Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
d2f6785b
Commit
d2f6785b
authored
Apr 01, 2020
by
Marcel Amirault
Committed by
Mike Jang
Apr 01, 2020
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Remove square brackets and fix orphaned links
parent
605cebf5
Changes
3
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
30 additions
and
45 deletions
+30
-45
doc/administration/auth/ldap-ee.md
doc/administration/auth/ldap-ee.md
+13
-7
doc/administration/auth/ldap-troubleshooting.md
doc/administration/auth/ldap-troubleshooting.md
+14
-35
doc/user/application_security/container_scanning/index.md
doc/user/application_security/container_scanning/index.md
+3
-3
No files found.
doc/administration/auth/ldap-ee.md
View file @
d2f6785b
...
@@ -43,7 +43,13 @@ The process will execute the following access checks:
...
@@ -43,7 +43,13 @@ The process will execute the following access checks:
-
Ensure the user is still present in LDAP.
-
Ensure the user is still present in LDAP.
-
If the LDAP server is Active Directory, ensure the user is active (not
-
If the LDAP server is Active Directory, ensure the user is active (not
blocked/disabled state). This will only be checked if
blocked/disabled state). This will only be checked if
`active_directory: true`
is set in the LDAP configuration. [^1]
`active_directory: true`
is set in the LDAP configuration.
NOTE:
**Note:**
In Active Directory, a user is marked as disabled/blocked if the user
account control attribute (
`userAccountControl:1.2.840.113556.1.4.803`
)
has bit 2 set. See
<https://ctogonewild.com/2009/09/03/bitmask-searches-in-ldap/>
for more information.
The user will be set to
`ldap_blocked`
state in GitLab if the above conditions
The user will be set to
`ldap_blocked`
state in GitLab if the above conditions
fail. This means the user will not be able to login or push/pull code.
fail. This means the user will not be able to login or push/pull code.
...
@@ -93,7 +99,7 @@ following.
...
@@ -93,7 +99,7 @@ following.
EOS
EOS
```
```
1.
[
Reconfigure GitLab
][
reconfigure
]
for the changes to take effect
.
1.
[
Apply your changes to GitLab
](
../restart_gitlab.md#omnibus-gitlab-reconfigure
)
.
**Source configuration**
**Source configuration**
...
@@ -108,7 +114,7 @@ following.
...
@@ -108,7 +114,7 @@ following.
group_base
:
ou=groups,dc=example,dc=com
group_base
:
ou=groups,dc=example,dc=com
```
```
1.
[
Restart GitLab
]
[
restart
]
for the changes to take effect.
1.
[
Restart GitLab
]
(
../restart_gitlab.md#installations-from-source
)
for the changes to take effect.
To take advantage of group sync, group owners or maintainers will need to
[
create one
To take advantage of group sync, group owners or maintainers will need to
[
create one
or more LDAP group links
](
#adding-group-links
)
.
or more LDAP group links
](
#adding-group-links
)
.
...
@@ -183,7 +189,7 @@ group, as opposed to the full DN.
...
@@ -183,7 +189,7 @@ group, as opposed to the full DN.
EOS
EOS
```
```
1.
[
Reconfigure GitLab
][
reconfigure
]
for the changes to take effect
.
1.
[
Apply your changes to GitLab
](
../restart_gitlab.md#omnibus-gitlab-reconfigure
)
.
**Source configuration**
**Source configuration**
...
@@ -199,7 +205,7 @@ group, as opposed to the full DN.
...
@@ -199,7 +205,7 @@ group, as opposed to the full DN.
admin_group
:
my_admin_group
admin_group
:
my_admin_group
```
```
1.
[
Restart GitLab
]
[
restart
]
for the changes to take effect.
1.
[
Restart GitLab
]
(
../restart_gitlab.md#installations-from-source
)
for the changes to take effect.
## Global group memberships lock
## Global group memberships lock
...
@@ -318,7 +324,7 @@ task.
...
@@ -318,7 +324,7 @@ task.
EOS
EOS
```
```
1.
[
Reconfigure GitLab
][
reconfigure
]
for the changes to take effect
.
1.
[
Apply your changes to GitLab
](
../restart_gitlab.md#omnibus-gitlab-reconfigure
)
.
