-
Notifications
You must be signed in to change notification settings - Fork 7.7k
security: account association #22817
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
sarahsanders-docker
wants to merge
9
commits into
docker:main
Choose a base branch
from
sarahsanders-docker:account-association
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Changes from all commits
Commits
Show all changes
9 commits
Select commit
Hold shift + click to select a range
3135c23
draft: account association
sarahsanders-docker b5eda00
review, fix UI steps
sarahsanders-docker d332a86
nit
sarahsanders-docker aa38e12
add summary bar
sarahsanders-docker 0d7a808
feedback round 1
sarahsanders-docker 2633a31
add section to DD sign in docs
sarahsanders-docker 89bab0b
remove troubleshooting
sarahsanders-docker 16145dc
add insights for account-association
sarahsanders-docker 9fcba83
review: fixed nits and UI steps
sarahsanders-docker File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
205 changes: 205 additions & 0 deletions
205
content/manuals/security/for-admins/unassociated-machines.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,205 @@ | ||
--- | ||
title: Manage unassociated machines | ||
description: Learn how to manage unassociated machines using the Docker Admin Console | ||
keywords: unassociated machines, insights, manage users, enforce sign-in | ||
weight: 56 | ||
--- | ||
|
||
{{< summary-bar feature_name="Unassociated machines" >}} | ||
|
||
Docker administrators can identify, view, and manage Docker Desktop machines | ||
that are likely associated with their organization but aren't currently linked | ||
to user accounts. This self-service capability helps you understand Docker | ||
Desktop usage across your organization and streamline user onboarding without | ||
IT involvement. | ||
|
||
## Prerequisites | ||
|
||
- Docker Business subscription | ||
- Organization owner access to your Docker organization | ||
|
||
## About unassociated machines | ||
|
||
Unassociated machines are Docker Desktop instances that Docker has identified | ||
as likely belonging to your organization based on usage patterns, but the users | ||
are not signed in to Docker Desktop with an account that is part of your | ||
organization. | ||
|
||
## How Docker identifies unassociated machines | ||
|
||
Docker uses telemetry data to identify which machines likely belong to your | ||
organization: | ||
|
||
- Domain matching: Users signed in with email domains associated with your | ||
organization | ||
- Registry patterns: Analysis of container registry access patterns that | ||
indicate organizational usage | ||
|
||
## View unassociated machines | ||
|
||
To see detailed information about unassociated machines: | ||
|
||
1. Sign in to the [Admin Console](https://app.docker.com/admin) and select | ||
your organization. | ||
1. In **User management**, select **Unassociated**. | ||
|
||
The machine list displays: | ||
|
||
- Machine ID (Docker-generated identifier) | ||
- The registry address used to predict whether a user is part of your | ||
organization | ||
- User email (only displays if the user is signed into Docker Desktop while | ||
using it) | ||
- Docker Desktop version | ||
- Operating system (OS) | ||
- Last activity date | ||
- Sign-in enforced status | ||
|
||
You can: | ||
|
||
- Export the list as CSV | ||
- Take actions on individual or multiple machines | ||
|
||
## Enable sign-in enforcement for unassociated machines | ||
|
||
> [!NOTE] | ||
> | ||
> Sign-in enforcement for unassociated machines is different from | ||
the [organization-level sign-in enforcement](/security/for-admins/enforce-sign-in/) | ||
available through `registry.json` and configuration profiles. This sign-in | ||
enforcement only requires users to sign in so admins can identify who is | ||
using the machine, meaning users can sign in with any email address. For more | ||
stringent security controls that limit sign-ins to users who are already part | ||
of your organization, see [Enforce sign-in](/security/for-admins/enforce-sign-in/). | ||
|
||
Sign-in enforcement helps you identify who is using unassociated machines in | ||
your organization. When you enable enforcement, users on these machines will | ||
be required to sign in to Docker Desktop. Once they sign in, their email | ||
addresses will appear in the Unassociated list, allowing you to then add them | ||
to your organization. | ||
|
||
> [!IMPORTANT] | ||
> | ||
> Sign-in enforcement only takes effect after Docker Desktop is restarted. | ||
Users can continue using Docker Desktop until their next restart. | ||
|
||
### Enable for all unassociated machines | ||
|
||
1. Sign in to the [Admin Console](https://app.docker.com/admin) and select | ||
your organization. | ||
1. In **User management**, select **Unassociated**. | ||
1. Turn on the **Enforce sign-in** toggle. | ||
1. In the pop-up modal, select **Require sign-in** to confirm. | ||
|
||
The **Sign-in required** status will update for all unassociated machines to | ||
sarahsanders-docker marked this conversation as resolved.
