<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://wiki.dersllc.com/index.php?action=history&amp;feed=atom&amp;title=VMware%2FGITLAB</id>
	<title>VMware/GITLAB - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://wiki.dersllc.com/index.php?action=history&amp;feed=atom&amp;title=VMware%2FGITLAB"/>
	<link rel="alternate" type="text/html" href="http://wiki.dersllc.com/index.php?title=VMware/GITLAB&amp;action=history"/>
	<updated>2026-05-05T13:57:24Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.39.3</generator>
	<entry>
		<id>http://wiki.dersllc.com/index.php?title=VMware/GITLAB&amp;diff=20&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;= Setting up GITLAB with SSO = 1. vi /etc/gitlab/gitlab.rb  gitlab_rails[&#039;omniauth_enabled&#039;] = true  gitlab_rails[&#039;omniauth_allow_single_sign_on&#039;] = [&#039;saml&#039;]  gitlab_rails[&#039;omniauth_sync_email_from_provider&#039;] = &#039;saml&#039;  gitlab_rails[&#039;omniauth_sync_profile_from_provider&#039;] = [&#039;saml&#039;]  gitlab_rails[&#039;omniauth_sync_profile_attributes&#039;] = [&#039;email&#039;]  gitlab_rails[&#039;omniauth_auto_sign_in_with_provider&#039;] = &#039;saml&#039;  gitlab_rails[&#039;omniauth_block_auto_created_users&#039;] = false  #gitlab_r...&quot;</title>
		<link rel="alternate" type="text/html" href="http://wiki.dersllc.com/index.php?title=VMware/GITLAB&amp;diff=20&amp;oldid=prev"/>
		<updated>2023-06-02T19:09:03Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;= Setting up GITLAB with SSO = 1. vi /etc/gitlab/gitlab.rb  gitlab_rails[&amp;#039;omniauth_enabled&amp;#039;] = true  gitlab_rails[&amp;#039;omniauth_allow_single_sign_on&amp;#039;] = [&amp;#039;saml&amp;#039;]  gitlab_rails[&amp;#039;omniauth_sync_email_from_provider&amp;#039;] = &amp;#039;saml&amp;#039;  gitlab_rails[&amp;#039;omniauth_sync_profile_from_provider&amp;#039;] = [&amp;#039;saml&amp;#039;]  gitlab_rails[&amp;#039;omniauth_sync_profile_attributes&amp;#039;] = [&amp;#039;email&amp;#039;]  gitlab_rails[&amp;#039;omniauth_auto_sign_in_with_provider&amp;#039;] = &amp;#039;saml&amp;#039;  gitlab_rails[&amp;#039;omniauth_block_auto_created_users&amp;#039;] = false  #gitlab_r...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;= Setting up GITLAB with SSO =&lt;br /&gt;
1. vi /etc/gitlab/gitlab.rb&lt;br /&gt;
 gitlab_rails[&amp;#039;omniauth_enabled&amp;#039;] = true&lt;br /&gt;
 gitlab_rails[&amp;#039;omniauth_allow_single_sign_on&amp;#039;] = [&amp;#039;saml&amp;#039;]&lt;br /&gt;
 gitlab_rails[&amp;#039;omniauth_sync_email_from_provider&amp;#039;] = &amp;#039;saml&amp;#039;&lt;br /&gt;
 gitlab_rails[&amp;#039;omniauth_sync_profile_from_provider&amp;#039;] = [&amp;#039;saml&amp;#039;]&lt;br /&gt;
