2019-09-04 21:01:54 +05:30
---
2020-05-24 23:13:21 +05:30
stage: Release
2021-02-22 17:27:13 +05:30
group: Release
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments
2019-09-04 21:01:54 +05:30
---
2021-03-11 19:13:27 +05:30
# Protected environments **(PREMIUM)**
2019-07-07 11:18:12 +05:30
2021-11-18 22:05:49 +05:30
[Environments ](../environments/index.md ) can be used for both testing and
production reasons.
2019-07-07 11:18:12 +05:30
2021-11-18 22:05:49 +05:30
Because deploy jobs can be raised by different users with different roles, it's
important to be able to protect specific environments from the effects of
unauthorized users.
2019-07-07 11:18:12 +05:30
2021-11-18 22:05:49 +05:30
By default, a protected environment ensures that only people with the
appropriate privileges can deploy to it, keeping the environment safe.
2019-07-07 11:18:12 +05:30
2021-02-22 17:27:13 +05:30
NOTE:
2021-11-18 22:05:49 +05:30
GitLab administrators can use all environments, including protected environments.
2019-07-07 11:18:12 +05:30
2021-09-04 01:27:46 +05:30
To protect, update, or unprotect an environment, you need to have at least the
2022-04-04 11:22:00 +05:30
Maintainer role.
2019-07-07 11:18:12 +05:30
## Protecting environments
To protect an environment:
2021-10-27 15:23:28 +05:30
1. On the top bar, select **Menu > Projects** and find your project.
1. On the left sidebar, select **Settings > CI/CD** .
1. Expand **Protected environments** .
1. From the **Environment** list, select the environment you want to protect.
1. In the **Allowed to deploy** list, select the role, users, or groups you
2019-07-31 22:56:46 +05:30
want to give deploy access to. Keep in mind that:
- There are two roles to choose from:
2021-10-27 15:23:28 +05:30
- **Maintainers**: Allows access to all of the project's users with the Maintainer role.
- **Developers**: Allows access to all of the project's users with the Maintainer and Developer role.
- You can select groups that are already associated with the project only.
- Users must have at least the Developer role to appear in
the **Allowed to deploy** list.
2022-04-04 11:22:00 +05:30
1. In the **Required approvals** list, select the number of approvals required to deploy to this environment.
- Ensure that this number is less than the number of users allowed to deploy.
- See [Deployment Approvals ](deployment_approvals.md ) for more information about this feature.
2021-10-27 15:23:28 +05:30
1. Select **Protect** .
2019-07-07 11:18:12 +05:30
2021-03-08 18:12:59 +05:30
The protected environment now appears in the list of protected environments.
2019-07-07 11:18:12 +05:30
2021-01-29 00:20:46 +05:30
### Use the API to protect an environment
Alternatively, you can use the API to protect an environment:
1. Use a project with a CI that creates an environment. For example:
```yaml
stages:
- test
- deploy
test:
stage: test
script:
- 'echo "Testing Application: ${CI_PROJECT_NAME}"'
production:
stage: deploy
when: manual
script:
- 'echo "Deploying to ${CI_ENVIRONMENT_NAME}"'
2021-04-29 21:17:54 +05:30
environment:
name: ${CI_JOB_NAME}
2021-01-29 00:20:46 +05:30
```
2021-04-17 20:07:23 +05:30
1. Use the UI to [create a new group ](../../user/group/index.md#create-a-group ).
2021-01-29 00:20:46 +05:30
For example, this group is called `protected-access-group` and has the group ID `9899826` . Note
that the rest of the examples in these steps use this group.
![Group Access ](img/protected_access_group_v13_6.png )
1. Use the API to add a user to the group as a reporter:
```shell
2021-09-04 01:27:46 +05:30
$ curl --request POST --header "PRIVATE-TOKEN: < your_access_token > " \
--data "user_id=3222377& access_level=20" "https://gitlab.com/api/v4/groups/9899826/members"
2021-01-29 00:20:46 +05:30
2022-01-26 12:08:38 +05:30
{"id":3222377,"name":"Sean Carroll","username":"sfcarroll","state":"active","avatar_url":"https://gitlab.com/uploads/-/system/user/avatar/3222377/avatar.png","web_url":"https://gitlab.com/sfcarroll","access_level":20,"created_at":"2020-10-26T17:37:50.309Z","expires_at":null}
2021-01-29 00:20:46 +05:30
```
1. Use the API to add the group to the project as a reporter:
```shell
2021-09-04 01:27:46 +05:30
$ curl --request POST --header "PRIVATE-TOKEN: < your_access_token > " \
--request POST "https://gitlab.com/api/v4/projects/22034114/share?group_id=9899826& group_access=20"
2021-01-29 00:20:46 +05:30
{"id":1233335,"project_id":22034114,"group_id":9899826,"group_access":20,"expires_at":null}
```
1. Use the API to add the group with protected environment access:
```shell
2022-04-04 11:22:00 +05:30
curl --header 'Content-Type: application/json' --request POST --data '{"name": "production", "deploy_access_levels": [{"group_id": 9899826}], "required_approval_count": 0}' \
2021-09-04 01:27:46 +05:30
--header "PRIVATE-TOKEN: < your_access_token > " "https://gitlab.com/api/v4/projects/22034114/protected_environments"
2021-01-29 00:20:46 +05:30
```
The group now has access and can be seen in the UI.