**Source configuration**
**Source configuration**
...
@@ -333,7 +339,7 @@ task.
...
@@ -333,7 +339,7 @@ task.
external_groups
:
[
'
interns'
,
'
contractors'
]
external_groups
:
[
'
interns'
,
'
contractors'
]
```
```
1.
[
Restart GitLab
]
[
restart
]
for the changes to take effect.
1.
[
Restart GitLab
]
(
../restart_gitlab.md#installations-from-source
)
for the changes to take effect.
## Group sync technical details
## Group sync technical details
...
...
doc/administration/auth/ldap-troubleshooting.md
View file @
d2f6785b
...
@@ -84,7 +84,7 @@ following is most likely true:
...
@@ -84,7 +84,7 @@ following is most likely true:
-
The
`bind_dn`
user doesn't have enough permissions to traverse the user tree.
-
The
`bind_dn`
user doesn't have enough permissions to traverse the user tree.
-
The user(s) don't fall under the
[
configured `base`
](
ldap.md#configuration
)
.
-
The user(s) don't fall under the
[
configured `base`
](
ldap.md#configuration
)
.
-
The
[
configured `user_filter`
]
[
user-filter
]
blocks access to the user(s).
-
The
[
configured `user_filter`
]
(
ldap.md#using-an-ldap-filter-to-limit-access-to-your-gitlab-server
)
blocks access to the user(s).
In this case, you con confirm which of the above is true using
In this case, you con confirm which of the above is true using
[
ldapsearch
](
#ldapsearch
)
with the existing LDAP configuration in your
[
ldapsearch
](
#ldapsearch
)
with the existing LDAP configuration in your
...
@@ -97,7 +97,7 @@ here are some questions to ask yourself:
...
@@ -97,7 +97,7 @@ here are some questions to ask yourself:
-
Does the user fall under the
[
configured `base`
](
ldap.md#configuration
)
in
-
Does the user fall under the
[
configured `base`
](
ldap.md#configuration
)
in
LDAP? The user must fall under this
`base`
to login.
LDAP? The user must fall under this
`base`
to login.
-
Does the user pass through the
[
configured `user_filter`
]
[
user-filter
]
?
-
Does the user pass through the
[
configured `user_filter`
]
(
ldap.md#using-an-ldap-filter-to-limit-access-to-your-gitlab-server
)
?
If one is not configured, this question can be ignored. If it is, then the
If one is not configured, this question can be ignored. If it is, then the
user must also pass through this filter to be allowed to login.
user must also pass through this filter to be allowed to login.
-
Refer to our docs on
[
debugging the `user_filter`
](
#debug-ldap-user-filter
)
.
-
Refer to our docs on
[
debugging the `user_filter`
](
#debug-ldap-user-filter
)
.
...
@@ -132,7 +132,7 @@ are true for the user in question:
...
@@ -132,7 +132,7 @@ are true for the user in question:
#### Email has already been taken
#### Email has already been taken
A user tries to login with the correct LDAP credentials, is denied access,
A user tries to login with the correct LDAP credentials, is denied access,
and the
[
production.log
]
[
production-log
]
shows an error that looks like this:
and the
[
production.log
]
(
../logs.md#productionlog
)
shows an error that looks like this:
```
plaintext
```
plaintext
(LDAP) Error saving user <USER DN> (email@example.com): ["Email has already been taken"]
(LDAP) Error saving user <USER DN> (email@example.com): ["Email has already been taken"]
...
@@ -168,7 +168,7 @@ profile](../../user/profile/index.md#user-profile) or an admin can do it.
...
@@ -168,7 +168,7 @@ profile](../../user/profile/index.md#user-profile) or an admin can do it.
#### Debug LDAP user filter
#### Debug LDAP user filter
[
`ldapsearch`
](
#ldapsearch
)
allows you to test your configured
[
`ldapsearch`
](
#ldapsearch
)
allows you to test your configured
[
user filter
]
[
user-filter
]
[
user filter
]
(
ldap.md#using-an-ldap-filter-to-limit-access-to-your-gitlab-server
)
to confirm that it returns the users you expect it to return.
to confirm that it returns the users you expect it to return.
```
shell
```
shell
...
