Skip to content

Commit d9c4cd9

Browse files
publish updates from main (#22659)
Automated pull request for publishing docs updates. --------- Co-authored-by: Sarah Sanders <[email protected]> Co-authored-by: Allie Sadler <[email protected]>
2 parents 32bd6ad + f4f1a45 commit d9c4cd9

File tree

5 files changed

+62
-14
lines changed

5 files changed

+62
-14
lines changed

content/manuals/desktop/troubleshoot-and-support/troubleshoot/topics.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -156,6 +156,23 @@ Ensure your username is short enough to keep paths within the allowed limit:
156156

157157
## Topics for Mac
158158

159+
### Upgrade requires administrator privileges
160+
161+
#### Cause
162+
163+
On macOS, users without administrator privileges cannot perform in-app upgrades from the Docker Desktop Dashboard.
164+
165+
#### Solution
166+
167+
> [!IMPORTANT]
168+
>
169+
> Do not uninstall the current version before upgrading. Doing so deletes all local Docker containers, images, and volumes.
170+
171+
To upgrade Docker Desktop:
172+
173+
- Ask an administrator to install the newer version over the existing one.
174+
- Use the []`--user` install flag](/manuals/desktop/setup/install/mac-install.md#security-and-access) if appropriate for your setup.
175+
159176
### Persistent notification telling me an application has changed my Desktop configurations
160177

161178
#### Cause

content/manuals/security/faqs/general.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,12 @@ This is applicable only when using Docker Hub's application-level password versu
7070

7171
### How do we de-provision users who are not part of our IdP? We use SSO but not SCIM
7272

73-
If SCIM isn't enabled, you have to manually remove users from the organization in our system. Using SCIM automates this.
73+
If SCIM isn't enabled, you have to manually remove users from the organization.
74+
SCIM can automate this if your users are added after SCIM is enabled. Any users
75+
added to your organization before SCIM is enabled must be removed manually.
76+
77+
For more information on manually removing users, see
78+
[Manage organization members](/manuals/admin/organization/members.md).
7479

7580
### What metadata is collected from container images that Scout analyzes?
7681

content/manuals/security/for-admins/hardened-desktop/settings-management/compliance-reporting.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,6 @@ highest-priority applicable status according to the following rules.
8383
| No policy assigned | The user does not have any policy assigned to them. |
8484
| Non-compliant | The user fetched the correct policy, but hasn't applied it. |
8585
| Outdated | The user fetched a previous version of the policy. |
86-
| Unknown | The user hasn't fetched any policy yet, or their compliance can't be determined. |
8786
| Compliant | The user fetched and applied the latest assigned policy. |
8887

8988
**Domain status**
@@ -95,7 +94,6 @@ This reflects how the user’s email domain is evaluated based on the organizati
9594
| Verified | The user’s email domain is verified. |
9695
| Guest user | The user's email domain is not verified. |
9796
| Domainless | Your organization has no verified domains, and the user's domain is unknown. |
98-
| Unknown user | Your organization has verified domains, but the user's domain is unknown. |
9997

10098
**Settings status**
10199

content/manuals/security/for-admins/provisioning/scim.md

Lines changed: 36 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -11,31 +11,46 @@ weight: 30
1111

1212
{{< summary-bar feature_name="SSO" >}}
1313

14-
System for Cross-domain Identity Management (SCIM) is available for Docker Business customers. This guide provides an overview of SCIM provisioning.
14+
System for Cross-domain Identity Management (SCIM) is available for Docker
15+
Business customers. This guide provides an overview of SCIM provisioning.
1516

1617
## How SCIM works
1718

18-
SCIM offers automated user provisioning and de-provisioning for Docker through your identity provider (IdP). Once SCIM is enabled, users assigned to the Docker application in your IdP are automatically provisioned and added to your Docker organization. If a user is unassigned, they are removed from Docker.
19+
SCIM automates user provisioning and de-provisioning for Docker through your
20+
identity provider (IdP). After you enable SCIM, any user assigned to your
21+
Docker application in your IdP is automatically provisioned and added to your
22+
Docker organization. When a user is removed from the Docker application in your
23+
IdP, SCIM deactivates and removes them from your Docker organization.
1924