2020-11-24 15:15:51 +05:30
## Environment access by group membership
2021-12-11 22:18:48 +05:30
A user may be granted access to protected environments as part of [group membership ](../../user/group/index.md ). Users
2022-04-04 11:22:00 +05:30
with the Reporter role can only be granted access to protected environments with this
2021-12-11 22:18:48 +05:30
method.
2020-11-24 15:15:51 +05:30
## Deployment branch access
2022-04-04 11:22:00 +05:30
Users with the Developer role can be granted
2020-11-24 15:15:51 +05:30
access to a protected environment through any of these methods:
- As an individual contributor, through a role.
- Through a group membership.
If the user also has push or merge access to the branch deployed on production,
they have the following privileges:
2021-10-27 15:23:28 +05:30
- [Stop an environment ](index.md#stop-an-environment ).
2020-11-24 15:15:51 +05:30
- [Delete a stopped environment ](index.md#delete-a-stopped-environment ).
2021-12-11 22:18:48 +05:30
- [Create an environment terminal ](index.md#web-terminals-deprecated ).
2020-11-24 15:15:51 +05:30
## Deployment-only access to protected environments
Users granted access to a protected environment, but not push or merge access
2021-04-17 20:07:23 +05:30
to the branch deployed to it, are only granted access to deploy the environment. An individual in a
2022-04-04 11:22:00 +05:30
group with the Reporter role, or in groups added to the project with the Reporter
2021-12-11 22:18:48 +05:30
role, appears in the dropdown menu for deployment-only access.
2020-11-24 15:15:51 +05:30
2021-04-17 20:07:23 +05:30
To add deployment-only access:
2021-10-27 15:23:28 +05:30
1. Add a group with the Reporter role.
1. Add users to the group.
2021-04-17 20:07:23 +05:30
1. Invite the group to be a project member.
2021-10-27 15:23:28 +05:30
1. Follow the steps in [Protecting Environments ](#protecting-environments ).
2021-04-17 20:07:23 +05:30
2021-12-11 22:18:48 +05:30
Note that deployment-only access is the only possible access level for groups with the Reporter
2022-04-04 11:22:00 +05:30
role.
2020-11-24 15:15:51 +05:30
2019-07-07 11:18:12 +05:30
## Modifying and unprotecting environments
Maintainers can:
2019-07-31 22:56:46 +05:30
- Update existing protected environments at any time by changing the access in the
**Allowed to Deploy** dropdown menu.
- Unprotect a protected environment by clicking the **Unprotect** button for that environment.
2019-09-04 21:01:54 +05:30
2020-11-24 15:15:51 +05:30
After an environment is unprotected, all access entries are deleted and must
be re-entered if the environment is re-protected.
2020-06-23 00:09:42 +05:30
For more information, see [Deployment safety ](deployment_safety.md ).
2021-09-04 01:27:46 +05:30
## Group-level protected environments
2021-11-18 22:05:49 +05:30
> - Introduced in GitLab 14.0 [with a flag](https://gitlab.com/gitlab-org/gitlab/-/issues/215888) named `group_level_protected_environments`. Disabled by default.
> - [Feature flag removed](https://gitlab.com/gitlab-org/gitlab/-/issues/331085) in GitLab 14.3.
> - [Generally available](https://gitlab.com/gitlab-org/gitlab/-/issues/331085) in GitLab 14.3.
2021-09-04 01:27:46 +05:30
Typically, large enterprise organizations have an explicit permission boundary
between [developers and operators ](https://about.gitlab.com/topics/devops/ ).
Developers build and test their code, and operators deploy and monitor the
application. With group-level protected environments, the permission of each
group is carefully configured in order to prevent unauthorized access and
maintain proper separation of duty. Group-level protected environments
extend the [project-level protected environments ](#protecting-environments )
to the group-level.
