You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -16,15 +17,15 @@ following sections describe some common SSO errors and possible solutions.
16
17
17
18
If you experience issues with SSO, check both the Docker Admin Console and your identity provider (IdP) for errors first.
18
19
19
-
####Check Docker error logs
20
+
### Check Docker error logs
20
21
21
22
1. Sign in to the [Admin Console](https://app.docker.com/admin/) and select your organization.
22
23
2. Select **SSO and SCIM**.
23
24
3. In the SSO connections table, select the **Action** menu and then **View error logs**.
24
25
4. For more details on specific errors, select **View error details** next to an error message.
25
26
5. Note any errors you see on this page for further troubleshooting.
26
27
27
-
####Check for errors in your IdP
28
+
### Check for errors in your IdP
28
29
29
30
1. Review your IdP’s logs or audit trails for any failed authentication or provisioning attempts.
30
31
2. Confirm that your IdP’s SSO settings match the values provided in Docker.
@@ -36,31 +37,31 @@ For further troubleshooting, check your IdP’s documentation. You can also cont
36
37
37
38
## Groups are not formatted correctly
38
39
39
-
####Error message
40
+
### Error message
40
41
41
42
When this issue occurs, the following error message is common:
42
43
```text
43
44
Some of the groups assigned to the user are not formatted as '<organization name>:<team name>'. Directory groups will be ignored and user will be provisioned into the default organization and team.
44
45
```
45
46
46
-
####Possible causes
47
+
### Possible causes
47
48
48
49
- Incorrect group name formatting in your identity provider (IdP): Docker requires groups to follow the format `<organization>:<team>`. If the groups assigned to a user do not follow this format, they will be ignored.
49
50
- Non-matching groups between IdP and Docker organization: If a group in your IdP does not have a corresponding team in Docker, it will not be recognized, and the user will be placed in the default organization and team.
50
51
51
-
####Affected environments
52
+
### Affected environments
52
53
53
54
- Docker single sign-on setup using IdPs such as Okta or Azure AD
54
55
- Organizations using group-based role assignments in Docker
55
56
56
-
####Steps to replicate
57
+
### Steps to replicate
57
58
58
59
To replicate this issue:
59
60
1. Attempt to sign in to Docker using SSO.
60
61
2. The user is assigned groups in the IdP but does not get placed in the expected Docker Team.
61
62
3. Review Docker logs or IdP logs to find the error message.
62
63
63
-
####Solutions
64
+
### Solutions
64
65
65
66
Update group names in your IdP:
66
67
1. Go to your IdP's group management section.
@@ -71,20 +72,20 @@ Update group names in your IdP:
71
72
72
73
## User is not assigned to the organization
73
74
74
-
####Error message
75
+
### Error message
75
76
76
77
When this issue occurs, the following error message is common:
77
78
```text
78
79
User '$username' is not assigned to this SSO organization. Contact your administrator. TraceID: XXXXXXXXXXXXX
79
80
```
80
81
81
-
####Possible causes
82
+
### Possible causes
82
83
83
84
- User is not assigned to the organization: If Just-in-Time (JIT) provisioning is disabled, the user may not be assigned to your organization.
84
85
- User is not invited to the organization: If JIT is disabled and you do not want to enable it, the user must be manually invited.
85
86
- SCIM provisioning is misconfigured: If you use SCIM for user provisioning, it may not be correctly syncing users from your IdP.
86
87
87
-
####Solutions
88
+
### Solutions
88
89
89
90
**Enable JIT provisioning**
90
91
@@ -116,18 +117,18 @@ If you have SCIM enabled, troubleshoot your SCIM connection using the following
116
117
117
118
## IdP-initiated sign in is not enabled for connection
118
119
119
-
####Error message
120
+
### Error message
120
121
121
122
When this issue occurs, the following error message is common:
122
123
```text
123
124
IdP-Initiated sign in is not enabled for connection '$ssoConnection'.
124
125
```
125
126
126
-
####Possible causes
127
+
### Possible causes
127
128
128
129
Docker does not support an IdP-initiated SAML flow. This error occurs when a user attempts to authenticate from your IdP, such as using the Docker SSO app tile on the sign in page.
129
130
130
-
####Solutions
131
+
### Solutions
131
132
132
133
**Authenticate from Docker apps**
133
134
@@ -139,18 +140,18 @@ You can hide the Docker SSO app from users in your IdP. This prevents users from
139
140
140
141
## Not enough seats in organization
141
142
142
-
####Error message
143
+
### Error message
143
144
144
145
When this issue occurs, the following error message is common:
145
146
```text
146
147
Not enough seats in organization '$orgName'. Add more seats or contact your administrator.
147
148
```
148
149
149
-
####Possible causes
150
+
### Possible causes
150
151
151
152
This error occurs when the organization has no available seats for the user when provisioning via Just-in-Time (JIT) provisioning or SCIM.
152
153
153
-
####Solutions
154
+
### Solutions
154
155
155
156
**Add more seats to the organization**
156
157
@@ -162,20 +163,20 @@ Review your organization members and pending invitations. Remove inactive users
162
163
163
164
## Domain is not verified for SSO connection
164
165
165
-
####Error message
166
+
### Error message
166
167
167
168
When this issue occurs, the following error message is common:
168
169
```text
169
170
Domain '$emailDomain' is not verified for your SSO connection. Contact your company administrator. TraceID: XXXXXXXXXXXXXX
170
171
```
171
172
172
-
####Possible causes
173
+
### Possible causes
173
174
174
175
This error occurs if the IdP authenticated a user through SSO and the User Principal Name (UPN)
175
176
returned to Docker doesn’t match any of the verified domains associated to the
176
177
SSO connection configured in Docker.
177
178
178
-
####Solutions
179
+
### Solutions
179
180
180
181
**Verify UPN attribute mapping**
181
182
@@ -187,20 +188,20 @@ Add and verify all domains and subdomains used as UPN by your IdP and associate
187
188
188
189
## Unable to find session
189
190
190
-
####Error message
191
+
### Error message
191
192
192
193
When this issue occurs, the following error message is common:
193
194
```text
194
195
We couldn't find your session. You may have pressed the back button, refreshed the page, opened too many sign-in dialogs, or there is some issue with cookies. Try signing in again. If the issue persists, contact your administrator.
195
196
```
196
197
197
-
####Possible causes
198
+
### Possible causes
198
199
199
200
The following causes may create this issue:
200
201
- The user pressed the back or refresh button during authentication.
201
202
- The authentication flow lost track of the initial request, preventing completion.
202
203
203
-
####Solutions
204
+
### Solutions
204
205
205
206
**Do not disrupt the authentication flow**
206
207
@@ -212,20 +213,20 @@ Close the browser tab and restart the authentication flow from the Docker applic
212
213
213
214
## Name ID is not an email address
214
215
215
-
####Error message
216
+
### Error message
216
217
217
218
When this issue occurs, the following error message is common:
218
219
```text
219
220
The name ID sent by the identity provider is not an email address. Contact your company administrator.
220
221
```
221
222
222
-
####Possible causes
223
+
### Possible causes
223
224
224
225
The following causes may create this issue:
225
226
- The IdP sends a Name ID (UPN) that does not comply with the email format required by Docker.
226
227
- Docker SSO requires the Name ID to be the primary email address of the user.
227
228
228
-
####Solutions
229
+
### Solutions
229
230
230
231
In your IdP, ensure the Name ID attribute format is correct:
231
232
1. Verify that the Name ID attribute format in your IdP is set to `EmailAddress`.
0 commit comments