You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/guides/admin-set-up/comms-and-info-gathering.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ The Docker organization owner and the development lead should review the setting
37
37
|`proxy`|| This setting configures the proxy used by Docker Desktop to access the internet. The proxy can be set manually or get its value from the system.|
38
38
|`wslEngineEnabled`| Windows only | This setting specifies whether the user should use WSL 2 or HyperV for the VM for Windows installations.|
39
39
|`kubernetes`|| Docker Desktop offers a Kubernetes single-node cluster for Kubernetes deployments locally. This setting controls whether it is started when Docker Desktop starts, and its configuration.|
40
-
|`analyticsEnabled`|| Docker lets users to opt out of sending usage data to Docker. The usage data feeds what admins are able to see about Docker Desktop usage, so it is highly recommended to enable and lock this setting.|
40
+
|`analyticsEnabled`|| Docker lets users opt out of sending usage data to Docker. The usage data feeds what admins are able to see about Docker Desktop usage, so it is highly recommended to enable and lock this setting.|
41
41
|`useVirtualizationFrameworkVirtioFS`| macOS only | Virtiofs is the newer higher performance file sharing framework for Mac. It takes precedence over the older frameworks if it is enabled.|
42
42
|`useVirtualizationFrameworkRosetta`| macOS only | Rosetta is the Apple emulator for x86 chipsets. This setting lets Docker Desktop to use Rosetta when running containers built for the x86 chipset.|
43
43
|`allowExperimentalFeatures`|| Docker Desktop versions often contain experimental features for trial and feedback. If this setting is set to false, experimental features are disabled.|
@@ -68,12 +68,12 @@ Docker also offers a number of security related features, again through [Setting
68
68
|`windowsDockerdPort`| Windows only | Exposes Docker Desktop's internal proxy locally on this port for the Windows Docker daemon to connect to. It is available for Windows containers only. |
69
69
|`filesharingAllowedDirectories`|| Specify which paths on the developer host machine or network your users can add container file shares to.|
70
70
|`enableKerberosNtlm`|| When set to true, Kerberos and NTLM authentication is enabled. Default is false. Available in Docker Desktop version 4.32 and later.|
71
-
|`containersProxy`||Allows you to create air-gapped containers. For more information, see [Air-Gapped Containers](/manuals/security/for-admins/hardened-desktop/air-gapped-containers.md).|
71
+
|`containersProxy`||Lets you create air-gapped containers. For more information, see [Air-Gapped Containers](/manuals/security/for-admins/hardened-desktop/air-gapped-containers.md).|
72
72
|`blockDockerLoad`|| When this setting is enabled, users can no longer run the `docker load` command and will receive an error if they try.|
73
73
|`disableUpdate`|| Users get notifications about new Docker Desktop versions. Enabling this setting removes those notifications. Helpful if corporate IT manages Docker Desktop version updates for users.|
74
74
75
75
{{< /accordion >}}
76
76
77
77
## Optional step four: Meet with the Docker Implementation team
78
78
79
-
The Docker Implementation team can help you step through setting up your organization, configuring SSO, enforcing sign in, and configuring Docker. You can reach out to set up a meeting by emailing [email protected].
79
+
The Docker Implementation team can help you step through setting up your organization, configuring SSO, enforcing sign in, and configuring Docker. You can reach out to set up a meeting by emailing [email protected].
Copy file name to clipboardExpand all lines: content/guides/admin-set-up/deploy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ weight: 40
9
9
10
10
## Step one: Enforce SSO
11
11
12
-
Enforcing SSO means that anyone who has a Docker profile with an email address that matches your verified domain must sign in using your SSO connection. Make sure the Identity provider groups associated with your SSO connection cover all the developer groups that you want to have access to the Docker subscription.
12
+
Enforcing SSO means that anyone who has a Docker profile with an email address that matches your verified domain must sign in using your SSO connection. Make sure the Identity provider groups associated with your SSO connection cover all the developer groups that you want to have access to the Docker subscription.
13
13
14
14
## Step two: Deploy configuration settings and enforce sign-in to users
Copy file name to clipboardExpand all lines: content/guides/admin-set-up/finalize-plans-and-setup.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ If you have more than one organization, it’s recommended that you either conso
22
22
23
23
### Set up single sign-on SSO domain verification
24
24
25
-
Single sign-on (SSO) allows developers to authenticate using their identity providers (IdPs) to access Docker. SSO is available for a whole company, and all associated organizations, or an individual organization that has a Docker Business subscription. For more information, see the [documentation](/manuals/security/for-admins/single-sign-on/_index.md).
25
+
Single sign-on (SSO) lets developers to authenticate using their identity providers (IdPs) to access Docker. SSO is available for a whole company, and all associated organizations, or an individual organization that has a Docker Business subscription. For more information, see the [documentation](/manuals/security/for-admins/single-sign-on/_index.md).
26
26
27
27
You can also enable [SCIM] for further automation of provisioning and deprovisioning of users.
28
28
@@ -40,4 +40,4 @@ You can also enable [SCIM] for further automation of provisioning and deprovisio
40
40
41
41
Existing users may be running outdated or unsupported versions of Docker Desktop. It is highly recommended all users update to a supported version. Docker Desktop versions released within the past 6 months from the latest release are supported.
42
42
43
-
We recommend using a MDM solution to manage the version of Docker Desktop for users. Users may also get Docker Desktop directly from Docker or through a company software portal.
43
+
It's recommended that you use us a MDM solution to manage the version of Docker Desktop for users. Users may also get Docker Desktop directly from Docker or through a company software portal.
0 commit comments