You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/manuals/security/for-admins/provisioning/scim.md
+36-11Lines changed: 36 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,31 +11,46 @@ weight: 30
11
11
12
12
{{< summary-bar feature_name="SSO" >}}
13
13
14
-
System for Cross-domain Identity Management (SCIM) is available for Docker Business customers. This guide provides an overview of SCIM provisioning.
14
+
System for Cross-domain Identity Management (SCIM) is available for Docker
15
+
Business customers. This guide provides an overview of SCIM provisioning.
15
16
16
17
## How SCIM works
17
18
18
-
SCIM offers automated user provisioning and de-provisioning for Docker through your identity provider (IdP). Once SCIM is enabled, users assigned to the Docker application in your IdP are automatically provisioned and added to your Docker organization. If a user is unassigned, they are removed from Docker.
19
+
SCIM automates user provisioning and de-provisioning for Docker through your
20
+
identity provider (IdP). After you enable SCIM, any user assigned to your
21
+
Docker application in your IdP is automatically provisioned and added to your
22
+
Docker organization. When a user is removed from the Docker application in your
23
+
IdP, SCIM deactivates and removes them from your Docker organization.
19
24
20
-
SCIM also syncs user profile updates, such as name changes, made in your IdP. SCIM can be used with Docker’s default Just-in-Time (JIT) provisioning configuration, or on its own with JIT disabled.
25
+
In addition to provisioning and removal, SCIM also syncs profile updates like
26
+
name changes—made in your IdP. You can use SCIM alongside Docker’s default
27
+
Just-in-Time (JIT) provisioning or on its own with JIT disabled.
28
+
29
+
SCIM automates:
21
30
22
-
SCIM supports the automation of:
23
31
- Creating users
24
32
- Updating user profiles
25
33
- Removing and deactivating users
26
34
- Re-activating users
27
35
- Group mapping
28
36
29
-
## Supported attributes
30
-
31
-
> [!IMPORTANT]
37
+
> [!NOTE]
38
+
>
39
+
> SCIM only manages users provisioned through your IdP after SCIM is enabled.
40
+
It cannot remove users who were manually added to your Docker organization
41
+
before SCIM was set up.
32
42
>
33
-
> Docker uses JIT provisioning by default for SSO configurations. If you enable SCIM, JIT values still overwrite the attribute
34
-
values set by SCIM provisioning. To avoid conflicts, your JIT attribute values must match your SCIM attribute values. To avoid conflicts between SCIM and JIT, you can also disable JIT provisioning. See [Just-in-Time](/manuals/security/for-admins/provisioning/just-in-time.md) for more information.
43
+
> To remove those users, delete them manually from your Docker organization.
44
+
For more information, see [Manage organization members](/manuals/admin/organization/members.md).
35
45
36
-
Attributes are pieces of user information, such as name and email, that are synchronized between your IdP and Docker when using SCIM. Proper mapping of these attributes is essential for seamless user provisioning and to prevent duplicate entries when using SSO.
46
+
## Supported attributes
47
+
48
+
SCIM uses attributes (e.g., name, email) to sync user information between your
49
+
IdP and Docker. Properly mapping these attributes in your IdP ensures that user
50
+
provisioning works smoothly and prevents issues like duplicate user accounts
51
+
when using single sign-on (SSO).
37
52
38
-
The following table lists the supported attributes for SCIM:
0 commit comments