|
| 1 | +--- |
| 2 | +description: Learn how to troubleshoot common SSO issues. |
| 3 | +keywords: sso, troubleshoot, single sign-on |
| 4 | +title: Troubleshoot single sign-on |
| 5 | +--- |
| 6 | + |
| 7 | +While configuring or using single sign-on (SSO), you may encounter issues that |
| 8 | +can stem from your identity provider (IdP) or Docker configuration. The |
| 9 | +following sections describe how to view the error messages in the Docker Admin |
| 10 | +Console as well as some common errors and possible solutions. You can also see |
| 11 | +your identity provider's documentation to learn if you can view error logs in |
| 12 | +their service. |
| 13 | + |
| 14 | +## View SSO and SCIM error logs |
| 15 | + |
| 16 | +1. Sign in to the [Admin Console](https://app.docker.com/admin/). |
| 17 | +2. Select your organization or company in the left navigation drop-down menu, |
| 18 | + and then select **SSO and SCIM**. |
| 19 | +3. In the SSO connections table, select the **Actions** icon and **View error |
| 20 | + logs**. The **Connection errors** page appears with a list of errors that |
| 21 | + have occurred in the past 7 days. |
| 22 | +4. In the **Connection errors** page, select **View error details** next to an |
| 23 | + error message for more details. A modal appears with a JSON object containing |
| 24 | + more details. |
| 25 | + |
| 26 | +## Common SSO errors and solutions |
| 27 | + |
| 28 | +[View the SSO and SCIM error logs](#view-sso-and-scim-error-logs) and then use |
| 29 | +the following sections for solutions to common configuration errors. |
| 30 | + |
| 31 | +### IdP-initiated sign in is not enabled for connection |
| 32 | + |
| 33 | +An error message, similar to the following, appears in the error logs for this |
| 34 | +issue. |
| 35 | + |
| 36 | +```text |
| 37 | +IdP-Initiated sign in is not enabled for connection '$ssoConnection'. |
| 38 | +``` |
| 39 | + |
| 40 | +Docker doesn't support an IdP-initiated SAML flow. This error can occur when a |
| 41 | +user attempts to authenticate from the IdP, for example using the Docker SSO App |
| 42 | +tile on the dashboard. |
| 43 | + |
| 44 | +Possible solutions: |
| 45 | + |
| 46 | + * The user must initiate authentication from Docker apps (Hub, Desktop, etc). |
| 47 | + The user needs to enter their email address and they will get redirected to |
| 48 | + the configured SSO IdP for their domain. |
| 49 | + * (Optional) Configure the Docker SSO App as not visible to users on your IdP |
| 50 | + so users don’t attempt to start authentication from there. |
| 51 | + |
| 52 | +### Not enough seats in organization |
| 53 | + |
| 54 | +An error message, similar to the following, appears in the error logs for this |
| 55 | +issue. |
| 56 | + |
| 57 | +```text |
| 58 | +Not enough seats in organization '$orgName'. Add more seats or contact your administrator. |
| 59 | +``` |
| 60 | + |
| 61 | +This error can occur when attempting to provision a user into the organization |
| 62 | +via SSO Just-in-Time provisioning or SCIM, but the organization has no available |
| 63 | +seats for the user. |
| 64 | + |
| 65 | +Possible solutions: |
| 66 | + |
| 67 | + * Add more Docker Business subscription seats to the organization. For details, |
| 68 | + see [Add seats to your |
| 69 | + subscription](/subscription/core-subscription/add-seats/). |
| 70 | + * Remove some users or pending invitations from your organization to make more |
| 71 | + seats available. For more details, see [Manage organization |
| 72 | + members](/admin/organization/members/). |
| 73 | + |
| 74 | +### Domain is not verified for SSO connection |
| 75 | + |
| 76 | +An error message, similar to the following, appears in the error logs for this |
| 77 | +issue. |
| 78 | + |
| 79 | +```text |
| 80 | +Domain '$emailDomain' is not verified for your SSO connection. Contact your company administrator. TraceID: XXXXXXXXXXXXXX |
| 81 | +``` |
| 82 | + |
| 83 | +This error occurs if the IdP authenticated a user through SSO and the UPN |
| 84 | +returned to Docker doesn’t match any of the verified domains associated to the |
