) to take advantage of automatic user provisioning and de-provisioning. If you don't enable SCIM users are only automatically provisioned. You have to de-provision them manually.
193
+
> [Enable SCIM](provision-scim.md) to take advantage of automatic user provisioning and de-provisioning. If you don't enable SCIM users are only automatically provisioned. You have to de-provision them manually.
|`dockerRole`|`member`, `editor`, or `owner`| If not set, the user defaults to the `member` role. Setting this attribute overrides the default.<br><br>For role definitions, see [Roles and permissions](../roles-and-permissions.md). |
167
+
|`dockerRole`|`member`, `editor`, or `owner`| If not set, the user defaults to the `member` role. Setting this attribute overrides the default.<br><br>For role definitions, see [Roles and permissions](/enterprise/security/roles-and-permissions/). |
168
168
|`dockerOrg`| Docker `organizationName` (e.g., `moby`) | Overrides the default organization configured in your SSO connection.<br><br>If unset, the user is provisioned to the default organization. If `dockerOrg` and `dockerTeam` are both set, the user is provisioned to the team within the specified organization. |
169
169
|`dockerTeam`| Docker `teamName` (e.g., `developers`) | Provisions the user to the specified team in the default or specified organization. If the team doesn't exist, it is automatically created.<br><br>You can still use [group mapping](group-mapping.md) to assign users to multiple teams across organizations. |
170
170
@@ -176,7 +176,7 @@ This value is required in your identity provider when creating custom SCIM attri
176
176
177
177
### Step one: Set up role mapping in Okta
178
178
179
-
1. Setup [SSO](../single-sign-on/connect.md) and SCIM first.
179
+
1. Setup [SSO](/enterprise/security/single-sign-on/connect) and SCIM first.
180
180
1. In the Okta admin portal, go to **Directory**, select **Profile Editor**,
181
181
and then **User (Default)**.
182
182
1. Select **Add Attribute** and configure the values for the role, organization,
@@ -368,5 +368,5 @@ To disable SCIM:
368
368
369
369
## Next steps
370
370
371
-
- Set up [Group mapping](/manuals/enterprise/security/provisioning/scim/group-mapping.md).
0 commit comments