Skip to content

Commit 228cc0f

Browse files
authored
Engdocs 2329 (#21847)
<!--Delete sections as needed --> ## Description Admin guide on user and access management ## Related issues or tickets <!-- Related issues, pull requests, or Jira tickets --> ## Reviews <!-- Notes for reviewers here --> <!-- List applicable reviews (optionally @tag reviewers) --> - [ ] Technical review - [ ] Editorial review - [ ] Product review
1 parent 6753309 commit 228cc0f

File tree

7 files changed

+231
-1
lines changed

7 files changed

+231
-1
lines changed

_vale/Docker/Acronyms.yml

+3
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,9 @@ exceptions:
6666
- IP
6767
- IPAM
6868
- IPC
69+
- IT
6970
- JAR
71+
- JIT
7072
- JSON
7173
- JSX
7274
- LESS
@@ -95,6 +97,7 @@ exceptions:
9597
- PHP
9698
- POSIX
9799
- POST
100+
- QA
98101
- QEMU
99102
- RAM
100103
- REPL

_vale/config/vocabularies/Docker/accept.txt

+1
Original file line numberDiff line numberDiff line change
@@ -199,6 +199,7 @@ tmpfs
199199
ufw
200200
uid
201201
umask
202+
unmanaged
202203
vSphere
203204
vpnkit
204205
windowsfilter
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
---
2+
title: Mastering user and access management
3+
summary: Simplify user access while ensuring security and efficiency in Docker.
4+
description: A guide for managing roles, provisioning users, and optimizing Docker access with tools like SSO and activity logs.
5+
tags: [admin]
6+
params:
7+
featured: true
8+
time: 20 minutes
9+
image:
10+
resource_links:
11+
- title: Overview of Administration in Docker
12+
url: /admin/
13+
- title: Single sign-on
14+
url: /security/for-admins/single-sign-on/
15+
- title: Onboard your organization
16+
url: /admin/organization/onboard/
17+
- title: Roles and permissions
18+
url: /security/for-admins/roles-and-permissions/
19+
- title: Insights
20+
url: /admin/organization/insights/
21+
- title: Activity logs
22+
url: /admin/organization/activity-logs/
23+
---
24+
25+
Managing roles and permissions is key to securing your Docker environment while enabling easy collaboration and operational efficiency. This guide walks IT administrators through the essentials of user and access management, offering strategies for assigning roles, provisioning users, and using tools like Activity logs and Insights to monitor and optimize Docker usage.
26+
27+
## Who's this for?
28+
29+
- IT teams: Tasked with configuring and maintaining secure user access.
30+
- Security professionals: Focused on enforcing secure access practices.
31+
- Project managers: Overseeing team collaboration and resource management.
32+
33+
## What you'll learn
34+
35+
- How to assess and manage Docker user access and align accounts with organizational needs.
36+
- When to use team configurations for scalable access control.
37+
- How to automate and streamline user provisioning with SSO, SCIM, and JIT.
38+
- How to get the most out of Docker's monitoring tools.
39+
40+
## Tools integration
41+
42+
Okta, Entra ID SAML 2.0, Azure Connect (OIDC)
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
---
2+
title: Monitoring and insights
3+
description: Track user actions, team workflows, and organizational trends with Activity logs and Insights to enhance security and productivity in Docker.
4+
keywords: organizational insights, user management, access control, security, monitoring, admins
5+
weight: 30
6+
---
7+
8+
Activity logs and Insights are useful tools for user and access management in Docker. They provide visibility into user actions, team workflows, and organizational trends, helping enhance security, ensure compliance, and boost productivity.
9+
10+
## Activity logs
11+
12+
Activity logs track events at the organization and repository levels, offering a clear view of activities like repository changes, team updates, and billing adjustments.
13+
14+
It is available for Docker Team or Docker Business plans, with data retained for three months.
15+
16+
### Key features
17+
18+
- Change tracking: View what changed, who made the change, and when.
19+
20+
- Comprehensive reporting: Monitor critical events such as repository creation, deletion, privacy changes, and role assignments.
21+
22+
### Example scenarios
23+
24+
- Audit trail for security: A repository’s privacy settings were updated unexpectedly. The activity logs reveal which user made the change and when, helping administrators address potential security risks.
25+
26+
- Team collaboration review: Logs show which team members pushed updates to a critical repository, ensuring accountability during a development sprint.
27+
28+
- Billing adjustments: Track who added or removed subscription seats to maintain budgetary control and compliance.
29+
30+
For more information, see [Activity logs](/manuals/admin/organization/activity-logs.md).
