Skip to content

Commit d19a6d0

Browse files
committed
testing something
1 parent bb457ff commit d19a6d0

2 files changed

Lines changed: 8 additions & 8 deletions

File tree

content/manuals/enterprise/security/domain-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Add and manage domains
33
description: Add, verify, and manage domains to control user access and enable auto-provisioning in Docker organizations
44
keywords: domain management, domain verification, auto-provisioning, user management, DNS, TXT record, Admin Console
5-
weight: 21
5+
weight: 10
66
aliases:
77
- /security/for-admins/domain-management/
88
- /docker-hub/domain-audit/

content/manuals/enterprise/security/provisioning/troubleshoot-provisioning.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ keywords: SCIM troubleshooting, user provisioning, JIT provisioning, group mappi
66
tags: [Troubleshooting]
77
toc_max: 2
88
aliases:
9-
- /enterprise/security/provisioning/troubleshoot-provisioning/
9+
- /enterprise/troubleshoot/troubleshoot-provisioning/
1010
---
1111

1212
This page helps troubleshoot common user provisioning issues including user roles, attributes, and unexpected account behavior with SCIM and Just-in-Time (JIT) provisioning.
@@ -21,10 +21,10 @@ IdP. This issue usually surfaces as incorrect role or team assignment.
2121
### Causes
2222

2323
- JIT provisioning is enabled, and Docker is using values from your IdP's
24-
SSO login flow to provision the user, which overrides
25-
SCIM-provided attributes.
24+
SSO login flow to provision the user, which overrides
25+
SCIM-provided attributes.
2626
- SCIM was enabled after the user was already provisioned via JIT, so SCIM
27-
updates don't take effect.
27+
updates don't take effect.
2828

2929
### Affected environments
3030

@@ -37,7 +37,7 @@ updates don't take effect.
3737
1. Sign in to Docker as a user via SSO.
3838
1. Enable SCIM and set role/team attributes for that user.
3939
1. SCIM attempts to update the user's attributes, but the role or team
40-
assignment does not reflect changes.
40+
assignment does not reflect changes.
4141

4242
### Solutions
4343

@@ -58,7 +58,7 @@ and role assignment.
5858
If you prefer to keep JIT enabled:
5959

6060
- Make sure your IdP's SSO attribute mappings match the values being sent
61-
by SCIM.
61+
by SCIM.
6262
- Avoid configuring SCIM to override attributes already set via JIT.
6363

6464
This option requires strict coordination between SSO and SCIM attributes
@@ -83,4 +83,4 @@ existing user:
8383
> [!WARNING]
8484
>
8585
> Deleting a user removes their resource ownership (e.g., repositories).
86-
Transfer ownership before removing the user.
86+
> Transfer ownership before removing the user.

0 commit comments

Comments
 (0)