diff --git a/content/manuals/enterprise/security/single-sign-on/FAQs/idp-faqs.md b/content/manuals/enterprise/security/single-sign-on/FAQs/idp-faqs.md index 66e99b874e..5d9c3827d2 100644 --- a/content/manuals/enterprise/security/single-sign-on/FAQs/idp-faqs.md +++ b/content/manuals/enterprise/security/single-sign-on/FAQs/idp-faqs.md @@ -5,9 +5,9 @@ description: Frequently asked questions about Docker SSO and identity provider c keywords: identity providers, SSO IdP, SAML, Azure AD, Entra ID, certificate management tags: [FAQ] aliases: -- /single-sign-on/idp-faqs/ -- /faq/security/single-sign-on/idp-faqs/ -- /security/faqs/single-sign-on/idp-faqs/ + - /single-sign-on/idp-faqs/ + - /faq/security/single-sign-on/idp-faqs/ + - /security/faqs/single-sign-on/idp-faqs/ --- ## Can I use multiple identity providers with Docker SSO? @@ -29,6 +29,16 @@ To turn on SSO in Docker, you need the following from your IdP: If your certificate expires, contact your identity provider to retrieve a new X.509 certificate. Then update the certificate in the [SSO configuration settings](/manuals/enterprise/security/single-sign-on/manage.md#manage-sso-connections) in the Docker Admin Console. +### Workarounds if users are locked out + +If the certificate has already expired and users cannot access Docker Hub to update the certificate: + +- **Contact Docker Support**: Docker support can help you regain access to update the certificate. +- **Use username/password authentication**: If SSO enforcement is not turned on, users can sign in with their Docker username and password to access the Admin Console. +- **Maintain a break-glass account**: As a best practice, organizations should maintain a dedicated administrator account (sometimes called a "break-glass" or "guest user" account) that is not subject to SSO. This account can be used to access the Admin Console in emergency situations like certificate expiration. + +To prevent lockouts, monitor your certificate expiration dates and renew certificates before they expire. + ## What happens if my IdP goes down when SSO is turned on? If SSO is enforced, users can't access Docker Hub when your IdP is down. Users can still access Docker Hub images from the CLI using personal access tokens. diff --git a/package-lock.json b/package-lock.json index 196d8deedb..77344f8d6f 100644 --- a/package-lock.json +++ b/package-lock.json @@ -564,9 +564,6 @@ "cpu": [ "arm64" ], - "libc": [ - "glibc" - ], "license": "MIT", "optional": true, "os": [ @@ -583,9 +580,6 @@ "cpu": [ "arm64" ], - "libc": [ - "musl" - ], "license": "MIT", "optional": true, "os": [ @@ -602,9 +596,6 @@ "cpu": [ "x64" ], - "libc": [ - "glibc" - ], "license": "MIT", "optional": true, "os": [ @@ -621,9 +612,6 @@ "cpu": [ "x64" ], - "libc": [ - "musl" - ], "license": "MIT", "optional": true, "os": [ @@ -1211,9 +1199,6 @@ "cpu": [ "arm64" ], - "libc": [ - "glibc" - ], "license": "MPL-2.0", "optional": true, "os": [ @@ -1234,9 +1219,6 @@ "cpu": [ "arm64" ], - "libc": [ - "musl" - ], "license": "MPL-2.0", "optional": true, "os": [ @@ -1257,9 +1239,6 @@ "cpu": [ "x64" ], - "libc": [ - "glibc" - ], "license": "MPL-2.0", "optional": true, "os": [ @@ -1280,9 +1259,6 @@ "cpu": [ "x64" ], - "libc": [ - "musl" - ], "license": "MPL-2.0", "optional": true, "os": [