2020-10-29 11:09:12 -04:00
---
2022-05-12 23:08:13 -04:00
stage: Manage
group: Authentication and Authorization
2022-09-21 17:13:33 -04:00
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments
2020-10-29 11:09:12 -04:00
---
2022-02-09 13:16:19 -05:00
# Use GitHub as an authentication provider **(FREE SELF)**
2014-04-02 23:11:25 -04:00
2022-02-09 13:16:19 -05:00
You can integrate your GitLab instance with GitHub.com and GitHub Enterprise.
You can import projects from GitHub, or sign in to GitLab
with your GitHub credentials.
2015-02-18 16:42:52 -05:00
2022-02-09 13:16:19 -05:00
## Create an OAuth app in GitHub
2021-02-24 19:11:24 -05:00
2022-02-09 13:16:19 -05:00
To enable the GitHub OmniAuth provider, you need an OAuth 2.0 client ID and client
secret from GitHub:
2021-02-24 19:11:24 -05:00
2022-02-09 13:16:19 -05:00
1. Sign in to GitHub.
1. [Create an OAuth App ](https://docs.github.com/en/developers/apps/building-oauth-apps/creating-an-oauth-app )
and provide the following information:
- The URL of your GitLab instance, such as `https://gitlab.example.com` .
- The authorization callback URL, such as, `https://gitlab.example.com/users/auth` .
Include the port number if your GitLab instance uses a non-default port.
2016-04-29 00:13:21 -04:00
2022-02-09 13:16:19 -05:00
### Check for security vulnerabilities
2014-04-24 18:48:22 -04:00
2022-02-09 13:16:19 -05:00
For some integrations, the [OAuth 2 covert redirect ](https://oauth.net/advisories/2014-1-covert-redirect/ )
vulnerability can compromise GitLab accounts.
To mitigate this vulnerability, append `/users/auth` to the authorization
callback URL.
2018-10-27 20:05:01 -04:00
2022-02-09 13:16:19 -05:00
However, as far as we know, GitHub does not validate the subdomain part of the `redirect_uri` .
Therefore, a subdomain takeover, an XSS, or an open redirect on any subdomain of
your website could enable the covert redirect attack.
2019-01-22 12:38:08 -05:00
2022-02-09 13:16:19 -05:00
## Enable GitHub OAuth in GitLab
2014-04-24 18:48:22 -04:00
2022-02-09 13:16:19 -05:00
1. [Configure the initial settings ](omniauth.md#configure-initial-settings ) in GitLab.
2014-04-24 18:48:22 -04:00
2022-02-09 13:16:19 -05:00
1. Edit the GitLab configuration file using the following information:
2015-02-13 17:49:19 -05:00
2022-02-09 13:16:19 -05:00
| GitHub setting | Value in the GitLab configuration file | Description |
|----------------|----------------------------------------|-------------------------|
