b4c78a58f5
Update ldap.md If you escape the '\' character when using a "domain\user" scheme for the bind_dn name, it will fail. gitlab-ctl reconfigure escapes characters, and if you pre-escape the '\', the resultant yaml file will have four (4) '\' characters See merge request gitlab-org/gitlab-ce!20460 |
||
---|---|---|
.. | ||
how_to_configure_ldap_gitlab_ce | ||
img | ||
authentiq.md | ||
crowd.md | ||
jwt.md | ||
ldap.md | ||
okta.md | ||
README.md |
comments |
---|
false |
Authentication and Authorization
GitLab integrates with the following external authentication and authorization providers.
- LDAP Includes Active Directory, Apple Open Directory, Open LDAP, and 389 Server
- OmniAuth Sign in via Twitter, GitHub, GitLab.com, Google, Bitbucket, Facebook, Shibboleth, Crowd, Azure and Authentiq ID
- CAS Configure GitLab to sign in using CAS
- SAML Configure GitLab as a SAML 2.0 Service Provider
- Okta Configure GitLab to sign in using Okta
- Authentiq: Enable the Authentiq OmniAuth provider for passwordless authentication