Skip to content

Latest commit

 

History

History
61 lines (44 loc) · 1.8 KB

GITLAB.md

File metadata and controls

61 lines (44 loc) · 1.8 KB

Gilab Provider

Gitlab can be used as as an OpenID Connect identity provider.

Provider configuration

An application must be setup on Gitlab as describe in the documentation of OAuth 2.0 authentication identity provider. The application must be configured with:

  • scopes: openid profile email
  • redirect URI: https://<name>/<jenkins>/securityRealm/finishLogin.

In order to obtain the client id and secret:

  • the OAuth 2 Client ID is provided in the Application ID field.
  • the OAuth 2 Client Secret is accessed by selecting Copy in the Secret field

Plugin configuration

Gitla provides a well known configuration endpoint which can be used for automating endpoint configuration. It also supports PKCE verification for additional security.

Except for those parameters and the choice of user information, default parameters value are suitable.

User information

The following user information is used by the plugin:

field description
sub The user's GitLab username
email he user's primary email address
name The user's full name
groups Paths for the groups the user is a member of

The flag for overriding scope must be set for requesting only needed scopes.

JCasC

jenkins:
  securityRealm:
    oic:
      wellKnownOpenIDConfigurationUrl: https://gitlab.com/.well-known/openid-configuration
      automanualconfigure: auto
      clientId: identifier-client-id
      clientSecret: identifuer-client-secret
      overrideScopes: openid profile email
      userNameField: preferred_username
      fullNameFieldName: name
      emailFieldName: email
      groupFieldName: groups
      pkceEnabled: true