| Client ID | `YOUR_APP_ID` | OAuth 2.0 client ID |
| Client secret | `YOUR_APP_SECRET` | OAuth 2.0 client secret |
| URL | `https://github.example.com/` | GitHub deployment URL |
2017-02-09 02:38:25 -05:00
2022-02-09 13:16:19 -05:00
- **For Omnibus installations**
2017-02-09 02:38:25 -05:00
2022-02-09 13:16:19 -05:00
1. Open the `/etc/gitlab/gitlab.rb` file.
2017-02-09 02:38:25 -05:00
2022-02-09 13:16:19 -05:00
For GitHub.com, update the following section:
2014-04-24 18:48:22 -04:00
2022-02-09 13:16:19 -05:00
```ruby
gitlab_rails['omniauth_providers'] = [
{
name: "github",
# label: "Provider name", # optional label for login button, defaults to "GitHub"
app_id: "YOUR_APP_ID",
app_secret: "YOUR_APP_SECRET",
args: { scope: "user:email" }
}
]
```
2020-01-20 13:08:44 -05:00
2022-02-09 13:16:19 -05:00
For GitHub Enterprise, update the following section and replace
`https://github.example.com/` with your GitHub URL:
2020-01-20 13:08:44 -05:00
2022-02-09 13:16:19 -05:00
```ruby
gitlab_rails['omniauth_providers'] = [
{
name: "github",
# label: "Provider name", # optional label for login button, defaults to "GitHub"
app_id: "YOUR_APP_ID",
app_secret: "YOUR_APP_SECRET",
url: "https://github.example.com/",
args: { scope: "user:email" }
}
]
```
2020-01-20 13:08:44 -05:00
2022-02-09 13:16:19 -05:00
1. Save the file and [reconfigure ](../administration/restart_gitlab.md#omnibus-gitlab-reconfigure )
GitLab.
2020-01-20 13:08:44 -05:00
2022-02-09 13:16:19 -05:00
- **For installations from source**
2014-04-02 23:11:25 -04:00
2022-02-09 13:16:19 -05:00
1. Open the `config/gitlab.yml` file.
2016-04-22 15:43:10 -04:00
2022-02-09 13:16:19 -05:00
For GitHub.com, update the following section:
2016-04-22 15:43:10 -04:00
2022-02-09 13:16:19 -05:00
```yaml
- { name: 'github',
# label: 'Provider name', # optional label for login button, defaults to "GitHub"
app_id: 'YOUR_APP_ID',
app_secret: 'YOUR_APP_SECRET',
args: { scope: 'user:email' } }
```
2016-04-22 15:43:10 -04:00
2022-02-09 13:16:19 -05:00
For GitHub Enterprise, update the following section and replace
`https://github.example.com/` with your GitHub URL:
2014-04-02 23:11:25 -04:00
2022-02-09 13:16:19 -05:00
```yaml
- { name: 'github',
# label: 'Provider name', # optional label for login button, defaults to "GitHub"
app_id: 'YOUR_APP_ID',
app_secret: 'YOUR_APP_SECRET',
url: "https://github.example.com/",
args: { scope: 'user:email' } }
```
2014-04-24 18:48:22 -04:00
2022-02-09 13:16:19 -05:00
1. Save the file and [restart ](../administration/restart_gitlab.md#installations-from-source )
GitLab.
2014-04-24 18:48:22 -04:00
2022-02-09 13:16:19 -05:00
1. Refresh the GitLab sign-in page. A GitHub icon should display below the
sign-in form.
2014-04-02 23:11:25 -04:00
2022-02-09 13:16:19 -05:00
1. Select the icon. Sign in to GitHub and authorize the GitLab application.
2017-02-09 02:38:25 -05:00
2022-02-10 13:18:16 -05:00
## Troubleshooting
2017-05-18 14:30:21 -04:00
2022-02-10 13:18:16 -05:00
### Imports from GitHub Enterprise with a self-signed certificate fail
2017-05-22 17:47:31 -04:00
2022-02-10 13:18:16 -05:00
When you import projects from GitHub Enterprise using a self-signed
certificate, the imports fail.
2017-05-22 17:47:31 -04:00
2022-02-10 13:18:16 -05:00
To fix this issue, you must disable SSL verification:
2017-05-18 14:30:21 -04:00
2022-02-10 13:18:16 -05:00
1. Set `verify_ssl` to `false` in the configuration file.
2017-05-18 14:30:21 -04:00
2022-02-10 13:18:16 -05:00
- **For Omnibus installations**
2017-05-18 14:30:21 -04:00
2022-02-10 13:18:16 -05:00
```ruby
gitlab_rails['omniauth_providers'] = [
{
name: "github",
# label: "Provider name", # optional label for login button, defaults to "GitHub"
app_id: "YOUR_APP_ID",
app_secret: "YOUR_APP_SECRET",
url: "https://github.example.com/",
verify_ssl: false,
args: { scope: "user:email" }
}
]