20-
SCIM also syncs user profile updates, such as name changes, made in your IdP. SCIM can be used with Docker’s default Just-in-Time (JIT) provisioning configuration, or on its own with JIT disabled.
25+
In addition to provisioning and removal, SCIM also syncs profile updates like
26+
name changes—made in your IdP. You can use SCIM alongside Docker’s default
27+
Just-in-Time (JIT) provisioning or on its own with JIT disabled.
28+
29+
SCIM automates:
2130

22-
SCIM supports the automation of:
2331
- Creating users
2432
- Updating user profiles
2533
- Removing and deactivating users
2634
- Re-activating users
2735
- Group mapping
2836

29-
## Supported attributes
30-
31-
> [!IMPORTANT]
37+
> [!NOTE]
38+
>
39+
> SCIM only manages users provisioned through your IdP after SCIM is enabled.
40+
It cannot remove users who were manually added to your Docker organization
41+
before SCIM was set up.
3242
>
33-
> Docker uses JIT provisioning by default for SSO configurations. If you enable SCIM, JIT values still overwrite the attribute
34-
values set by SCIM provisioning. To avoid conflicts, your JIT attribute values must match your SCIM attribute values. To avoid conflicts between SCIM and JIT, you can also disable JIT provisioning. See [Just-in-Time](/manuals/security/for-admins/provisioning/just-in-time.md) for more information.
43+
> To remove those users, delete them manually from your Docker organization.
44+
For more information, see [Manage organization members](/manuals/admin/organization/members.md).
3545

36-
Attributes are pieces of user information, such as name and email, that are synchronized between your IdP and Docker when using SCIM. Proper mapping of these attributes is essential for seamless user provisioning and to prevent duplicate entries when using SSO.
46+
## Supported attributes
47+
48+
SCIM uses attributes (e.g., name, email) to sync user information between your
49+
IdP and Docker. Properly mapping these attributes in your IdP ensures that user
50+
provisioning works smoothly and prevents issues like duplicate user accounts
51+
when using single sign-on (SSO).
3752

38-
The following table lists the supported attributes for SCIM:
53+
Docker supports the following SCIM attributes:
3954

4055
| Attribute | Description |
4156
|:---------------------------------------------------------------|:-------------------------------------------------------------------------------------------|
@@ -46,6 +61,16 @@ The following table lists the supported attributes for SCIM:
4661

4762
For additional details about supported attributes and SCIM, see [Docker Hub API SCIM reference](/reference/api/hub/latest/#tag/scim).
4863

64+
> [!IMPORTANT]
65+
>
66+
> By default, Docker uses Just-in-Time (JIT) provisioning for SSO. If SCIM is
67+
enabled, JIT values still take precedence and will overwrite attribute values
68+
set by SCIM. To avoid conflicts, make sure your JIT attribute values match your
69+
SCIM values.
70+
>
71+
> Alternatively, you can disable JIT provisioning to rely solely on SCIM.
72+
For details, see [Just-in-Time](/manuals/security/for-admins/provisioning/just-in-time.md).
73+
4974
## Enable SCIM in Docker
5075

5176
You must [configure SSO](../single-sign-on/configure/_index.md) before you enable SCIM. Enforcing SSO isn't required to use SCIM.

hugo_stats.json

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,7 @@
8080
"Mac-with-Apple-silicon",
8181
"Mac-with-Intel-chip",
8282
"Manually-create-assets",
83+
"Manually-set-it-up",
8384
"NetworkManager",
8485
"Node",
8586
"Non-compliant",
@@ -113,8 +114,10 @@
113114
"Use-OpenAI",
114115
"Using-the-CLI",
115116
"Using-the-GUI",
117+
"Using-the-MCP-Toolkit-Recommended",
116118
"VS-Code",
117119
"Vue",
120+
"WSL-2-backend-Arm-Early-Access",
118121
"WSL-2-backend-x86_64",
119122
"Web-browser",
120123
"What-are-the-key-features-of-Docker-Desktop",

0 commit comments

Comments
 (0)