You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/guides/admin-set-up/_index.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Set up your company for success with Docker
3
3
linkTitle: Admin set up
4
-
summary: Get the most out of Docker by streamlining workflows, standardizing development environments, and ensuring smooth deployments across your company
4
+
summary: Get the most out of Docker by streamlining workflows, standardizing development environments, and ensuring smooth deployments across your company.
5
5
description: Learn how to onboard your company and take advantage of all of the Docker products and features.
6
6
levels: [intermediate]
7
7
params:
@@ -28,19 +28,19 @@ Docker's tools provide a scalable, secure platform that empowers your developers
28
28
29
29
By configuring Docker products to suit your company’s needs, you can optimize performance, simplify user management, and maintain control over resources. Whether you’re managing Docker Desktop, Docker Hub, or Docker Build Cloud, this guide will help you set up and configure Docker products to maximize productivity and success for your team whilst meeting compliance and security policies
30
30
31
-
## What you’ll learn
32
-
33
-
- The importance of signing in to the company's Docker organization for access to usage data and enhanced functionality.
34
-
- How to standardize Docker Desktop versions and settings to create a consistent baseline for all users, while allowing flexibility for advanced developers.
35
-
- Strategies for implementing Docker’s security configurations to meet company IT and software development security requirements without hindering developer productivity.
36
-
37
31
## Who’s this for?
38
32
39
33
- Administrators responsible for managing Docker environments within their organization
40
34
- IT leaders looking to streamline development and deployment workflows
41
35
- Teams aiming to standardize application environments across multiple users
42
36
- Organizations seeking to optimize their use of Docker products for greater scalability and efficiency
43
37
38
+
## What you’ll learn
39
+
40
+
- The importance of signing in to the company's Docker organization for access to usage data and enhanced functionality.
41
+
- How to standardize Docker Desktop versions and settings to create a consistent baseline for all users, while allowing flexibility for advanced developers.
42
+
- Strategies for implementing Docker’s security configurations to meet company IT and software development security requirements without hindering developer productivity.
43
+
44
44
## Tools integration
45
45
46
46
Okta, Entra ID SAML 2.0, Azure Connect (OIDC), MDM solutions like Intune
Copy file name to clipboardExpand all lines: content/guides/admin-set-up/comms-and-info-gathering.md
+60-12Lines changed: 60 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,24 +4,72 @@ description: Gather your company's requirements from key stakeholders and commun
4
4
weight: 10
5
5
---
6
6
7
+
## Step one: Communicate with your developers and IT teams
8
+
9
+
### Docker user communication
7
10
8
-
Docker user communication
9
11
You may already have Docker Desktop users in your company. Some of the steps in this process may cause changes in how they use Docker Desktop. It’s recommended that you send out a communication up front to the users letting them know that as part of the subscription onboarding process you will be upgrading existing Docker Desktop users to a supported version of the product, reviewing settings to help user productivity, and requiring users to sign in to the company’s Docker org with their business email so they are using the subscription.
10
12
11
-
MDM team communication
13
+
### MDM team communication
14
+
12
15
Device management solutions like Intune and Jamf are a standard way to distribute software across enterprises. There is typically a MDM team that manages this tool. We recommend talking with that team early in the process to understand their requirements and lead time on distributing changes. The Docker configurations can include both JSON files and/or registry key/plist entries that will be distributed to developer machines. It is recommended to use MDM tooling to both distribute configuration files, and ensure their contents don’t change.
13
16
14
-
Identify Organizations
15
-
Some companies may have more than one Docker organization created. These organizations may have been created for specific purposes, or may not be needed anymore. If you suspect your company has more than one organization, it's recommended you survey your teams to see if they have their own organizations. You can also contact your Docker CS representative to get a list of organizations with users whose emails match your domain name.
17
+
## Step two: Identify Docker organizations
18
+
19
+
Some companies may have more than one [Docker organization](/manuals/admin/organization/_index.md) created. These organizations may have been created for specific purposes, or may not be needed anymore. If you suspect your company has more than one Docker organization, it's recommended you survey your teams to see if they have their own organizations. You can also contact your Docker Customer Success representative to get a list of organizations with users whose emails match your domain name.
20
+
21
+
## Step three: Gather requirements
22
+
23
+
### Baseline configuration
24
+
25
+
Docker offers a significant number of configuration parameters that can be preset.