31+
32+
## Insights
33+
34+
Insights provide data-driven views of Docker usage to improve team productivity and resource allocation.
35+
36+
### Key benefits
37+
38+
- Standardized environments: Ensure consistent configurations and enforce best practices across teams.
39+
40+
- Improved visibility: Monitor metrics like Docker Desktop usage, builds, and container activity to understand team workflows and engagement.
41+
42+
- Optimized resources: Track license usage and feature adoption to maximize the value of your Docker subscription.
43+
44+
### Example scenarios
45+
46+
- Usage trends: Identify underutilized licenses or resources, allowing reallocation to more active teams.
47+
48+
- Build efficiency: Track average build times and success rates to pinpoint bottlenecks in development processes.
49+
50+
- Container utilization: Analyze container activity across departments to ensure proper resource distribution and cost efficiency.
51+
52+
For more information, see [Insights](/manuals/admin/organization/insights.md).
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,80 @@
1+
---
2+
title: Onboarding and managing roles and permissions in Docker
3+
description: Learn how to manage roles, invite members, and implement scalable access control in Docker for secure and efficient collaboration.
4+
keywords: sso, scim, jit, invite members, docker hub, docker admin console, onboarding, security
5+
weight: 20
6+
---
7+
8+
This page guides you through onboarding owners and members, and using tools like SSO and SCIM to future-proof onboarding going forward.
9+
10+
## Step 1: Invite owners
11+
12+
When you create a Docker organization, you automatically become its sole owner. While optional, adding additional owners can significantly ease the process of onboarding and managing your organization by distributing administrative responsibilities. It also ensures continuity and does not cause a blocker if the primary owner is unavailable.
13+
14+
For detailed information on owners, see [Roles and permissions](/manuals/security/for-admins/roles-and-permissions.md).
15+
16+
## Step 2: Invite members and assign roles
17+
18+
Members are granted controlled access to resources and enjoy enhanced organizational benefits. When you invite members to join you Docker organization, you immediately assign them a role.
19+
20+
### Benefits of inviting members
21+
22+
- Enhanced visibility: Gain insights into user activity, making it easier to monitor access and enforce security policies.
23+
24+
- Streamlined collaboration: Help members collaborate effectively by granting access to shared resources and repositories.
25+
26+
- Improved resource management: Organize and track users within your organization, ensuring optimal allocation of resources.
27+
28+
- Access to enhanced features: Members benefit from organization-wide perks, such as increased pull limits and access to premium Docker features.
29+
30+
- Security control: Apply and enforce security settings at an organizational level, reducing risks associated with unmanaged accounts.
31+
32+
For detailed information, see [Manage organization members](/manuals/admin/organization/members.md).
33+
34+
## Step 3: Future-proof user management
35+
36+
A robust, future-proof approach to user management combines automated provisioning, centralized authentication, and dynamic access control. Implementing these practices ensures a scalable, secure, and efficient environment.
37+
38+
### Secure user authentication with single sign-on (SSO)
39+
40+
Integrating Docker with your identity provider streamlines user access and enhances security.
41+
42+
SSO:
43+
44+
- Simplifies sign in, as users sign in with their organizational credentials.
45+
46+
- Reduces password-related vulnerabilities.
47+
48+
- Simplifies onboarding as it works seamlessly with SCIM and group mapping for automated provisioning.
49+
50+
[SSO documentation](/manuals/security/for-admins/single-sign-on/_index.md).
51+
52+
### Automate onboarding with SCIM and JIT provisioning
53+
54+
Streamline user provisioning and role management with [SCIM](/manuals/security/for-admins/provisioning/scim.md) and [Just-in-Time (JIT) provisioning](/manuals/security/for-admins/provisioning/just-in-time.md).
55+
56+
With SCIM you can:
57+
58+
- Sync users and roles automatically with your identity provider.
59+
60+
- Automate adding, updating, or removing users based on directory changes.
61+
62+
With JIT provisioning you can:
63+
64+
- Automatically add users upon first sign in based on [group mapping](#simplify-access-with-group-mapping).
65+
66+
- Reduce overhead by eliminating pre-invite steps.
67+
68+
### Simplify access with group mapping
69+
70+
Group mapping automates permissions management by linking identity provider groups to Docker roles and teams.
