| title | SSO identity provider FAQs | |||
|---|---|---|---|---|
| linkTitle | Identity providers | |||
| description | Frequently asked questions about Docker SSO and identity provider configuration | |||
| keywords | identity providers, SSO IdP, SAML, Azure AD, Entra ID, certificate management | |||
| tags |
|
|||
| aliases |
|
Yes, Docker supports multiple IdP configurations. A domain can be associated with multiple IdPs. Docker supports Entra ID (formerly Azure AD) and identity providers that support SAML 2.0.
Yes. Delete your existing IdP configuration in your Docker SSO connection, then configure SSO using your new IdP. If you had already turned on enforcement, turn off enforcement before updating the provider connection.
To turn on SSO in Docker, you need the following from your IdP:
- SAML: Entity ID, ACS URL, Single Logout URL, and the public X.509 certificate
- Entra ID (formerly Azure AD): Client ID, Client Secret, AD Domain
If your certificate expires, contact your identity provider to retrieve a new X.509 certificate. Then update the certificate in the SSO configuration settings in the Docker Admin Console.
If the certificate has already expired and users cannot access Docker Hub to update the certificate:
- Contact Docker Support to help you regain access to update the certificate
- Sign in with your Docker username and password to access the Admin Console (if SSO enforcement is not turned on)
- Maintain a dedicated administrator account (sometimes called a "break-glass" or "guest user" account) that is not subject to SSO for emergency access
To prevent lockouts, monitor your certificate expiration dates and renew certificates before they expire.
If SSO is enforced, users can't access Docker Hub when your IdP is down. Users can still access Docker Hub images from the CLI using personal access tokens.
If SSO is turned on but not enforced, users can fall back to username/password authentication.
Yes, bot accounts need seats like regular users, requiring a non-aliased domain email in the IdP and using a seat in Docker Hub. You can add bot accounts to your IdP and create access tokens to replace other credentials.
The SSO implementation uses Just-in-Time (JIT) provisioning by default. You can optionally turn off JIT in the Admin Console if you turn on auto-provisioning using SCIM. See Just-in-Time provisioning.
Confirm that you've configured the necessary API permissions in Entra ID for your SSO connection. You need to grant administrator consent within your Entra ID tenant. See Entra ID (formerly Azure AD) documentation.