Show resolved
Hide resolved
|
||
**Yes**. | ||
|
||
> [!NOTE] | ||
> | ||
> When you enable sign-in enforcement for all unassociated machines, any new | ||
machines detected in the future will automatically have sign-in enforcement | ||
enabled. Sign-in enforcement requires Docker Desktop version 4.41 or later. | ||
Users with older versions will not be prompted to sign in and can continue | ||
using Docker Desktop normally until they update. Their status shows | ||
as **Pending** until they update to version 4.41 or later. | ||
|
||
### Enable for individual unassociated machines | ||
|
||
1. Sign in to the [Admin Console](https://app.docker.com/admin) and select | ||
your organization. | ||
1. In **User management**, select **Unassociated**. | ||
1. Locate the machine you want to enable sign-in enforcement for. | ||
1. Select the **Actions** menu and choose **Turn on sign-in enforcement**. | ||
1. In the pop-up modal, select **Require sign-in** to confirm. | ||
|
||
The **Sign-in required** status will update for the individual machine to | ||
**Yes**. | ||
|
||
> [!NOTE] | ||
> | ||
> Sign-in enforcement requires Docker Desktop version 4.41 or later. Users | ||
with older versions will not be prompted to sign in and can continue using | ||
Docker Desktop normally until they update. Their status shows as **Pending** | ||
until they update to version 4.41 or later. | ||
|
||
### What happens when users sign in | ||
|
||
After you enable sign-in enforcement: | ||
|
||
1. Users must restart Docker Desktop. Enforcement only takes effect after | ||
restart. | ||
1. When users open Docker Desktop, they see a sign-in prompt. They must sign | ||
in to continue using Docker Desktop. | ||
1. User email addresses appear in the **Unassociated** list. | ||
1. You can add users to your organization. | ||
|
||
Users can continue using Docker Desktop immediately after signing in, even | ||
before being added to your organization. | ||
|
||
## Add unassociated machines to your organization | ||
|
||
When users in your organization use Docker without signing in, their machines | ||
appear in the **Unassociated** list. You can add these users to your | ||
organization in two ways: | ||
|
||
- Automatic addition: | ||
- Auto-provisioning: If you have verified domains with auto-provisioning | ||
enabled, users who sign in with a matching email domain will automatically | ||
be added to your organization. For more information on verifying domains and | ||
auto-provisioning, see [Domain management](/manuals/security/for-admins/domain-management.md). | ||
- SSO user provisioning: If you have SSO configured with | ||
[Just-in-Time provisioning](/manuals/security/for-admins/provisioning/just-in-time.md), | ||
users who sign in through your SSO connection will automatically be added | ||
to your organization. | ||
- Manual addition: If you don't have auto-provisioning or SSO set up, or if a | ||
user's email domain doesn't match your configured domains, their email will | ||
appear in the **Unassociated** list where you can choose to add them directly. | ||
|
||
> [!NOTE] | ||
> | ||
> If you add users and do not have enough seats in your organization, a | ||
pop-up will appear prompting you to **Get more seats**. | ||
|
||
### Add individual users | ||
|
||
1. Sign in to the [Admin Console](https://app.docker.com/admin) and select | ||
your organization. | ||
1. In **User management**, select **Unassociated**. | ||
1. Locate the machine you want to add to your organization. | ||
1. Select the **Actions** menu and choose **Add to organization**. | ||
1. In the pop-up modal, select **Add user**. | ||
|
||
### Bulk add users | ||
|
||
1. Sign in to the [Admin Console](https://app.docker.com/admin) and select | ||
your organization. | ||
1. In **User management**, select **Unassociated**. | ||
1. Use the **checkboxes** to select the machines you want to add to your | ||
organizations. | ||
1. Select the **Add to organization** button. | ||
1. In the pop-up modal, select **Add users** to confirm. | ||
|
||
## Disable sign-in enforcement | ||
|
||
### Disable for all unassociated machines | ||
|
||
1. Sign in to the [Admin Console](https://app.docker.com/admin) and select | ||
your organization. | ||
1. In **User management**, select **Unassociated**. | ||
1. Turn off the **Enforce sign-in** toggle. | ||
1. In the pop-up modal, select **Turn off sign-in requirement** to confirm. | ||
|
||
The **Sign-in required** status will update for all unassociated machines to | ||
**No**. | ||
|
||
### Disable for specific unassociated machines | ||
|
||
1. Sign in to the [Admin Console](https://app.docker.com/admin) and select | ||
your organization. | ||
1. In **User management**, select **Unassociated**. | ||
1. Locate the machine you want to disable sign-in enforcement for. | ||
1. Select the **Actions** menu and choose **Turn off sign-in enforcement**. | ||
1. In the pop-up modal, select **Turn off sign-in requirement** to confirm. | ||
|
||
The **Sign-in required** status will update for the individual machine to | ||
**No**. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.