Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
68 changes: 0 additions & 68 deletions content/guides/admin-set-up/_index.md

This file was deleted.

33 changes: 0 additions & 33 deletions content/guides/admin-set-up/comms-and-info-gathering.md

This file was deleted.

18 changes: 0 additions & 18 deletions content/guides/admin-set-up/deploy.md

This file was deleted.

43 changes: 0 additions & 43 deletions content/guides/admin-set-up/finalize-plans-and-setup.md

This file was deleted.

32 changes: 0 additions & 32 deletions content/guides/admin-set-up/testing.md

This file was deleted.

44 changes: 44 additions & 0 deletions content/guides/harden-docker/_index.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
---
title: Harden Docker for production
linkTitle: Harden Docker
summary:
description: Learn how to configure Docker across your organization to harden Docker for proudction, especially in secure environments

Check failure on line 5 in content/guides/harden-docker/_index.md

View workflow job for this annotation

GitHub Actions / vale

[vale] reported by reviewdog 🐶 [Vale.Spelling] Did you really mean 'proudction'? Raw Output: {"message": "[Vale.Spelling] Did you really mean 'proudction'?", "location": {"path": "content/guides/harden-docker/_index.md", "range": {"start": {"line": 5, "column": 90}}}, "severity": "ERROR"}
tags: [admin]
params:
featured: true
time: 20 minutes
image:
resource_links:
- title:
url:
---

This guide is for teams deploying Docker in regulated, production, or security-conscious environments. It helps administrators enforce security best practices, apply organization-wide controls, and reduce the attack surface of Docker tools like Docker Desktop and Docker Hub.

## Who's this for?

- Organization administrators
- Security engineers
- IT teams responsible for enforcing organization-wide security policies

## What you’ll learn

This guide walks you through how to:

- Enforce secure authentication using SSO and domain verification
- Apply least-privilege access controls across your organization
- Lock down Docker Desktop using centralized settings and policy enforcement
- Monitor usage and integrate with compliance and security tooling
- Align your Docker implementation with enterprise security and compliance requirements

## Before you start

To follow this guide, you’ll need:

- A Docker Business subscription
- Organization owner access to your Docker organization
- Access to your identity provider (IdP) if configuring SSO
- A list of domains to verify and manage
- Docker Desktop installed on user machines

If you’re new to Docker or managing organizations, start with the [Admin setup guide](/guides/admin-set-up) first.

Check warning on line 44 in content/guides/harden-docker/_index.md

View workflow job for this annotation

GitHub Actions / vale

[vale] reported by reviewdog 🐶 [Docker.RecommendedWords] Consider using 'administrator' instead of 'Admin' Raw Output: {"message": "[Docker.RecommendedWords] Consider using 'administrator' instead of 'Admin'", "location": {"path": "content/guides/harden-docker/_index.md", "range": {"start": {"line": 44, "column": 68}}}, "severity": "INFO"}
88 changes: 88 additions & 0 deletions content/guides/harden-docker/control-access.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,88 @@
---
title: Control access with verified domains and groups
description:
weight: 20
---

In high-security environments, controlling access to Docker resources is
paramount. By verifying your organization's domains and implementing
group-based access controls, you can ensure that only authorized users can
access your Docker resources.

This module guides you through the process of verifying domains and setting up
group mappings to enforce strict access controls.

## Prerequisites

Before you begin, ensure you have:

- A Docker Business subscription
- Organization owner access to your Docker organization or company
- Access to your Domain Name System (DNS) provider to add TXT records
- Access to your Identity Provider (IdP) to configure group mappings

## Step two: Enable auto-provisioning

Auto-provisioning automatically adds users to your organization when they sign
in with an email address that matches your verified domain. This simplifies
user management and ensures consistent security settings.

To enable auto-provisioning:

1. In the [Admin Console](https://app.docker.com/admin), navigate to
the **Domain management** page and locate your verified domain.
1. Select the **Actions** menu, then **Enable auto-provisioning**.
1. Confirm the action in the pop-up modal.

> [!NOTE]
>
> Auto-provisioning is optional and does not create accounts for new users, it
adds existing unassociated users to your organization. For domains that are
using SSO, Just-in-Time (JIT) provisioning overrides auto-provisioning.

## Step three: Configure group mapping

Group mapping automates permissions management by linking identity provider
groups to Docker roles and teams. This ensures consistent access control
policies and reduces manual errors in role assignments.

1. Create groups in your IdP:
1. Use the format `organization:team` that matches the name of your Docker
organization and teams. For example, `docker:developers`.
1. Assign users to the appropriate groups in your IdP.
1. Configure group mapping in Docker:
1. In the Admin Console, navigate to
**Security and access** > **Provisioning** > **Group mapping**.
1. Add the group names following the `organization:team` format.
1. Docker will automatically assign users to the corresponding teams based
on their group membership in your IdP.

> [!NOTE]
>
> When groups are synced, Docker creates a team if it doesn’t already exist.
For detailed instructions, see [Group mapping]().

## Step four: Assign roles and permissions

Assigning appropriate roles to users ensures they have the necessary
permissions without over-provisioning access.

- Member: Non-administrative role; can view other members in the same
organization.
- Editor: Partial administrative access; can create, edit, and delete
repositories, and edit existing team’s access permissions.
- Organization owner: Full administrative access; can manage repositories,
teams, members, settings, and billing.

For more information on roles and permissions, see [Roles and permissions]().

## Best practices

- Use verified domains: Ensure all users sign in with email addresses from
your verified domains to maintain control over access.
- Implement group mapping: Automate user assignments to teams and roles to
reduce manual errors and maintain consistent access policies.
- Regularly audit access: Create a schedule to review team memberships and role
assignments to ensure they align with current organizational needs.
- Limit privileged access: Assign the Organization Owner role sparingly to
minimize the risk of unauthorized changes.
Loading
Loading