 gitlab_rails[&amp;#039;omniauth_sync_profile_attributes&amp;#039;] = [&amp;#039;email&amp;#039;]&lt;br /&gt;
 gitlab_rails[&amp;#039;omniauth_auto_sign_in_with_provider&amp;#039;] = &amp;#039;saml&amp;#039;&lt;br /&gt;
 gitlab_rails[&amp;#039;omniauth_block_auto_created_users&amp;#039;] = false&lt;br /&gt;
 #gitlab_rails[&amp;#039;omniauth_auto_link_ldap_user&amp;#039;] = true &lt;br /&gt;
 gitlab_rails[&amp;#039;omniauth_auto_link_saml_user&amp;#039;] = true&lt;br /&gt;
 #gitlab_rails[&amp;#039;omniauth_external_providers&amp;#039;] = [&amp;#039;twitter&amp;#039;, &amp;#039;google_oauth2&amp;#039;]&lt;br /&gt;
 #gitlab_rails[&amp;#039;omniauth_allow_bypass_two_factor&amp;#039;] = [&amp;#039;google_oauth2&amp;#039;]&lt;br /&gt;
 gitlab_rails[&amp;#039;omniauth_providers&amp;#039;] = [&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;name&amp;quot; =&amp;gt; &amp;quot;saml&amp;quot;,&lt;br /&gt;
     &amp;quot;args&amp;quot; =&amp;gt; {&lt;br /&gt;
         assertion_consumer_service_url: &amp;#039;https://gitlab.dersllc.com/users/auth/saml/callback&amp;#039;,&lt;br /&gt;
         idp_cert: &amp;#039;-----BEGIN CERTIFICATE-----&lt;br /&gt;
 MIIEDTCCAnWgAwIBAgIFX8pgs88wDQYJKoZIhvcNAQELBQAwPzEgMB4GA1UEAwwX&lt;br /&gt;
 Vk13YXJlIElkZW50aXR5IE1hbmFnZXIxDjAMBgNVBAoMBUxPR0lOMQswCQYDVQQG&lt;br /&gt;
 EwJVUzAeFw0yMDA3MDgwMDMzMDBaFw0zMDA3MDYwMDMzMDBaMD8xIDAeBgNVBAMM&lt;br /&gt;
 F1ZNd2FyZSBJZGVudGl0eSBNYW5hZ2VyMQ4wDAYDVQQKDAVMT0dJTjELMAkGA1UE&lt;br /&gt;
 BhMCVVMwggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQCu3PrucCHvTQhQ&lt;br /&gt;
 +g/dd3t6rNwnCsq7EEZQLgj+kv3yVaBTUvlnmxALR0jR+oHKtg3/ZRvX2R82zUyW&lt;br /&gt;
 LSe3rtxyg9iQx/0oFXjIaK65/f1KsQWrHW4knXfwf/81k1sx14DVFoF953w7jKOf&lt;br /&gt;
 N9lcOMEnWD6Oi9tF1hQ/5imW1359uL0DzOVD+OOd94fkhU+yNmH6Ag+D+YTcKUt8&lt;br /&gt;
 pdkiYLw0vMqVAU6Qh47SJrd5p2HogcibxLPm4SCJ5efui1lEWjZ3MhrKrikc5ghv&lt;br /&gt;
 4AuCbt16QADHXIo+xWgpULM1LR6uDYPkELSJXqL9ME16B640u5V82U8co1JdBxe7&lt;br /&gt;
 80pXCRky5gIP7iefefqaY5UpZUmr9AhCzMzZ0H17h1F52mIyOD83ZbonNqnCcSWB&lt;br /&gt;
 fWL/cHt7siCMvuj9OVgzHDoDrHVOCoyMJrI6jBYvTmx4kMYaycRdNdFUlcle87L6&lt;br /&gt;
 KCGqi4Nj/NOnkJ3hnSiJdbqZhGpbBRDUqsPexWoZtrUBTtybDe8CAwEAAaMQMA4w&lt;br /&gt;
 DAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAYEAdDeWzbXO7TAtOi42HAZK&lt;br /&gt;
 MW02hzqH1DbIghb0rmRQPpQmAEb5lxVW/Ly9M+HJEjiSqW8NZKdBBEtQYb5Uzuy0&lt;br /&gt;
 StNIrRTDZ5u1z0B8PbY4Jh7JVaxHWOLF3PU9r26NkRIV6ze4J+J1PuPbriZ+iWyM&lt;br /&gt;
 fU68tLee8E2Nru0FJ58ArZ+9OsREJ6ym9ic2URDqFedNncJlXhDbteiAIcxZU+JO&lt;br /&gt;
 C5zWOGsXUvIz76azxjC1rT1R+zkB7JwoTDHYIczQu2tHjiXmNyIdw98Ykc0B4o03&lt;br /&gt;