| 85 | +SSO connection configured in Docker. |
| 86 | + |
| 87 | +Possible solutions: |
| 88 | + |
| 89 | + * Make sure the IdP SSO connection is returning the correct UPN value as part |
| 90 | + of the assertion attributes (attributes mapping). |
| 91 | + * Add and verify all domains and subdomains that are used as UPN by your IdP |
| 92 | + and associate them to your Docker SSO connection. For more details, see [Add |
| 93 | + and verify your |
| 94 | + domain](/security/for-admins/single-sign-on/configure/#step-one-add-and-verify-your-domain). |
| 95 | + |
| 96 | +### Unable to find session |
| 97 | + |
| 98 | +An error message, similar to the following, appears in the error logs for this |
| 99 | +issue. |
| 100 | + |
| 101 | +```text |
| 102 | +We couldn't find your session. You may have pressed the back button, refreshed the page, opened too many sign-in dialogs, or there is some issue with cookies. Try signing in again. If the issue persists, contact your administrator. |
| 103 | +``` |
| 104 | + |
| 105 | +This error typically occurs during the authentication flow when a user presses |
| 106 | +the back or the refresh button on the browser. This causes the sign-in flow to |
| 107 | +lose track of the initial authentication request, which is required to complete |
| 108 | +all authentication flows. |
| 109 | + |
| 110 | +Possible solutions: |
| 111 | + |
| 112 | + * Avoid pressing the back or refresh buttons during sign in. |
| 113 | + * Close the browser’s tab and start the authentication flow from the beginning |
| 114 | + in the app (Docker Desktop, Hub, etc.) |
| 115 | + |
| 116 | +### User is not assigned to the organization |
| 117 | + |
| 118 | +An error message, similar to the following, appears in the error logs for this |
| 119 | +issue. |
| 120 | + |
| 121 | +```text |
| 122 | +User '$username' is not assigned to this SSO organization. Contact your administrator. TraceID: XXXXXXXXXXXXX |
| 123 | +``` |
| 124 | + |
| 125 | +This error occurs if SSO Just-In-Time (JIT) provisioning is disabled. JIT |
| 126 | +provisioning ensures that a user is added to an organization after they |
| 127 | +authenticate via SSO. JIT provisioning can be optionally disabled to prevent |
| 128 | +users taking seats in the organization automatically or when SCIM is used as |
| 129 | +the only option for user provisioning. |
| 130 | + |
| 131 | +Possible solutions: |
| 132 | + |
| 133 | + * Review your SSO connection configuration and enable JIT provisioning to add |
| 134 | + all users to the organization after authenticating via SSO. For more details, |
| 135 | + see [Just-in-Time |
| 136 | + provisioning](/security/for-admins/provisioning/just-in-time/). |
| 137 | + * If JIT provisioning should remain disabled, then add the user to the |
| 138 | + organization by manually inviting them. Next time the user authenticates via |
| 139 | + SSO they will get added to the org because they are invited. For more |
| 140 | + details, see [Manage organization members](/admin/organization/members/). |
| 141 | + * If SCIM should provision the user, then ensure that the IdP controlling SCIM |
| 142 | + provisioning is properly configured to synchronize users with Docker as soon |
| 143 | + as they get assigned to the app. For more details, refer to your identity |
| 144 | + provider's documentation. |
| 145 | + |
| 146 | +### Name ID is not an email address |
| 147 | + |
| 148 | +An error message, similar to the following, appears in the error logs for this |
| 149 | +issue. |
| 150 | + |
| 151 | +```text |
| 152 | +The name ID sent by the identity provider is not an email address. Contact your company administrator. |
| 153 | +``` |
| 154 | + |
| 155 | +This error can occur during SAML authentication, when your IdP sends back a Name |
| 156 | +ID (UPN) that doesn't comply with the email address format required. The Docker |
| 157 | +SSO app requires a name identifier to be the primary email address of the user. |
| 158 | + |
| 159 | +Possible solutions: |
| 160 | + |
| 161 | + * Ensure that the Name ID attribute format is `EmailAddress`. |
0 commit comments