3 KiB
stage | group | info |
---|---|---|
none | unassigned | To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#designated-technical-writers |
Auth0 OmniAuth Provider
To enable the Auth0 OmniAuth provider, you must create an Auth0 account, and an application.
-
Sign in to the Auth0 Console. If you need to create an account, you can do so at the same link.
-
Select "New App/API".
-
Provide the Application Name ('GitLab' works fine).
-
Once created, you should see the Quick Start options. Disregard them and select 'Settings' above the Quick Start options.
-
At the top of the Settings screen, you should see your Domain, Client ID and Client Secret. Take note of these as you'll need to put them in the configuration file. For example:
- Domain:
test1234.auth0.com
- Client ID:
t6X8L2465bNePWLOvt9yi41i
- Client Secret:
KbveM3nqfjwCbrhaUy_gDu2dss8TIlHIdzlyf33pB7dEK5u_NyQdp65O_o02hXs2
- Domain:
-
Fill in the Allowed Callback URLs:
http://YOUR_GITLAB_URL/users/auth/auth0/callback
(or)https://YOUR_GITLAB_URL/users/auth/auth0/callback
-
Fill in the Allowed Origins (CORS):
http://YOUR_GITLAB_URL
(or)https://YOUR_GITLAB_URL
-
On your GitLab server, open the configuration file.
For Omnibus package:
sudo editor /etc/gitlab/gitlab.rb
For installations from source:
cd /home/git/gitlab sudo -u git -H editor config/gitlab.yml
-
See Initial OmniAuth Configuration for initial settings.
-
Add the provider configuration:
For Omnibus package:
gitlab_rails['omniauth_providers'] = [ { "name" => "auth0", "args" => { client_id: 'YOUR_AUTH0_CLIENT_ID', client_secret: 'YOUR_AUTH0_CLIENT_SECRET', domain: 'YOUR_AUTH0_DOMAIN', scope: 'openid profile email' } } ]
For installations from source:
- { name: 'auth0', args: { client_id: 'YOUR_AUTH0_CLIENT_ID', client_secret: 'YOUR_AUTH0_CLIENT_SECRET', domain: 'YOUR_AUTH0_DOMAIN', scope: 'openid profile email' } }
-
Change
YOUR_AUTH0_CLIENT_ID
to the client ID from the Auth0 Console page from step 5. -
Change
YOUR_AUTH0_CLIENT_SECRET
to the client secret from the Auth0 Console page from step 5. -
Reconfigure or restart GitLab for the changes to take effect if you installed GitLab via Omnibus or from source respectively.
On the sign in page there should now be an Auth0 icon below the regular sign in form. Click the icon to begin the authentication process. Auth0 will ask the user to sign in and authorize the GitLab application. If everything goes well the user will be returned to GitLab and will be signed in.