Testing
SSO and SCIM testing
You can test SSO and SCIM by signing in to Docker Desktop or Docker Hub with the email address linked to a Docker account that is part of the verified domain. Developers who sign in using their Docker usernames will remain unaffected by the SSO and/or SCIM setup.
Important
Some users may need CLI based logins to Docker Hub, and for this they will need a personal access token (PAT).
Test RAM and IAM
Warning
Be sure to communicate with your users before proceeding, as this step will impact all existing users signing into your Docker organization
If you plan to use Registry Access Management (RAM) and/or Image Access Management (IAM), ensure your test developer signs in to Docker Desktop using their organization credentials. Once authenticated, have them attempt to pull an unauthorized image or one from a disallowed registry via the Docker CLI. They should receive an error message indicating that the registry is restricted by the organization.
Deploy settings and enforce sign in to test group
Deploy the Docker settings and enforce sign-in for a small group of test users via MDM. Have this group test their development workflows with containers on Docker Desktop and Docker Hub to ensure all settings and the sign-in enforcement function as expected.
Test Docker Build Cloud capabilities
Have one of your Docker Desktop testers connect to the cloud builder you created and use it to build.
Verify Docker Scout monitoring of repositories
Check the Docker Scout dashboard to confirm that data is being properly received for the repositories where Docker Scout has been enabled.