Skip to content

Commit a1750fb

Browse files
admin: add sso troubleshooting (#20497)
* admin: add sso troubleshooting Signed-off-by: Craig Osterhout <[email protected]>
1 parent ff63df0 commit a1750fb

File tree

2 files changed

+164
-1
lines changed

2 files changed

+164
-1
lines changed
Lines changed: 161 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,161 @@
1+
---
2+
description: Learn how to troubleshoot common SSO issues.
3+
keywords: sso, troubleshoot, single sign-on
4+
title: Troubleshoot single sign-on
5+
---
6+
7+
While configuring or using single sign-on (SSO), you may encounter issues that
8+
can stem from your identity provider (IdP) or Docker configuration. The
9+
following sections describe how to view the error messages in the Docker Admin
10+
Console as well as some common errors and possible solutions. You can also see
11+
your identity provider's documentation to learn if you can view error logs in
12+
their service.
13+
14+
## View SSO and SCIM error logs
15+
16+
1. Sign in to the [Admin Console](https://app.docker.com/admin/).
17+
2. Select your organization or company in the left navigation drop-down menu,
18+
and then select **SSO and SCIM**.
19+
3. In the SSO connections table, select the **Actions** icon and **View error
20+
logs**. The **Connection errors** page appears with a list of errors that
21+
have occurred in the past 7 days.
22+
4. In the **Connection errors** page, select **View error details** next to an
23+
error message for more details. A modal appears with a JSON object containing
24+
more details.
25+
26+
## Common SSO errors and solutions
27+
28+
[View the SSO and SCIM error logs](#view-sso-and-scim-error-logs) and then use
29+
the following sections for solutions to common configuration errors.
30+
31+
### IdP-initiated sign in is not enabled for connection
32+
33+
An error message, similar to the following, appears in the error logs for this
34+
issue.
35+
36+
```text
37+
IdP-Initiated sign in is not enabled for connection '$ssoConnection'.
38+
```
39+
40+
Docker doesn't support an IdP-initiated SAML flow. This error can occur when a
41+
user attempts to authenticate from the IdP, for example using the Docker SSO App
42+
tile on the dashboard.
43+
44+
Possible solutions:
45+
46+
* The user must initiate authentication from Docker apps (Hub, Desktop, etc).
47+
The user needs to enter their email address and they will get redirected to
48+
the configured SSO IdP for their domain.
49+
* (Optional) Configure the Docker SSO App as not visible to users on your IdP
50+
so users don’t attempt to start authentication from there.
51+
52+
### Not enough seats in organization
53+
54+
An error message, similar to the following, appears in the error logs for this
55+
issue.
56+
57+
```text
58+
Not enough seats in organization '$orgName'. Add more seats or contact your administrator.
59+
```
60+
61+
This error can occur when attempting to provision a user into the organization
62+
via SSO Just-in-Time provisioning or SCIM, but the organization has no available
63+
seats for the user.
64+
65+
Possible solutions:
66+
67+
* Add more Docker Business subscription seats to the organization. For details,
68+
see [Add seats to your
69+
subscription](/subscription/core-subscription/add-seats/).
70+
* Remove some users or pending invitations from your organization to make more
71+
seats available. For more details, see [Manage organization
72+
members](/admin/organization/members/).
73+
74+
### Domain is not verified for SSO connection
75+
76+
An error message, similar to the following, appears in the error logs for this
77+
issue.
78+
79+
```text
80+
Domain '$emailDomain' is not verified for your SSO connection. Contact your company administrator. TraceID: XXXXXXXXXXXXXX
81+
```
82+
83+
This error occurs if the IdP authenticated a user through SSO and the UPN
84+
returned to Docker doesn’t match any of the verified domains associated to the
85+
SSO connection configured in Docker.
86+
87+
Possible solutions:
88+
89+
* Make sure the IdP SSO connection is returning the correct UPN value as part
90+
of the assertion attributes (attributes mapping).