The permissions of deployments can be illustrated in the following table:
| Environment | Developer | Operator | Category |
|-------------|------------|----------|----------|
| Development | Allowed | Allowed | Lower environment |
| Testing | Allowed | Allowed | Lower environment |
| Staging | Disallowed | Allowed | Higher environment |
| Production | Disallowed | Allowed | Higher environment |
_(Reference: [Deployment environments on Wikipedia ](https://en.wikipedia.org/wiki/Deployment_environment ))_
### Group-level protected environments names
Contrary to project-level protected environments, group-level protected
environments use the [deployment tier ](index.md#deployment-tier-of-environments )
as their name.
A group may consist of many project environments that have unique names.
For example, Project-A has a `gprd` environment and Project-B has a `Production`
environment, so protecting a specific environment name doesn't scale well.
By using deployment tiers, both are recognized as `production` deployment tier
and are protected at the same time.
### Configure group-level memberships
In an enterprise organization, with thousands of projects under a single group,
ensuring that all of the [project-level protected environments ](#protecting-environments )
are properly configured is not a scalable solution. For example, a developer
2022-04-04 11:22:00 +05:30
might gain privileged access to a higher environment when they are given the Maintainer role
2022-01-26 12:08:38 +05:30
for a new project. Group-level protected environments can be a solution in this situation.
2021-09-04 01:27:46 +05:30
To maximize the effectiveness of group-level protected environments,
[group-level memberships ](../../user/group/index.md ) must be correctly
configured:
2022-04-04 11:22:00 +05:30
- Operators should be given at least the Maintainer role
2022-01-26 12:08:38 +05:30
for the top-level group. They can maintain CI/CD configurations for
2021-09-04 01:27:46 +05:30
the higher environments (such as production) in the group-level settings page,
2021-10-27 15:23:28 +05:30
which includes group-level protected environments,
2021-11-18 22:05:49 +05:30
[group-level runners ](../runners/runners_scope.md#group-runners ), and
[group-level clusters ](../../user/group/clusters/index.md ). Those
2021-09-04 01:27:46 +05:30
configurations are inherited to the child projects as read-only entries.
This ensures that only operators can configure the organization-wide
deployment ruleset.
2022-04-04 11:22:00 +05:30
- Developers should be given no more than the Developer role
for the top-level group, or explicitly given the Maintainer role for a child project
2022-01-26 12:08:38 +05:30
They do *NOT* have access to the CI/CD configurations in the
2021-09-04 01:27:46 +05:30
top-level group, so operators can ensure that the critical configuration won't
be accidentally changed by the developers.
- For sub-groups and child projects:
- Regarding [sub-groups ](../../user/group/subgroups/index.md ), if a higher
group has configured the group-level protected environment, the lower groups
cannot override it.
- [Project-level protected environments ](#protecting-environments ) can be
combined with the group-level setting. If both group-level and project-level
2021-10-27 15:23:28 +05:30
environment configurations exist, to run a deployment job, the user must be allowed in **both**
rulesets.
- In a project or a subgroup of the top-level group, developers can be
2022-04-04 11:22:00 +05:30
safely assigned the Maintainer role to tune their lower environments (such
2021-09-04 01:27:46 +05:30
as `testing` ).
Having this configuration in place:
- If a user is about to run a deployment job in a project and allowed to deploy
to the environment, the deployment job proceeds.
- If a user is about to run a deployment job in a project but disallowed to
deploy to the environment, the deployment job fails with an error message.
### Protect a group-level environment
To protect a group-level environment:
1. Make sure your environments have the correct
[`deployment_tier` ](index.md#deployment-tier-of-environments ) defined in
2021-11-11 11:23:49 +05:30
`.gitlab-ci.yml` .
2021-11-18 22:05:49 +05:30
1. Configure the group-level protected environments by using the
2021-09-04 01:27:46 +05:30
[REST API ](../../api/group_protected_environments.md ).
NOTE:
2021-11-18 22:05:49 +05:30
Configuration [with the UI ](https://gitlab.com/gitlab-org/gitlab/-/issues/325249 )
2021-09-04 01:27:46 +05:30
is scheduled for a later release.
2022-03-02 08:16:31 +05:30
## Deployment approvals
Protected environments can also be used to require manual approvals before deployments. See [Deployment approvals ](deployment_approvals.md ) for more information.
2019-09-04 21:01:54 +05:30
<!-- ## Troubleshooting
Include any troubleshooting steps that you can foresee. If you know beforehand what issues
one might have when setting this up, or when something is changed, or on upgrading, it's
important to describe those, too. Think of things that may go wrong and include them here.
This is important to minimize requests for support, and to avoid doc comments with
questions that you know someone might ask.
Each scenario can be a third-level heading, e.g. `### Getting error message X` .
If you have none to add when creating a doc, leave this section in place
but commented out to help encourage others to add to it in the future. -->