doc/administration/auth/atlassian.md
{{< details >}}
{{< /details >}}
To enable the Atlassian OmniAuth provider for passwordless authentication you must register an application with Atlassian.
Client ID and Secret for the GitLab configuration steps.https://gitlab.example.com/users/auth/atlassian_oauth2/callback and select Save changes.On your GitLab server, open the configuration file:
For Linux package installations:
sudo editor /etc/gitlab/gitlab.rb
For self-compiled installations:
sudo -u git -H editor /home/git/gitlab/config/gitlab.yml
Configure the common settings
to add atlassian_oauth2 as a single sign-on provider. This enables
Just-In-Time account provisioning for users who do not have an existing
GitLab account.
Add the provider configuration for Atlassian:
For Linux package installations:
gitlab_rails['omniauth_providers'] = [
{
name: "atlassian_oauth2",
# label: "Provider name", # optional label for login button, defaults to "Atlassian"
app_id: "<your_client_id>",
app_secret: "<your_client_secret>",
args: { scope: "offline_access read:jira-user read:jira-work", prompt: "consent" }
}
]
For self-compiled installations:
- { name: "atlassian_oauth2",
# label: "Provider name", # optional label for login button, defaults to "Atlassian"
app_id: "<your_client_id>",
app_secret: "<your_client_secret>",
args: { scope: "offline_access read:jira-user read:jira-work", prompt: "consent" }
}
Change <your_client_id> and <your_client_secret> to the Client credentials you received during application registration.
Save the configuration file.
For the changes to take effect:
On the sign-in page there should now be an Atlassian icon below the regular sign in form. Select the icon to begin the authentication process.
If everything goes right, the user is signed in to GitLab using their Atlassian credentials.