 2in+EqQwNli23A3MtMz2SCCoqGVyJB+kQb/DYxKqq3JEizOJ9nitxuneHoHaf/EL&lt;br /&gt;
 wnXW6KagH+Ag60E1XKnf/T3qURmL4/gJTfHln9h68X/cYrGS/+1tjson1GFpzDGe&lt;br /&gt;
 dBVmEA4UiiOObeKUywIWitaNazwpvjhg+2QZX3lCW8cm0d2FN5QxVBFscc7wsbim&lt;br /&gt;
 3x6WNVCqYPZgcWzo1WDw9uhNnI5nTXIgdSwo9PyGvAVC&lt;br /&gt;
 -----END CERTIFICATE-----&amp;#039;,&lt;br /&gt;
         idp_sso_target_url: &amp;#039;https://login.dersllc.com/SAAS/auth/federation/sso&amp;#039;,&lt;br /&gt;
         issuer: &amp;#039;ders-gitlab&amp;#039;,&lt;br /&gt;
         name_identifier_format: &amp;#039;urn:oasis:names:tc:SAML:2.0:nameid-format:persistent&amp;#039;&lt;br /&gt;
         },&lt;br /&gt;
     label: &amp;#039;DERs Login&amp;#039;&lt;br /&gt;
   }&lt;br /&gt;
 ]&lt;br /&gt;
&lt;br /&gt;
* Go to vIDM administrative Console&lt;br /&gt;
* Go to Catalog Tab -&amp;gt; Web Apps&lt;br /&gt;
* Click the Settings Button.&lt;br /&gt;
* Go to the SAML Metadata Tab.&lt;br /&gt;
* Copy the Signing Certificate and paste it in the idp_cert section of the gitlab.rb file.&lt;br /&gt;
* Click the Identity Provider (IdP) metadata Link.&lt;br /&gt;
* Find the following location in the metadata&lt;br /&gt;
 &amp;lt;md:SingleSignOnService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect&amp;quot; &lt;br /&gt;
 Location=&amp;quot;https://login.dersllc.com/SAAS/auth/federation/sso&amp;quot;/&amp;gt;&lt;br /&gt;
* Copy the Location URL: https://login.dersllc.com/SAAS/auth/federation/sso and paste it in the idp_sso_target_url section of the gitlab.rb file.&lt;br /&gt;
* Set the Issuer as a friendly name for your gitlab sevrer.&lt;br /&gt;
* set the assertion_consumer_service_url to &amp;#039;https://&amp;lt;gitlab_URL&amp;gt;/users/auth/saml/callback&amp;#039;&lt;br /&gt;
* Set the label as a friendly name for the button on the sign-on page.&lt;br /&gt;
* Save and Exit the gitlab.rb file. &lt;br /&gt;
* Run the reconfigure command.&lt;br /&gt;
  gitlab-ctl reconfigure&lt;br /&gt;
* After this is complete. Go back to the vIDM Administrative Console.&lt;br /&gt;
* Go to Catalog Tab -&amp;gt; Web Apps&lt;br /&gt;
* Click the New button.&lt;br /&gt;
* Create a name for the App and click next.&lt;br /&gt;
* make sure the Authentication Type is set to SAML 2.0&lt;br /&gt;
* On the gitlab server run the following to get the metadata xml for the gitlab server.&lt;br /&gt;
  curl --insecure https://gitlab.dersllc.com/users/auth/saml/metadata&lt;br /&gt;
* Copy the output and paste it into the URL/XML: section of the new app form.&lt;br /&gt;
* Click Next and Save &amp;amp; Assign. &lt;br /&gt;
* Assign users to the App and attempt to login!&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
	</entry>
</feed>