doc/administration/dedicated/configure_instance/authentication/saml.md
{{< details >}}
{{< /details >}}
You can configure SAML single sign-on (SSO) for your GitLab Dedicated instance for up to ten identity providers (IdPs).
The following SAML SSO options are available:
[!note] This configures SAML SSO for end users of your GitLab Dedicated instance. To configure SSO for Switchboard administrators, see configure Switchboard SSO.
To add a SAML provider for your GitLab Dedicated instance:
X.509 certificate fingerprint.After the changes are applied, you can sign in to your GitLab Dedicated instance using this SAML provider. To use group sync, configure the SAML group links.
To verify that your SAML configuration is successful:
https://INSTANCE-URL/users/auth/saml/metadata).
The metadata URL shows information that can simplify configuration of your identity provider
and helps validate your SAML settings.If troubleshooting information, see troubleshooting SAML.
If you are unable to use Switchboard to add or update SAML for your GitLab Dedicated instance, then you can open a support ticket:
To make the necessary changes, include the desired SAML configuration block for your GitLab application in your support ticket. At a minimum, GitLab needs the following information to enable SAML for your instance:
"saml": {
"attribute_statements": {
//optional
},
"enabled": true,
"groups_attribute": "",
"admin_groups": [
// optional
],
"idp_cert_fingerprint": "43:51:43:a1:b5:fc:8b:b7:0a:3a:a9:b1:0f:66:73:a8",
"idp_sso_target_url": "https://login.example.com/idp",
"label": "IDP Name",
"name_identifier_format": "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent",
"security": {
// optional
},
"auditor_groups": [
// optional
],
"external_groups": [
// optional
],
"required_groups": [
// optional
],
}
After GitLab deploys the SAML configuration to your instance, you are notified on your support ticket.
To verify the SAML configuration is successful:
If SAML request signing is desired, a certificate must be obtained. This certificate can be self-signed which has the advantage of not having to prove ownership of an arbitrary Common Name (CN) to a public Certificate Authority (CA).
[!note] Because SAML request signing requires certificate signing, you must complete these steps to use SAML with this feature enabled.
To enable SAML request signing:
security section of the SAML configuration in Switchboard.Authentication requests from GitLab to your identity provider can now be signed.
With SAML groups you can configure GitLab users based on SAML group membership.
To enable SAML groups, add the required elements to your SAML configuration in Switchboard or to the SAML block you provide in a support ticket.
With group sync, you can sync users across identity provider groups to mapped groups in GitLab.
To enable group sync: