debian-mirror-gitlab/doc/user/group/saml_sso/group_managed_accounts.md

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

124 lines
6.8 KiB
Markdown
Raw Normal View History

2020-07-28 23:09:34 +05:30
---
type: reference, howto
stage: Manage
2022-04-04 11:22:00 +05:30
group: Authentication and Authorization
2021-02-22 17:27:13 +05:30
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments
2020-07-28 23:09:34 +05:30
---
# Group Managed Accounts **(PREMIUM)**
2021-02-22 17:27:13 +05:30
WARNING:
2020-11-24 15:15:51 +05:30
This [Closed Beta](https://about.gitlab.com/handbook/product/gitlab-the-product/#sts=Closed%20Beta) feature is being re-evaluated in favor of a different
2021-03-11 19:13:27 +05:30
[approach](https://gitlab.com/groups/gitlab-org/-/epics/4786) that aligns more closely with our [Subscription Agreement](https://about.gitlab.com/handbook/legal/subscription-agreement/).
We recommend that group owners who haven't yet implemented this feature wait for the new solution.
2020-07-28 23:09:34 +05:30
> - [Introduced](https://gitlab.com/groups/gitlab-org/-/epics/709) in GitLab 12.1.
> - It's deployed behind a feature flag, disabled by default.
2020-10-24 23:57:45 +05:30
When [SSO for Groups](index.md) is enforced, groups can enable an additional level of protection by enforcing the creation of dedicated user accounts to access the group.
2020-07-28 23:09:34 +05:30
With group-managed accounts enabled, users are required to create a new, dedicated user linked to the group.
The notification email address associated with the user is locked to the email address received from the configured identity provider.
Without group-managed accounts, users can link their SAML identity with any existing user on the instance.
When this option is enabled:
2020-10-24 23:57:45 +05:30
- All users in the group are required to log in via the SSO URL associated with the group.
- After the group-managed account has been created, group activity requires the use of this user account.
2020-07-28 23:09:34 +05:30
- Users can't share a project in the group outside the top-level group (also applies to forked projects).
Upon successful authentication, GitLab prompts the user with options, based on the email address received from the configured identity provider:
- To create a unique account with the newly received email address.
- If the received email address matches one of the user's verified GitLab email addresses, the option to convert the existing account to a group-managed account. ([Introduced in GitLab 12.9](https://gitlab.com/gitlab-org/gitlab/-/issues/13481).)
2020-10-24 23:57:45 +05:30
Since use of the group-managed account requires the use of SSO, users of group-managed accounts lose access to these accounts when they are no longer able to authenticate with the connected identity provider. In the case of an offboarded employee who has been removed from your identity provider:
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
- The user is unable to access the group (their credentials no longer work on the identity provider when prompted to use SSO).
- Contributions in the group (for example, issues and merge requests) remains intact.
2020-07-28 23:09:34 +05:30
2021-04-17 20:07:23 +05:30
Please refer to our [SAML SSO for Groups page](../index.md) for information on how to configure SAML.
2020-07-28 23:09:34 +05:30
2021-03-11 19:13:27 +05:30
## Feature flag **(PREMIUM SELF)**
2020-07-28 23:09:34 +05:30
2021-03-08 18:12:59 +05:30
The group-managed accounts feature is behind these feature flags: `group_managed_accounts`, `sign_up_on_sso` and `convert_user_to_group_managed_accounts`. The flags are disabled by default.
2020-07-28 23:09:34 +05:30
To activate the feature, ask a GitLab administrator with Rails console access to run:
```ruby
Feature.enable(:group_managed_accounts)
2021-03-08 18:12:59 +05:30
Feature.enable(:sign_up_on_sso)
Feature.enable(:convert_user_to_group_managed_accounts)
2020-07-28 23:09:34 +05:30
```
## Project restrictions for Group-managed accounts
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/12420) in GitLab 12.9.
Projects within groups with enabled group-managed accounts are not to be shared with:
- Groups outside of the parent group.
- Members who are not users managed by this group.
This restriction also applies to projects forked from or to those groups.
## Outer forks restriction for Group-managed accounts
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/34648) in GitLab 12.9.
2022-05-07 20:08:51 +05:30
Groups with group-managed accounts can prevent forking of projects to destinations outside the group.
2020-07-28 23:09:34 +05:30
To do so, enable the "Prohibit outer forks" option in **Settings > SAML SSO**.
2020-11-24 15:15:51 +05:30
When enabled **at the parent group level**, projects within the group can be forked
only to other destinations within the group (including its subgroups).
2020-07-28 23:09:34 +05:30
## Credentials inventory for Group-managed accounts **(ULTIMATE)**
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/38133) in GitLab 12.8.
Owners who manage user accounts in a group can view the following details of personal access tokens and SSH keys:
- Owners
- Scopes
- Usage patterns
To access the Credentials inventory of a group, navigate to **{shield}** **Security & Compliance > Credentials** in your group's sidebar.
This feature is similar to the [Credentials inventory for self-managed instances](../../admin_area/credentials_inventory.md).
2021-04-29 21:17:54 +05:30
### Revoke a group-managed account's personal access token
> - [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/214811) in GitLab 13.5.
> - [Feature flag removed](https://gitlab.com/gitlab-org/gitlab/-/issues/267184) in GitLab 13.10.
Group owners can revoke the personal access tokens of accounts in their group. To do so, select
the Personal Access Tokens tab, and select Revoke.
When a personal access token is revoked, the group-managed account user is notified by email.
2020-07-28 23:09:34 +05:30
## Limiting lifetime of personal access tokens of users in Group-managed accounts **(ULTIMATE)**
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/118893) in GitLab 12.10.
Users in a group managed account can optionally specify an expiration date for
[personal access tokens](../../profile/personal_access_tokens.md).
This expiration date is not a requirement, and can be set to any arbitrary date.
Since personal access tokens are the only token needed for programmatic access to GitLab, organizations with security requirements may want to enforce more protection to require regular rotation of these tokens.
2021-06-08 01:23:25 +05:30
### Set a limit
2020-07-28 23:09:34 +05:30
2021-06-08 01:23:25 +05:30
Only a GitLab administrator or an owner of a group-managed account can set a limit. When this field
2022-07-16 23:28:13 +05:30
is left empty, the [instance-level restriction](../../admin_area/settings/account_and_limit_settings.md#limit-the-lifetime-of-access-tokens)
2021-06-08 01:23:25 +05:30
on the lifetime of personal access tokens apply.
2020-07-28 23:09:34 +05:30
To set a limit on how long personal access tokens are valid for users in a group managed account:
2020-10-24 23:57:45 +05:30
1. Navigate to the **Settings > General** page in your group's sidebar.
2022-03-02 08:16:31 +05:30
1. Expand the **Permissions and group features** section.
2022-07-16 23:28:13 +05:30
1. Fill in the **Maximum allowable lifetime for access tokens (days)** field.
2020-07-28 23:09:34 +05:30
1. Click **Save changes**.
2020-10-24 23:57:45 +05:30
Once a lifetime for personal access tokens is set:
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
- GitLab applies the lifetime for new personal access tokens and requires users managed by the group to set an expiration date that's no later than the allowed lifetime.
2020-07-28 23:09:34 +05:30
- After three hours, revoke old tokens with no expiration date or with a lifetime longer than the allowed lifetime. Three hours is given to allow administrators/group owner to change the allowed lifetime, or remove it, before revocation takes place.