26
+
27
+
The Docker organization owner and the development lead should review the settings to determine which of those settings to configure to create the company’s baseline configuration. You should also discuss [enforcing sign-in]() for your Docker Desktop users and whether you want to take advantage of the free trials of other Docker products. such as [Docker Scout](), which is included in the subscription.
28
+
29
+
{{< accordion title="Baseline settings to review" >}}
|`proxy`|| This setting configures the proxy used by Docker Desktop to access the internet. The proxy can be set manually or get its value from the system.|
34
+
|`wslEngineEnabled`| Windows only | This setting specifies whether the user should use WSL 2 or HyperV for the VM for Windows installations.|
35
+
|`kubernetes`|| Docker Desktop offers a Kubernetes single-node cluster for Kubernetes deployments locally. This setting controls whether it is started when Docker Desktop starts, and its configuration.|
36
+
|`analyticsEnabled`|| Docker allows users to opt out of sending usage data to Docker. The usage data feeds what admins are able to see about Docker Desktop usage, so it is highly recommended to enable and lock this setting.|
37
+
|`useVirtualizationFrameworkVirtioFS`| macOS only | VirtioFS is the newer higher performance file sharing framework for MacOS. It takes precedence over the older frameworks if it is enabled.|
38
+
|`useVirtualizationFrameworkRosetta`| macOS only | Rosetta is the Apple emulator for x86 chipsets. This setting allows Docker Desktop to use Rosetta when running containers built for the x86 chipset.|
39
+
|`allowExperimentalFeatures`|| Docker Desktop versions often contain experimental features for trial and feedback. If this setting is set to false, experimental features are disabled.|
40
+
|`allowBetaFeatures`|| Docker Desktop versions often contain beta features for trial and feedback. If this setting is set to false, beta features are disabled.|
41
+
|`configurationFileVersion`|| Specifies the version of the configuration file format.|
42
+
|`dockerDaemonOptions` - Linux Containers || This setting overrides the options in the Docker Engine config file. See the Docker Engine reference for details. Note that for added security, a few of the config attributes may be overridden when Enhanced Container Isolation is enabled. |
43
+
|`vpnkitCIDR`|| Overrides the network range used for vpnkit DHCP/DNS for `*.docker.internal`|
44
+
|`dockerDaemonOptions` - Windows Containers | Windows only | This setting overrides the options in the daemon config file. See the Docker Engine reference for details. |
45
+
|`extensionsEnabled`|| Docker extensions are third-party add-ons for Docker Desktop. This setting affects if they are allowed.|
46
+
|`useGrpcfuse`| macOS only | If the value is set to true, gRPC Fuse is set as the file sharing mechanism. |
47
+
|`displayedOnboarding`|| There is an onboarding survey that displays when Docker Desktop is installed and opened for the first time. This setting can disable the survey.|
48
+
49
+
{{< /accordion >}}
50
+
51
+
### Security configuration
52
+
53
+
Docker offers a number of security related features that have configuration parameters that can be preset. The infosec representative, Docker organization owner, and the development lead should review those features to determine what should be enabled to meet your company’s security requirements.
54
+
55
+
{{< accordion title="Security settings to review" >}}
16
56
17
-
Baseline configuration discussions
18
-
Docker offers a significant number of configuration parameters that can be preset, including enforcing sign in for Docker Desktop users. The Docker organization owner and the development lead should review the settings to determine which of those settings to configure to create the company’s baseline configuration. There are also settings for the free trials of other Docker products included in the subscription. The list of configurations that can be preset is located here.