```
2017-05-18 14:30:21 -04:00
2022-02-10 13:18:16 -05:00
- **For installations from source**
2019-12-02 10:06:36 -05:00
2022-02-10 13:18:16 -05:00
```yaml
- { name: 'github',
# label: 'Provider name', # optional label for login button, defaults to "GitHub"
app_id: 'YOUR_APP_ID',
app_secret: 'YOUR_APP_SECRET',
url: "https://github.example.com/",
verify_ssl: false,
args: { scope: 'user:email' } }
```
2019-12-02 10:06:36 -05:00
2022-02-10 13:18:16 -05:00
1. Change the global Git `sslVerify` option to `false` on the GitLab server.
2019-12-02 10:06:36 -05:00
2022-08-08 23:11:51 -04:00
- **For Omnibus installations in [GitLab 15.3 ](https://gitlab.com/gitlab-org/omnibus-gitlab/-/issues/6800 ) and later**:
```ruby
gitaly['gitconfig'] = [
{key: "http.sslVerify", value: "false"},
]
```
- **For Omnibus installations in GitLab 15.2 and earlier (legacy method)**:
2019-12-02 10:06:36 -05:00
2022-02-10 13:18:16 -05:00
```ruby
omnibus_gitconfig['system'] = { "http" => ["sslVerify = false"] }
```
2022-08-08 23:11:51 -04:00
- **For installations from source in [GitLab 15.3 ](https://gitlab.com/gitlab-org/omnibus-gitlab/-/issues/6800 ) and later**, edit the Gitaly configuration (`gitaly.toml`):
```toml
[[git.config]]
key = "http.sslVerify"
value = "false"
```
- **For installations from source in GitLab 15.2 and earlier (legacy method)**:
2022-02-10 13:18:16 -05:00
```shell
git config --global http.sslVerify false
```
2019-12-02 10:06:36 -05:00
2022-02-10 13:18:16 -05:00
1. [Reconfigure GitLab ](../administration/restart_gitlab.md#omnibus-gitlab-reconfigure )
if you installed using Omnibus, or [restart GitLab ](../administration/restart_gitlab.md#installations-from-source )
if you installed from source.
### Signing in using GitHub Enterprise returns a 500 error
This error can occur because of a network connectivity issue between your
GitLab instance and GitHub Enterprise.
To check for a connectivity issue:
2022-07-26 08:10:14 -04:00
1. Go to the [`production.log` ](../administration/logs/index.md#productionlog )
2022-02-10 13:18:16 -05:00
on your GitLab server and look for the following error:
``` plaintext
Faraday::ConnectionFailed (execution expired)
```
1. [Start the rails console ](../administration/operations/rails_console.md#starting-a-rails-console-session )
and run the following commands. Replace `<github_url>` with the URL of your
GitHub Enterprise instance:
```ruby
uri = URI.parse("https://< github_url > ") # replace `GitHub-URL` with the real one here
http = Net::HTTP.new(uri.host, uri.port)
http.use_ssl = true
http.verify_mode = 1
response = http.request(Net::HTTP::Get.new(uri.request_uri))
```
1. If a similar `execution expired` error is returned, this confirms the error is
caused by a connectivity issue. Make sure the GitLab server can reach
your GitHub Enterprise instance.
2019-12-02 10:06:36 -05:00
### Signing in using your GitHub account without a pre-existing GitLab account is not allowed
2022-02-10 13:18:16 -05:00
When you sign in to GitLab, you get the following error:
```plaintext
Signing in using your GitHub account without a pre-existing
GitLab account is not allowed. Create a GitLab account first,
and then connect it to your GitHub account
```
To fix this issue, you must activate GitHub sign-in in GitLab:
2019-12-02 10:06:36 -05:00
2022-02-10 13:18:16 -05:00
1. On the top bar, in the top right corner, select your avatar.
2021-02-09 10:09:39 -05:00
1. Select **Edit profile** .
2021-09-08 14:11:23 -04:00
1. On the left sidebar, select **Account** .
2022-07-07 14:09:40 -04:00
1. In the **Service sign-in** section, select **Connect to GitHub** .