You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/manuals/security/for-admins/provisioning/scim.md
+82-35Lines changed: 82 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -102,12 +102,19 @@ You must [configure SSO](../single-sign-on/configure/_index.md) before you enabl
102
102
The user interface for your IdP may differ slightly from the following steps. You can refer to the documentation for your IdP to verify. For additional details, see the documentation for your IdP:
After completing role mapping, you can test the configuration manually.
356
+
357
+
358
+
{{< tabs >}}
359
+
{{< tab name="Okta" >}}
360
+
361
+
1. In the Okta admin portal, go to **Directory > People**.
362
+
1. Select a user you've assigned to your SCIM application.
363
+
1. Select **Provision User**.
364
+
1. Wait a few seconds, then check the Docker
365
+
[Admin Console](https://app.docker.com/admin) under **Members**.
366
+
1. If the user doesn’t appear, review logs in **Reports > System Log** and
367
+
confirm SCIM settings in the app.
368
+
369
+
{{< /tab >}}
370
+
{{< tab name="Entra ID/Azure AD (OIDC and SAML 2.0)" >}}
371
+
372
+
1. In the Azure Portal, go to **Microsoft Entra ID** > **Enterprise Applications**,
373
+
and select your SCIM app.
374
+
1. Go to **Provisioning** > **Provision on demand**.
375
+
1. Select a user or group and choose **Provision**.
376
+
1. Confirm that the user appears in the Docker
377
+
[Admin Console](https://app.docker.com/admin) under **Members**.
378
+
1. If needed, check **Provisioning logs** for errors.
379
+
380
+
{{< /tab >}}
381
+
{{< /tabs >}}
382
+
340
383
## Disable SCIM
341
384
342
385
If SCIM is disabled, any user provisioned through SCIM will remain in the organization. Future changes for your users will not sync from your IdP. User de-provisioning is only possible when manually removing the user from the organization.
@@ -364,3 +407,7 @@ The following videos demonstrate how to configure SCIM for your IdP:
364
407
-[Video: Attribute mapping with Okta](https://youtu.be/c56YECO4YP4?feature=shared&t=1998)
365
408
-[Video: Configure SCIM with Entra ID/Azure AD](https://youtu.be/bGquA8qR9jU?feature=shared&t=1668)
366
409
-[Video: Attribute and group mapping with Entra ID/Azure AD](https://youtu.be/bGquA8qR9jU?feature=shared&t=2039)
410
+
411
+
Refer to the following troubleshooting guide if needed:
0 commit comments