57
+
| Setting | OS Requirements | Description |
58
+
|------------|-----------------|---------------|
59
+
| Enhanced Container Isolation || When this setting is enabled, Docker Desktop runs all containers as unprivileged, via the Linux user-namespace, prevents them from modifying sensitive configurations inside the Docker Desktop VM, and uses other advanced techniques to isolate them. For more information, see [Enhanced Container Isolation](/manuals/security/for-admins/hardened-desktop/enhanced-container-isolation/_index.md). |
60
+
| Registry Access Management (Docker Org) || This parameter is set in the Docker org admin interface. Restricts the registries that `docker pull` and `docker push` commands can access. Note: This is not an endpoint security solution, but a guardrail for users working within company guidelines. For more information, see [Registry Access Management](/manuals/security/for-admins/hardened-desktop/registry-access-management.md).|
61
+
| Image Access Management (Docker Org) || This parameter is set in the Docker org admin interface. Restricts the categories of images accessible within Docker Hub. Note: This is not an endpoint security solution; it's a guardrail for users working within company guidelines. For more information, see [Image Access Management](/manuals/security/for-admins/hardened-desktop/image-access-management.md).|
62
+
| Scout || Settings related to how Scout creates SBOMs (Software Bill of Materials) for images and indexes vulnerabilities for images.|
63
+
| exposeDockerAPIOnTCP2375 | Windows only | Exposes the Docker API on a specified port. If the value is set to true, the Docker API is exposed on port 2375. **Note**: This is unauthenticated and should only be enabled if protected by suitable firewall rules.|
64
+
| windowsDockerdPort | Windows only | Exposes Docker Desktop's internal proxy locally on this port for the Windows Docker daemon to connect to. **Note**: Available for Windows containers only. |
65
+
| filesharingAllowedDirectories || Specify which paths on the developer host machine or network your users can add container file shares to.|
66
+
| enableKerberosNtlm || When set to true, Kerberos and NTLM authentication is enabled. Default is false. Available in Docker Desktop version 4.32 and later.|
67
+
| containersProxy (Beta) || Allows you to create air-gapped containers. For more information, see [Air-Gapped Containers](/manual/security/for-admins/hardened-desktop/air-gapped-containers.md).|
68
+
| blockDockerLoad || When this setting is enabled, users can no longer run the `docker load` command and will receive an error if they try.|
69
+
| disableUpdate || Users get notifications about new Docker Desktop versions. Enabling this setting removes those notifications. Helpful if corporate IT manages Docker Desktop version updates for users.|
19
70
20
-
Security configuration discussions
21
-
Docker offers a number of security related features that have configuration parameters that can be preset. The infosec representative, Docker organization owner, and the development lead should review those features to determine which they want to enable as part of the company’s baseline configuration. The list of security related features is located here.
71
+
{{< /accordion >}}
22
72
23
-
Meet with the Docker implementation team
24
-
The Docker Implementation Team can help you step through setting up your organization, configuring SSO, enforcing sign in, and configuring Docker. You can reach out to set up a meeting by emailing [email protected]
73
+
## Option step four: Meet with the Docker Implementation team
25
74
26
-
SSO domain verification
27
-
The SSO process has multiple steps involving different teams, so it's recommended that the process is started right away. The first step is domain verification. This step ensures that the person setting up SSO actually controls the domain they are requesting. The detailed steps to verify a domain are located here. Your DNS team will need to be involved in this step.
75
+
The Docker Implementation team can help you step through setting up your organization, configuring SSO, enforcing sign in, and configuring Docker. You can reach out to set up a meeting by emailing [email protected]
Copy file name to clipboardExpand all lines: content/guides/admin-set-up/finalize-plans-and-setup.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,4 +20,8 @@ Send finalized settings files to MDM team
20
20
Once all of the settings have been entered to the files that need to be distributed, pass the files to your MDM team to package up. It’s highly recommended that the next step in week 3 is a test distribution to a small number of Docker Desktop users to verify the functionality works as expected.
21
21
22
22
Set up free tier Docker product entitlements included in the subscription
23
-
Set up the cloud builder for free monthly minutes in Docker Build Cloud, and up to three repositories to monitor via Docker Scout. Please note that your free entitlements stop when your limits are exceeded so there is no fear of a surprise cost overage. The instructions on setting up the cloud builder are located on build.docker.com and there is a video walkthrough here, and the instructions on adding a repository for scout monitoring is here for Docker Hub repositories, and here for integration to other image registries.
23
+
Set up the cloud builder for free monthly minutes in Docker Build Cloud, and up to three repositories to monitor via Docker Scout. Please note that your free entitlements stop when your limits are exceeded so there is no fear of a surprise cost overage. The instructions on setting up the cloud builder are located on build.docker.com and there is a video walkthrough here, and the instructions on adding a repository for scout monitoring is here for Docker Hub repositories, and here for integration to other image registries.
24
+
25
+
26
+
SSO domain verification
27
+
The SSO process has multiple steps involving different teams, so it's recommended that the process is started right away. The first step is domain verification. This step ensures that the person setting up SSO actually controls the domain they are requesting. The detailed steps to verify a domain are located here. Your DNS team will need to be involved in this step.
0 commit comments