91+
* Add and verify all domains and subdomains that are used as UPN by your IdP
92+
and associate them to your Docker SSO connection. For more details, see [Add
93+
and verify your
94+
domain](/security/for-admins/single-sign-on/configure/#step-one-add-and-verify-your-domain).
95+
96+
### Unable to find session
97+
98+
An error message, similar to the following, appears in the error logs for this
99+
issue.
100+
101+
```text
102+
We couldn't find your session. You may have pressed the back button, refreshed the page, opened too many sign-in dialogs, or there is some issue with cookies. Try signing in again. If the issue persists, contact your administrator.
103+
```
104+
105+
This error typically occurs during the authentication flow when a user presses
106+
the back or the refresh button on the browser. This causes the sign-in flow to
107+
lose track of the initial authentication request, which is required to complete
108+
all authentication flows.
109+
110+
Possible solutions:
111+
112+
* Avoid pressing the back or refresh buttons during sign in.
113+
* Close the browser’s tab and start the authentication flow from the beginning
114+
in the app (Docker Desktop, Hub, etc.)
115+
116+
### User is not assigned to the organization
117+
118+
An error message, similar to the following, appears in the error logs for this
119+
issue.
120+
121+
```text
122+
User '$username' is not assigned to this SSO organization. Contact your administrator. TraceID: XXXXXXXXXXXXX
123+
```
124+
125+
This error occurs if SSO Just-In-Time (JIT) provisioning is disabled. JIT
126+
provisioning ensures that a user is added to an organization after they
127+
authenticate via SSO. JIT provisioning can be optionally disabled to prevent
128+
users taking seats in the organization automatically or when SCIM is used as
129+
the only option for user provisioning.
130+
131+
Possible solutions:
132+
133+
* Review your SSO connection configuration and enable JIT provisioning to add
134+
all users to the organization after authenticating via SSO. For more details,
135+
see [Just-in-Time
136+
provisioning](/security/for-admins/provisioning/just-in-time/).
137+
* If JIT provisioning should remain disabled, then add the user to the
138+
organization by manually inviting them. Next time the user authenticates via
139+
SSO they will get added to the org because they are invited. For more
140+
details, see [Manage organization members](/admin/organization/members/).
141+
* If SCIM should provision the user, then ensure that the IdP controlling SCIM
142+
provisioning is properly configured to synchronize users with Docker as soon
143+
as they get assigned to the app. For more details, refer to your identity
144+
provider's documentation.
145+
146+
### Name ID is not an email address
147+
148+
An error message, similar to the following, appears in the error logs for this
149+
issue.
150+
151+
```text
152+
The name ID sent by the identity provider is not an email address. Contact your company administrator.
153+
```
154+
155+
This error can occur during SAML authentication, when your IdP sends back a Name
156+
ID (UPN) that doesn't comply with the email address format required. The Docker
157+
SSO app requires a name identifier to be the primary email address of the user.
158+
159+
Possible solutions:
160+
161+
* Ensure that the Name ID attribute format is `EmailAddress`.

data/toc.yaml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2267,7 +2267,7 @@ Manuals:
22672267
title: Overview
22682268
- sectiontitle: For admins
22692269
section:
2270-
- sectiontitle: Single Sign-on
2270+
- sectiontitle: Single sign-on
22712271
section:
22722272
- path: /security/for-admins/single-sign-on/
22732273
title: Overview
@@ -2279,6 +2279,8 @@ Manuals:
22792279
title: Connect
22802280
- path: /security/for-admins/single-sign-on/manage/
22812281
title: Manage
2282+
- path: /security/for-admins/single-sign-on/troubleshoot/
2283+
title: Troubleshoot
22822284
- sectiontitle: Provisioning
22832285
section:
22842286
- path: /security/for-admins/provisioning/scim/

0 commit comments

Comments
 (0)