doc/user/enterprise_user/_index.md
{{< details >}}
{{< /details >}}
Enterprise users are similar to standard GitLab users, but are administered by an organization. Each enterprise user is claimed and managed by a specific top-level group. To claim enterprise users, you must verify a group domain and have an active subscription.
If the subscription expires or is canceled:
To claim GitLab.com users as enterprise users, you must add and verify ownership of a domain. Group domains are added to the top-level group and apply to all subgroups and projects in the group.
While each group can have multiple domains, you can associate each domain with only one group at a time. If you move your domain to another paid group, all enterprise users are automatically claimed by the new group.
Group domains are linked to a project in your top-level group. The linked project needs to have GitLab Pages enabled to verify the domain, but does not need to create or deploy a GitLab Pages website. On GitLab.com, GitLab Pages is enabled by default for all projects, so no configuration is required.
Even though the domain is linked to a project, it is available to the entire group hierarchy including all nested subgroups and projects. Members in the linked project with the Maintainer or Owner role can modify or remove the domain. If this project is deleted, your associated domains are also removed.
For more information on group domains, see epic 5299.
Prerequisites:
example.com or subdomain subdomain.example.com that matches the email domain you want to verify.TXT records for your domain to prove ownership.To add a custom domain for a group:
In the top bar, select Search or go to and find your group.
Select Settings > Domain Verification.
In the upper-right corner, select Add Domain.
Configure the domain settings:
If you do not have or do not want to use an SSL/TLS certificate, select Automatic certificate management using Let's Encrypt.
If you want to provide your own SSL/TLS certificate, select Manually enter certificate information. You can also add a certificate and key later.
[!note] A valid certificate is not required for domain verification. You can ignore self-signed certificate warnings if you are not using GitLab Pages.
Select Add Domain. GitLab saves the domain information.
Verify ownership of the domain:
TXT record.After successful verification, the domain status changes to Verified and can be used for enterprise user management.
[!note] Generally, DNS propagation completes in a few minutes, but can take up to 24 hours. Until it completes, the domain remains unverified in GitLab.
If the domain is still unverified after seven days, GitLab automatically removes the domain.
After verification, GitLab periodically reverifies the domain. To avoid potential issues, maintain the
TXTrecord on your domain provider.
To view all custom domains for a group:
To edit a custom domain for a group:
From here, you can:
Deleting a group domain can impact enterprise users in your group. After you delete the domain:
To delete a custom domain for a group:
In addition to the standard group member permissions, Owners of a top-level group can also manage enterprise users in their group.
You can also use the API to interact with enterprise users.
Prerequisites:
provisioned_by_group_id attribute that matches the group ID.After a group verifies ownership of a domain, users with an email address from a domain are automatically claimed by the group as enterprise users. No direct action is needed from group Owners.
Any existing group members with an email address from a different domain retain their existing access, but can not be managed by group Owners. To claim these users, they must update their primary email address to match your group domain.
The claim process can take up to four days to trigger. You can immediately run this process by manually re-verifying the group domain.
After a group claims an enterprise user:
enterprise_group_id attribute.You can identify enterprise users from the members list.
All enterprise users have an Enterprise badge next to their names.
You can discover any non-enterprise group members by analyzing the list of billable users at:
https://gitlab.com/groups/<group_id>/-/usage_quotas#seats-quota-tab.
From this list, non-enterprise users have one of the following:
You can restrict the specific authentication methods available to enterprise users, which can help reduce the security footprint of your users.
You can prevent enterprise users from creating personal snippets in their personal namespace. For more information, see Restrict personal snippets for enterprise users.
You can restrict group and project creation for enterprise users, which helps you define:
These restrictions are defined in the SAML response. For more information, see configure enterprise user settings from the SAML response.
By default, users provisioned with SAML or SCIM are sent a verification email to verify their identity. Instead, you can configure GitLab with a custom domain and GitLab automatically confirms user accounts. Users still receive an enterprise user welcome email.
For more information, see bypass user email confirmation with verified domains.
Prerequisites:
To view an enterprise user's email address:
You can also use the group members API and project members API to access users' information. For enterprise users of the group, this information includes users' email addresses.
Enterprise users can follow the same process as other GitLab users to change their primary email address. The new email address must be from a verified domain. If your organization has no verified domains, your enterprise users cannot change their primary email address.
Group Owners can modify the email address for enterprise users in their group with the group enterprise users API.
Only GitLab support can change the primary email address to an email address from a non-verified domain. This action releases the enterprise user.
Prerequisites:
You can use the group enterprise users API to delete an enterprise user and permanently remove the account from GitLab. This action is different from releasing the user which only removes the enterprise management features from the user. When you delete the user, you can choose to either:
You can remove enterprise management features from enterprise user accounts. You might need to do this if, for example, a user wants to keep their GitLab account after leaving their company. When you release a user, their account roles and permissions remain the same, but the group Owner loses management options for that user. For example, the released user can access authentication methods that the group Owner previously disabled.
If you need to permanently remove the account, delete the user instead.
To release an individual enterprise user from your group, GitLab support must update the user's primary email address to an email from a non-verified domain. This action automatically releases the account.
To release all claimed enterprise users, you can delete the group itself rather than the group domain. This is useful for organizations testing the enterprise user functionality.
Allowing group Owners to change primary emails is proposed in issue 412966.
{{< history >}}
web_ide_oauth and web_ide_extensions_marketplace. Disabled by default.web_ide_oauth enabled on GitLab.com, GitLab Self-Managed, and GitLab Dedicated in GitLab 17.4.web_ide_extensions_marketplace enabled on GitLab.com in GitLab 17.4.web_ide_oauth removed in GitLab 17.5.vscode_extension_marketplace_settings feature flag in GitLab 17.10. Disabled by default.web_ide_extensions_marketplace enabled on GitLab Self-Managed, and vscode_extension_marketplace_settings enabled on GitLab.com and GitLab Self-Managed in GitLab 17.11.web_ide_extensions_marketplace and vscode_extension_marketplace_settings removed.{{< /history >}}
The VS Code Extension Marketplace provides access to extensions that enhance the functionality of the Web IDE and Workspaces. Top-level group Owners can control access to the marketplace for enterprise users in their group.
Prerequisites:
To enable the Extension Marketplace for enterprise users:
If a user does not have an Enterprise badge, a group Owner cannot disable or reset 2FA for their account. Instead, the Owner should tell the enterprise user to consider available recovery options.