|
| 1 | +--- |
| 2 | +title: Enforce secure authentication |
| 3 | +description: |
| 4 | +weight: 10 |
| 5 | +--- |
| 6 | + |
| 7 | +In regulated and security-sensitive environments, enforcing single sign-on |
| 8 | +(SSO) ensures all users authenticate through a centralized identity provider |
| 9 | +(IdP). This strengthens security, simplifies user management, and allows you to |
| 10 | +enforce organization-wide authentication policies. |
| 11 | + |
| 12 | +This module walks you through how to configure SSO for your Docker organization, |
| 13 | +enforce it for all users, and disable fallback sign-in methods. |
| 14 | + |
| 15 | +## Prerequisites |
| 16 | + |
| 17 | +Before you begin, ensure you have: |
| 18 | + |
| 19 | +- A Docker Business subscription |
| 20 | +- Admin access to your Docker organization or company |
| 21 | +- Access to your DNS provider |
| 22 | +- Access to your Identity Provider (IdP) admin console (e.g., Okta, Azure AD) |
| 23 | + |
| 24 | +## Step one: Add and verify your domain |
| 25 | + |
| 26 | +Verifying your organization’s domain is the first step in securing access. This |
| 27 | +process confirms ownership and allows you to enforce SSO and auto-provisioning. |
| 28 | + |
| 29 | +1. Sign in to the [Docker Admin Console](https://app.docker.com/admin) and |
| 30 | +select your organization from the **Choose profile** page. |
| 31 | +1. Add your domain: |
| 32 | + 1. Under **Security and access**, select **Domain management**. |
| 33 | + 1. Select **Add a domain**. |
| 34 | + 1. Enter your domain (e.g., `example.com`) and select **Add domain**. |
| 35 | +1. Verify your domain: |
| 36 | + 1. A pop-up modal will display a **TXT Record Value.** |
| 37 | + 1. Sign in to your DNS provider and add a TXT record using the provided value. |
| 38 | + 1. It may take up to 72 hours for DNS changes to propagate. |
| 39 | + 1. Once the TXT record is recognized, return to the Admin Console’s **Domain management** page and select **Verify**. |
| 40 | + |
| 41 | +> [!NOTE] |
| 42 | +> |
| 43 | +> For detailed instructions on adding TXT records with specific DNS providers, |
| 44 | +see [Domain management](). |
| 45 | + |
| 46 | +## Step two: Set up SSO |
| 47 | + |
| 48 | +Docker offers two types of SSO integration: |
| 49 | + |
| 50 | +- OIDC: For IdPs like Entra ID, Auth0, or Google Workspace |
| 51 | +- SAML 2.0: Widely supported by enterprise IdPs like Okta, Ping, and legacy |
| 52 | +providers |
| 53 | + |
| 54 | +Docker’s SSO configuration supports: |
| 55 | + |
| 56 | +- Just-in-Time (JIT) user provisioning |
| 57 | +- Multi-domain SSO |
| 58 | +- Group mapping for team assignment (covered in [Module 2]()) |
| 59 | + |
| 60 | +To compare protocols and choose your setup path, start with the |
| 61 | +[SSO overview](). |
| 62 | + |
| 63 | +Then follow the instructions for your IdP: |
| 64 | + |
| 65 | +- [Set up OIDC SSO]() |
| 66 | +- [Set up SAML SSO]() |
| 67 | + |
| 68 | +Each guide walks you through: |
| 69 | + |
| 70 | +- Linking your verified domain to your IdP |
| 71 | +- Entering credentials |
| 72 | +- Mapping user claims |
| 73 | +- Testing the connection with a non-admin account |
| 74 | + |
| 75 | +## Step three: Enforce SSO |
| 76 | + |
| 77 | +Once you’ve confirmed the SSO connection works, you can enforce it across your |
| 78 | +organization to ensure all users authenticate through your IdP. |
| 79 | + |
| 80 | +To enforce SSO: |
| 81 | + |
| 82 | +1. In the [Admin Console](https://app.docker.com/admin), navigate |
| 83 | +to **Security and access** > **Authentication**. |
| 84 | +2. Under **SSO enforcement**, select **Enforce SSO for all users**. |
| 85 | +3. Confirm your changes. |
| 86 | + |
| 87 | +This step blocks users from signing in with Docker credentials and requires |
| 88 | +authentication via your IdP for any domain-matched account. |
| 89 | + |
| 90 | +## Step four: Enforce Docker Desktop sign-in |
| 91 | + |
| 92 | +To prevent users from running Docker Desktop anonymously or without |
| 93 | +organizational control, you can enforce sign-in at the Desktop client level. |
| 94 | +When enabled, users must sign in with a Docker ID to use Docker Desktop. |
| 95 | + |
| 96 | +This setting is enforced using centralized configuration methods like: |
| 97 | + |
| 98 | +- `admin-settings.json` for local testing and smaller rollouts |
| 99 | +- Mobile Device Management (MDM) tools for larger fleets |
| 100 | + |
| 101 | +To enable it: |
| 102 | + |
| 103 | +1. In your settings configuration, set: |
| 104 | + |
| 105 | + ```json |
| 106 | + { |
| 107 | + "enforceSignIn": true |
| 108 | + } |
| 109 | + ``` |
| 110 | + |
| 111 | +2. Distribute the setting using one of the supported configuration |
| 112 | +methods (e.g., MDM, file copy, registry edit). |
| 113 | + |
| 114 | +For full details, see [Enforce sign-in](). |
| 115 | + |
| 116 | +## Best practices |
| 117 | + |
| 118 | +- Enable Just-in-Time (JIT) provisioning to streamline user onboarding. |
| 119 | +- Set up Multi-Factor Authentication (MFA) in your IdP for stronger |
| 120 | +authentication. |
| 121 | +- Use Enforce Sign-In on Docker Desktop to prevent unauthenticated or offline |
| 122 | +usage. |
| 123 | +- Avoid fallback authentication paths by enforcing SSO per domain. |
| 124 | +- Test with sample accounts before rolling out enforcement org-wide. |
0 commit comments