Troubleshoot provisioning (original) (raw)
If you experience issues with user roles, attributes, or unexpected account behavior with user provisioning, this guide provides troubleshooting recommendations to resolve conflicts.
Error message
Typically, this scenario does not produce an error message in Docker or your IdP. This issue ususally surfaces as incorrect role or team assignment.
Possible causes
- JIT provisioning is enabled, and Docker is using values from your IdP's SSO login flow to provision the user, which overrides SCIM-provided attributes.
- SCIM was enabled after the user was already provisioned via JIT, so SCIM updates don't take effect.
Affected environments
- Docker organizations using SCIM with SSO
- Users provisioned via JIT prior to SCIM setup
Steps to replicate
- Enable JIT and SSO for your Docker organization.
- Sign in to Docker as a user via SSO.
- Enable SCIM and set role/team attributes for that user.
- SCIM attempts to update the user's attributes, but the role or team assignment does not reflect changes.
Solutions
Disable JIT provisioning (recommended)
- Sign in to the Docker Admin Console.
- Go to your organization's Settings > Security > SSO and SCIM.
- Find the relevant SSO connection.
- Select the actions menu and choose Edit.
- Disable Just-in-Time provisioning.
- Save your changes.
With JIT disabled, Docker uses SCIM as the source of truth for user creation and role assignment.
Keep JIT enabled and match attributes
If you prefer to keep JIT enabled:
- Make sure your IdP's SSO attribute mappings match the values being sent by SCIM.
- Avoid configuring SCIM to override attributes already set via JIT.
This option requires strict coordination between SSO and SCIM attributes in your IdP configuration.
Possible causes
User accounts were originally created manually or via JIT, and SCIM is not linked to manage them.
Solution
SCIM only manages users that it provisions. To allow SCIM to manage an existing user:
- Remove the user manually from the Docker Admin Console.
- Trigger provisioning from your IdP.
- SCIM will re-create the user with correct attributes.
Deleting a user removes their resource ownership (e.g., repositories). Transfer ownership before removing the user.