Skip to content

Commit 3b27787

Browse files
committed
edits
1 parent 707c2ff commit 3b27787

File tree

4 files changed

+12
-18
lines changed

4 files changed

+12
-18
lines changed

content/guides/admin-user-management/_index.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Mastering Docker user and access management
2+
title: Mastering user and access management
33
summary: Simplify user access while ensuring security and efficiency in Docker.
44
description: A guide for managing roles, provisioning users, and optimizing Docker access with tools like SSO and activity logs.
55
tags: [admin]
@@ -22,7 +22,7 @@ params:
2222
url: /admin/organization/activity-logs/
2323
---
2424

25-
Managing roles and permissions is key to securing your Docker environment while enabling seamless collaboration and operational efficiency. This guide walks IT administrators through the essentials of user and access management, offering strategies for assigning roles, provisioning users, and leveraging tools like activity logs and insights to monitor and optimize Docker usage.
25+
Managing roles and permissions is key to securing your Docker environment while enabling easy collaboration and operational efficiency. This guide walks IT administrators through the essentials of user and access management, offering strategies for assigning roles, provisioning users, and using tools like Activity logs and Insights to monitor and optimize Docker usage.
2626

2727
## Who's this for?
2828

@@ -35,7 +35,7 @@ Managing roles and permissions is key to securing your Docker environment while
3535
- How to assess and manage Docker user access and align accounts with organizational needs.
3636
- When to use team configurations for scalable access control.
3737
- How to automate and streamline user provisioning with SSO, SCIM, and JIT.
38-
- How monitoring tools like audit logs can bolster compliance.
38+
- How to get the most out of Docker's monitoring tools.
3939

4040
## Tools integration
4141

content/guides/admin-user-management/audit-and-monitor.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,20 +5,20 @@ keywords: organizational insights, user management, access control, security, mo
55
weight: 30
66
---
77

8-
Activity logs and insights are essential for user and access management in Docker. They provide visibility into user actions, team workflows, and organizational trends, helping enhance security, ensure compliance, and boost productivity.
8+
Activity logs and Insights are useful tools for user and access management in Docker. They provide visibility into user actions, team workflows, and organizational trends, helping enhance security, ensure compliance, and boost productivity.
99

1010
## Activity logs
1111

1212
Activity logs track events at the organization and repository levels, offering a clear view of activities like repository changes, team updates, and billing adjustments.
1313

14+
It is available for Docker Team or Docker Business plans, with data retained for three months.
15+
1416
### Key features
1517

1618
- Change tracking: View what changed, who made the change, and when.
1719

1820
- Comprehensive reporting: Monitor critical events such as repository creation, deletion, privacy changes, and role assignments.
1921

20-
- Requirements: Available for Docker Team or Docker Business plans, with data retained for three months.
21-
2222
### Example scenarios
2323

2424
- Audit trail for security: A repository’s privacy settings were updated unexpectedly. The activity logs reveal which user made the change and when, helping administrators address potential security risks.

content/guides/admin-user-management/onboard.md

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,15 @@
11
---
2-
title: Onboarding and managing roles and ermissions in Docker
2+
title: Onboarding and managing roles and permissions in Docker
33
description: Learn how to manage roles, invite members, and implement scalable access control in Docker for secure and efficient collaboration.
44
keywords: sso, scim, jit, invite members, docker hub, docker admin console, onboarding, security
55
weight: 20
66
---
77

8-
Learn how to invite owners, add members, and implement advanced tools like SSO and SCIM for secure and efficient access control when onboarding your organization and developers.
8+
This page guides you through onboarding owners and members, and using tools like SSO and SCIM to future-proof onboarding going forward.
99

1010
## Step 1: Invite owners
1111

12-
When you create a Docker organization, you automatically become its sole owner. While optional, adding additional owners can significantly ease the process of onboarding and managing your organization by distributing administrative responsibilities.
13-
14-
### Why add owners?
15-
16-
- Shared responsibilities: Distribute administrative tasks, such as managing roles and permissions.
17-
18-
- Improved continuity: Ensure seamless operations in case the primary owner is unavailable.
12+
When you create a Docker organization, you automatically become its sole owner. While optional, adding additional owners can significantly ease the process of onboarding and managing your organization by distributing administrative responsibilities. It also ensures continuity and does not cause a blocker if the primary own is unavailable.
1913

2014
For detailed information on owners, see [Roles and permissions](/manuals/security/for-admins/roles-and-permissions.md)
2115

content/guides/admin-user-management/setup.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ keywords: Docker roles, permissions management, access control, IT administratio
55
weight: 10
66
---
77

8-
Managing roles and permissions is a fundamental aspect of maintaining security, collaboration, and operational efficiency in Docker. With the right configurations, IT administrators can ensure developers have seamless access to necessary resources while preventing unauthorized access. This guide is tailored to help you identify Docker users, allocate subscription seats efficiently, and strategically assign roles to align with your organization's structure. By following these steps, you can enhance productivity and maintain robust access control.
8+
With the right configurations, you can ensure your developers have easy access to necessary resources while preventing unauthorized access. This page guides you through identifying Docker users, so you can allocate subscription seats efficiently, and assigning roles to align with your organization's structure.
99

1010
## Step one: Identify your Docker users and accounts
1111

@@ -46,6 +46,6 @@ For more information, see [Create and manage a team](/manuals/admin/organization
4646

4747
### Best practices
4848

49-
- Apply the principle of least privilege: Assign users only the minimum permissions necessary for their roles.
49+
- Apply the principle of least privilege. Assign users only the minimum permissions necessary for their roles.
5050

51-
- Conduct regular audits: Plan to conduct regulars reviews of role assignments to ensure they align with evolving team structures and organizational responsibilities.
51+
- Plan to conduct regulars reviews of role assignments to ensure they align with evolving team structures and organizational responsibilities.

0 commit comments

Comments
 (0)