Troubleshoot SSO (original) (raw)

Troubleshoot single sign-on

While configuring or using single sign-on (SSO), you may encounter issues that can stem from your identity provider (IdP) or Docker configuration. The following sections describe some common SSO errors and possible solutions.

If you experience issues with SSO, check both the Docker Admin Console and your identity provider (IdP) for errors first.

Check Docker error logs

  1. Sign in to the Admin Console and select your organization.
  2. Select SSO and SCIM.
  3. In the SSO connections table, select the Action menu and then View error logs.
  4. For more details on specific errors, select View error details next to an error message.
  5. Note any errors you see on this page for further troubleshooting.

Check for errors in your IdP

  1. Review your IdP’s logs or audit trails for any failed authentication or provisioning attempts.
  2. Confirm that your IdP’s SSO settings match the values provided in Docker.
  3. If applicable, confirm that you have configured user provisioning correctly and that it is enabled in your IdP.
  4. If applicable, verify that your IdP correctly maps Docker's required user attributes.
  5. Try provisioning a test user from your IdP and verify if they appear in Docker.

For further troubleshooting, check your IdP’s documentation. You can also contact their support team for guidance on error messages.

Error message

When this issue occurs, the following error message is common:

Possible causes

Affected environments

Steps to replicate

To replicate this issue:

  1. Attempt to sign in to Docker using SSO.
  2. The user is assigned groups in the IdP but does not get placed in the expected Docker Team.
  3. Review Docker logs or IdP logs to find the error message.

Solutions

Update group names in your IdP:

  1. Go to your IdP's group management section.
  2. Check the groups assigned to the affected user.
  3. Ensure each group follows the required format: <organization>:<team>
  4. Update any incorrectly formatted groups to match this pattern.
  5. Save changes and retry signing in with SSO.

Error message

When this issue occurs, the following error message is common:

Possible causes

Solutions

Enable JIT provisioning

JIT is enabled by default when you enable SSO. If you have JIT disabled and need to re-enable it:

  1. Sign in to the Admin Console and select your organization.
  2. Select SSO and SCIM.
  3. In the SSO connections table, select the Action menu and then Enable JIT provisioning.
  4. Select Enable to confirm.

Manually invite users

When JIT is disabled, users are not automatically added to your organization when they authenticate through SSO. To manually invite users, seeInvite members

Configure SCIM provisioning

If you have SCIM enabled, troubleshoot your SCIM connection using the following steps:

  1. Sign in to the Admin Console and select your organization.
  2. Select SSO and SCIM.
  3. In the SSO connections table, select the Action menu and then View error logs. For more details on specific errors, select View error details next to an error message. Note any errors you see on this page.
  4. Navigate back to the SSO and SCIM page of the Admin Console and verify your SCIM configuration:
    • Ensure that the SCIM Base URL and API Token in your IdP match those provided in the Docker Admin Console.
    • Verify that SCIM is enabled in both Docker and your IdP.
  5. Ensure that the attributes being synced from your IdP match Docker'ssupported attributes for SCIM.
  6. Test user provisioning by trying to provision a test user through your IdP and verify if they appear in Docker.

Error message

When this issue occurs, the following error message is common:

Possible causes

Docker does not support an IdP-initiated SAML flow. This error occurs when a user attempts to authenticate from your IdP, such as using the Docker SSO app tile on the sign in page.

Solutions

Authenticate from Docker apps

The user must initiate authentication from Docker applications (Hub, Desktop, etc). The user needs to enter their email address in a Docker app and they will get redirected to the configured SSO IdP for their domain.

Hide the Docker SSO app

You can hide the Docker SSO app from users in your IdP. This prevents users from attempting to start authentication from the IdP dashboard. You must hide and configure this in your IdP.

Error message

When this issue occurs, the following error message is common:

Possible causes

This error occurs when the organization has no available seats for the user when provisioning via Just-in-Time (JIT) provisioning or SCIM.

Solutions

Add more seats to the organization

Purchase additional Docker Business subscription seats. For details, seeManage subscription seats.

Remove users or pending invitations

Review your organization members and pending invitations. Remove inactive users or pending invitations to free up seats. For more details, seeManage organization members.

Domain is not verified for SSO connection

Error message

When this issue occurs, the following error message is common:

Possible causes

This error occurs if the IdP authenticated a user through SSO and the User Principal Name (UPN) returned to Docker doesn’t match any of the verified domains associated to the SSO connection configured in Docker.

Solutions

Verify UPN attribute mapping

Ensure that the IdP SSO connection is returning the correct UPN value in the assertion attributes.

Add and verify all domains

Add and verify all domains and subdomains used as UPN by your IdP and associate them with your Docker SSO connection. For details, seeConfigure single sign-on.

Error message

When this issue occurs, the following error message is common:

Possible causes

The following causes may create this issue:

Solutions

Do not disrupt the authentication flow

Do not press the back or refresh button during sign-in.

Restart authentication

Close the browser tab and restart the authentication flow from the Docker application (Desktop, Hub, etc).

Error message

When this issue occurs, the following error message is common:

Possible causes

The following causes may create this issue:

Solutions

In your IdP, ensure the Name ID attribute format is correct:

  1. Verify that the Name ID attribute format in your IdP is set to EmailAddress.
  2. Adjust your IdP settings to return the correct Name ID format.