71+
72+
It also:
73+
74+
- Reduces manual errors in role assignments.
75+
76+
- Ensures consistent access control policies.
77+
78+
- Help you scale permissions as teams grow or change.
79+
80+
For more information on how it works, see [Group mapping](/manuals/security/for-admins/provisioning/group-mapping.md).
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
---
2+
title: Setting up roles and permissions in Docker
3+
description: A guide to securely managing access and collaboration in Docker through roles and teams.
4+
keywords: Docker roles, permissions management, access control, IT administration, team collaboration, least privilege, security, Docker teams, role-based access
5+
weight: 10
6+
---
7+
8+
With the right configurations, you can ensure your developers have easy access to necessary resources while preventing unauthorized access. This page guides you through identifying Docker users, so you can allocate subscription seats efficiently within your Docker organization, and assigning roles to align with your organization's structure.
9+
10+
## Step 1: Identify your Docker users and accounts
11+
12+
Before setting up roles and permissions, it’s important to have a clear understanding of who in your organization requires Docker access. Focus on gathering a comprehensive view of active users, their roles within projects, and how they interact with Docker resources. This process can be supported by tools like device management software or manual assessments. Encourage all users to update their Docker accounts to use organizational email addresses, ensuring seamless integration with your subscription.
13+
14+
For steps on how you can do this, see [step 1 of onboarding your organization](/manuals/admin/organization/onboard.md).
15+
16+
## Step 2: Assign roles strategically
17+
18+
When you invite members to join you Docker organization, you assign them a role.
19+
20+
Docker’s predefined roles offer flexibility for various organizational needs. Assigning roles effectively ensures a balance of accessibility and security.
21+
22+
- Member: Non-administrative role. Members can view other members that are in the same organization.
23+
- Editor: Partial administrative access to the organization. Editors can create, edit, and delete repositories. They can also edit an existing team's access permissions.
24+
- Organization owner: Full organization administrative access. Organization owners can manage organization repositories, teams, members, settings, and billing.
25+
- Company owner: In addition to the permissions of an organization owner, company owners can configure settings for their associated organizations.
26+
27+
For more information, see [Roles and permissions](/manuals/security/for-admins/roles-and-permissions.md).
28+
29+
### Enhancing with teams
30+
31+
Teams in Docker provide a structured way to manage member access and they provide an additional level of permissions. They simplify permission management and enable consistent application of policies.
32+
33+
- Organize users into teams aligned with projects, departments, or functional roles. This approach helps streamline resource allocation and ensures clarity in access control.
34+
35+
- Assign permissions at the team level rather than individually. For instance, a development team might have "Read & Write" access to certain repositories, while a QA team has "Read-only" access.
36+
37+
- As teams grow or responsibilities shift, you can easily update permissions or add new members, maintaining consistency without reconfiguring individual settings.
38+
39+
For more information, see [Create and manage a team](/manuals/admin/organization/manage-a-team.md).
40+
41+
### Example scenarios
42+
43+
- Development teams: Assign the member role to developers, granting access to the repositories needed for coding and testing.
44+
45+
- Team leads: Assign the editor role to team leads for resource management and repository control within their teams.
46+
47+
- Organizational oversight: Restrict the organization owner or company owner roles to a select few trusted individuals responsible for billing and security settings.
48+
49+
### Best practices
50+
51+
- Apply the principle of least privilege. Assign users only the minimum permissions necessary for their roles.
52+
53+
- Plan to conduct regulars reviews of role assignments to ensure they align with evolving team structures and organizational responsibilities.

content/guides/docker-compose/_index.md

-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,6 @@ tags: [product-demo]
99
aliases:
1010
- /learning-paths/docker-compose/
1111
params:
12-
featured: true
1312
image: images/learning-paths/compose.png
1413
time: 10 minutes
1514
resource_links:

0 commit comments

Comments
 (0)