gitlab-org--gitlab-foss/doc/administration/auth/jwt.md

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

92 lines
3.4 KiB
Markdown
Raw Normal View History

---
type: reference
stage: Manage
group: Authentication and Authorization
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments
---
# JWT OmniAuth provider **(FREE SELF)**
2018-03-26 11:48:12 -04:00
To enable the JWT OmniAuth provider, you must register your application with JWT.
JWT provides you with a secret key for you to use.
2018-03-26 11:48:12 -04:00
1. On your GitLab server, open the configuration file.
2018-03-26 11:48:12 -04:00
For Omnibus GitLab:
2018-03-26 11:48:12 -04:00
```shell
sudo editor /etc/gitlab/gitlab.rb
```
2018-03-26 11:48:12 -04:00
For installations from source:
2018-03-26 11:48:12 -04:00
```shell
cd /home/git/gitlab
sudo -u git -H editor config/gitlab.yml
```
2018-03-26 11:48:12 -04:00
1. See [Configure initial settings](../../integration/omniauth.md#configure-initial-settings) for initial settings.
1. Add the provider configuration.
2018-03-26 11:48:12 -04:00
For Omnibus GitLab:
2018-03-26 11:48:12 -04:00
```ruby
gitlab_rails['omniauth_providers'] = [
{ name: "jwt",
label: "Provider name", # optional label for login button, defaults to "Jwt"
args: {
secret: "YOUR_APP_SECRET",
algorithm: "HS256", # Supported algorithms: "RS256", "RS384", "RS512", "ES256", "ES384", "ES512", "HS256", "HS384", "HS512"
uid_claim: "email",
required_claims: ["name", "email"],
info_map: { name: "name", email: "email" },
auth_url: "https://example.com/",
valid_within: 3600 # 1 hour
}
}
]
```
2018-03-26 11:48:12 -04:00
For installation from source:
2018-03-26 11:48:12 -04:00
```yaml
- { name: 'jwt',
label: 'Provider name', # optional label for login button, defaults to "Jwt"
args: {
secret: 'YOUR_APP_SECRET',
algorithm: 'HS256', # Supported algorithms: 'RS256', 'RS384', 'RS512', 'ES256', 'ES384', 'ES512', 'HS256', 'HS384', 'HS512'
uid_claim: 'email',
required_claims: ['name', 'email'],
info_map: { name: 'name', email: 'email' },
auth_url: 'https://example.com/',
valid_within: 3600 # 1 hour
}
}
```
2018-03-26 11:48:12 -04:00
NOTE:
For more information on each configuration option refer to
the [OmniAuth JWT usage documentation](https://github.com/mbleigh/omniauth-jwt#usage).
2018-03-26 11:48:12 -04:00
1. Change `YOUR_APP_SECRET` to the client secret and set `auth_url` to your redirect URL.
1. Save the configuration file.
1. [Reconfigure](../restart_gitlab.md#omnibus-gitlab-reconfigure) or [restart GitLab](../restart_gitlab.md#installations-from-source) for the changes to take effect if you
installed GitLab via Omnibus or from source respectively.
2018-03-26 11:48:12 -04:00
On the sign in page there should now be a JWT icon below the regular sign in form.
Select the icon to begin the authentication process. JWT asks the user to
2018-03-26 11:48:12 -04:00
sign in and authorize the GitLab application. If everything goes well, the user
is redirected to GitLab and signed in.
2018-03-26 11:48:12 -04:00
<!-- ## Troubleshooting
Include any troubleshooting steps that you can foresee. If you know beforehand what issues
one might have when setting this up, or when something is changed, or on upgrading, it's
important to describe those, too. Think of things that may go wrong and include them here.
This is important to minimize requests for support, and to avoid doc comments with
questions that you know someone might ask.
Each scenario can be a third-level heading, e.g. `### Getting error message X`.
If you have none to add when creating a doc, leave this section in place
but commented out to help encourage others to add to it in the future. -->