gitlab-org--gitlab-foss/doc/administration/troubleshooting/group_saml_scim.md

3 KiB
Raw Blame History

stage group info type
Manage Access To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments reference

Troubleshooting Group SAML and SCIM (PREMIUM SAAS)

These are notes and screenshots regarding Group SAML and SCIM that the GitLab Support Team sometimes uses while troubleshooting, but which do not fit into the official documentation. GitLab is making this public, so that anyone can make use of the Support teams collected knowledge.

Please refer to the GitLab Group SAML docs for information on the feature and how to set it up.

When troubleshooting a SAML configuration, GitLab team members will frequently start with the SAML troubleshooting section.

They may then set up a test configuration of the desired identity provider. We include example screenshots in this section.

SAML and SCIM screenshots

This section includes relevant screenshots of the following example configurations of Group SAML and Group SCIM:

WARNING: These screenshots are updated only as needed by GitLab Support. They are not official documentation.

If you are currently having an issue with GitLab, you may want to check your support options.

Azure Active Directory

Basic SAML app configuration:

Azure AD basic SAML

User claims and attributes:

Azure AD user claims

SCIM mapping:

Azure AD SCIM

Okta

Basic SAML app configuration:

Okta basic SAML

User claims and attributes:

Okta Attributes

Advanced SAML app settings (defaults):

Okta Advanced Settings

IdP Links and Certificate:

Okta Links and Certificate

OneLogin

Application details:

OneLogin application details

Parameters:

OneLogin application details

Adding a user:

OneLogin user add

SSO settings:

OneLogin SSO settings

ADFS

Setup SAML SSO URL:

ADFS Setup SAML SSO URL

Configure Assertions:

ADFS Configure Assertions

Configure NameID:

ADFS ADFS-configure-NameID

Determine Certificate Fingerprint:

Via UI Via Shell
ADFS Determine Token Signing Certificate Fingerprint ADFS Determine Token Signing Fingerprint From Shell