Troubleshoot provisioning (original) (raw)

If you experience issues with user roles, attributes, or unexpected account behavior with user provisioning, this guide provides troubleshooting recommendations to resolve conflicts.

Error message

Typically, this scenario does not produce an error message in Docker or your IdP. This issue ususally surfaces as incorrect role or team assignment.

Possible causes

Affected environments

Steps to replicate

  1. Enable JIT and SSO for your Docker organization.
  2. Sign in to Docker as a user via SSO.
  3. Enable SCIM and set role/team attributes for that user.
  4. SCIM attempts to update the user's attributes, but the role or team assignment does not reflect changes.

Solutions

  1. Sign in to the Docker Admin Console.
  2. Go to your organization's Settings > Security > SSO and SCIM.
  3. Find the relevant SSO connection.
  4. Select the actions menu and choose Edit.
  5. Disable Just-in-Time provisioning.
  6. Save your changes.

With JIT disabled, Docker uses SCIM as the source of truth for user creation and role assignment.

Keep JIT enabled and match attributes

If you prefer to keep JIT enabled:

This option requires strict coordination between SSO and SCIM attributes in your IdP configuration.

Possible causes

User accounts were originally created manually or via JIT, and SCIM is not linked to manage them.

Solution

SCIM only manages users that it provisions. To allow SCIM to manage an existing user:

  1. Remove the user manually from the Docker Admin Console.
  2. Trigger provisioning from your IdP.
  3. SCIM will re-create the user with correct attributes.

Deleting a user removes their resource ownership (e.g., repositories). Transfer ownership before removing the user.