Hello there!

Need Help? We are right here!

Support Icon
miniOrange Email Support
success

Thanks for your Enquiry. Our team will soon reach out to you.

If you don't hear from us within 24 hours, please feel free to send a follow-up email to info@xecurify.com

Search Results:

Ă—

Set up SSO for Apps Using GitLab as IDP


Enable Single Sign-On (SSO) login for your application, you can set up GitLab as the Identity Provider (IDP) with miniOrange as a broker. miniOrange provides a pre-built solution that simplifies the integration of GitLab SSO, allowing for a smooth implementation process.

In this setup, GitLab will handle user authentication, while miniOrange will facilitate communication between GitLab and the other applications acting as SP.

Get Free Installation Help


miniOrange offers free help through a consultation call with our System Engineers to configure SSO for different apps using GitLab as IDP in your environment with 30-day free trial.

For this, you need to just send us an email at idpsupport@xecurify.com to book a slot and we'll help you in no time.



Prerequisites

Please make sure your organisation branding is already set under Customization >> Login and Registration Branding in the left menu of the dashboard.


Follow the Step-by-Step Guide given below for GitLab Single Sign-On (SSO)

1. Configure miniOrange as Service Provider (SP) in GitLab

  • Go to miniOrange Admin Console.
  • From the left navigation bar, select Identity Providers >> click Add Identity Provider.
  • GitLab SSO : Go to Identity Providers

  • Switch to OAuth 2.0 and copy the OAuth Callback URL, this will be required for GitLab configuration.
  • GitLab Single Sign On : Select OAuth 2.0

  • Log in to the GitLab console (or sign up if needed).
  • In the left sidebar, go to avatar >> Edit profile.
  • Gitlab as IDP: Select avatar and click Edit Profile

  • On the left sidebar, select Applications >> click Add new application.
  • Gitlab as IDP: Select Applications and click Add new application

  • Enter a Name for the application and paste the copied OAuth Callback URL in the Redirect URI field.
  • Make sure you choose the scope that fits your need.
    Most importantly, the scope chosen here should also be same as the entry on the miniOrange OAuth​ Configuration.
  • Gitlab as IDP: Enter name and redirect uri

    GitLab as IDP: Scope Selection

  • Click Save application, then copy the generated Application ID (Client ID) and Secret (Client Secret).
  • GitLab as IDP: Copy Application ID and Secret

  • Click Continue to complete the configuration.

2. Configure GitLab as OAuth 2.0 Provider in miniOrange.

  • Go to miniOrange Admin Console.
  • From the left navigation bar select Identity Providers >> Add Identity Provider. Select OAuth 2.0.
  • GitLab SSO : Select Identity Providers >> click Add Identity Provider

    Select OAuth to setup GitLab as IDP : Select OAuth 2.0

  • Enter the following values.
    IdP Name Choose Custom Provider from dropdown.
    IdP Display Name Choose appropriate Name
    OAuth Authorize Endpoint https://gitlab.com/oauth/authorize
    OAuth Access Token Endpoint https://gitlab.com/oauth/token
    OAuth Get User Info Endpoint (optional) https://gitlab.com/api/v4/user
    Client ID From step 1
    Client secret From step 1
    Scope read_user

3. Test Connection

  • Visit your Login Page URL.
  • Go to Identity Providers tab.
  • Click on Select >> Test Connection option against the Identity Provider (IDP) you configured.
  • GitLab-IDP-TestConnection

  • On entering valid GitLab credentials (credentials of user assigned to app created in GitLab), you will see a pop-up window which is shown in the below screen.
  • SucessTestConn-GitLab-IDP

  • Hence your configuration of GitLab as IDP in miniOrange is successfully completed.

Note:

You can follow this guide, if you want to configure SAML/WS-FED, OAuth/OIDC, JWT, Radius etc


Configure Attribute Mapping

  • Go to Identity Providers >> View Identity Providers >> Your configured GitLab as IdP.
  • Now click on Select and then Configure Attribute Mapping of your application.
  • GitLab Single Sign-On SSO Select and Configure Attribute Mapping

  • Under Attribute Type - EXTERNAL for the external attributes that need to be transformed and sent to applications or service providers.
  • Click on the + Add Attribute button to add the attribute fields.
  • GitLab Single Sign-On SSO Map External Attribute

  • Check attributes in test connection window from last step. Enter the attribute names (any name) that you want to send to your application under Attribute Name sent to SP.
  • Enter the value of attributes that are coming from IdP into the Attribute Name from IdP field on the Xecurify side.

Configure Multiple IDPs:

You can follow this guide, if you want to configure multiple IDPs (Identity Providers) and give users the option to select the IDP of their choice to authenticate with.


External References

Want To Schedule A Demo?

Request a Demo
  



Our Other Identity & Access Management Products