@@ -184,7 +184,7 @@ ldapsearch -H ldaps://$host:$port -D "$bind_dn" -y bind_dn_password.txt -b "$ba
...
@@ -184,7 +184,7 @@ ldapsearch -H ldaps://$host:$port -D "$bind_dn" -y bind_dn_password.txt -b "$ba
#### Sync all users **(STARTER ONLY)**
#### Sync all users **(STARTER ONLY)**
The output from a manual
[
user sync
]
[
user-sync
]
can show you what happens when
The output from a manual
[
user sync
]
(
ldap-ee.md#user-sync
)
can show you what happens when
GitLab tries to sync its users against LDAP. Enter the
[
rails console
](
#rails-console
)
GitLab tries to sync its users against LDAP. Enter the
[
rails console
](
#rails-console
)
and then run:
and then run:
...
@@ -297,9 +297,9 @@ LDAP group sync, but for some reason it's not happening. There are several
...
@@ -297,9 +297,9 @@ LDAP group sync, but for some reason it's not happening. There are several
things to check to debug the situation.
things to check to debug the situation.
-
Ensure LDAP configuration has a
`group_base`
specified.
-
Ensure LDAP configuration has a
`group_base`
specified.
[
This configuration
]
[
group-sync
]
is required for group sync to work properly.
[
This configuration
]
(
ldap-ee.md#group-sync
)
is required for group sync to work properly.
-
Ensure the correct
[
LDAP group link is added to the GitLab
-
Ensure the correct
[
LDAP group link is added to the GitLab
group
]
[
group-links
]
.
group
]
(
ldap-ee.md#adding-group-links
)
.
-
Check that the user has an LDAP identity:
-
Check that the user has an LDAP identity:
1.
Sign in to GitLab as an administrator user.
1.
Sign in to GitLab as an administrator user.
1.
Navigate to
**Admin area -> Users**
.
1.
Navigate to
**Admin area -> Users**
.
...
@@ -312,7 +312,7 @@ things to check to debug the situation.
...
@@ -312,7 +312,7 @@ things to check to debug the situation.
interval
](
ldap-ee.md#adjusting-ldap-group-sync-schedule
)
for the group to
interval
](
ldap-ee.md#adjusting-ldap-group-sync-schedule
)
for the group to
sync. To speed up the process, either go to the GitLab group
**
Settings ->
sync. To speed up the process, either go to the GitLab group
**
Settings ->
Members
** and press **
Sync now
**
(sync one group) or
[
run the group sync Rake
Members
** and press **
Sync now
**
(sync one group) or
[
run the group sync Rake
task
]
[
group-sync-rake
]
(sync all groups).
task
]
(
../raketasks/ldap.md#run-a-group-sync
)
(
sync
all groups).
If all of the above looks good, jump in to a little more advanced debugging in
If all of the above looks good, jump in to a little more advanced debugging in
the rails console.
the rails console.
...
@@ -352,9 +352,9 @@ GitLab syncs the `admin_group`.
...
@@ -352,9 +352,9 @@ GitLab syncs the `admin_group`.
NOTE:
**NOTE:**
NOTE:
**NOTE:**
To sync all groups manually when debugging is unnecessary,
[
use the Rake
To sync all groups manually when debugging is unnecessary,
[
use the Rake
task
]
[
group-sync-rake
]
instead.
task
]
(
../raketasks/ldap.md#run-a-group-sync
)
instead.
The output from a manual
[
group sync
]
[
group-sync
]
can show you what happens
The output from a manual
[
group sync
]
(
ldap-ee.md#group-sync
)
can show you what happens
when GitLab syncs its LDAP group memberships against LDAP.
when GitLab syncs its LDAP group memberships against LDAP.
```
ruby
```
ruby
...
@@ -449,7 +449,7 @@ this line will indicate the sync is finished:
...
@@ -449,7 +449,7 @@ this line will indicate the sync is finished:
Finished syncing admin
users
for
'ldapmain'
provider
Finished syncing admin
users
for
'ldapmain'
provider
```
```
If
[
admin sync
]
[
admin-sync
]
is not configured, you'll see a message
If
[
admin sync
]
(
ldap-ee.md#administrator-sync
)
is not configured, you'll see a message
stating as such:
stating as such:
```
shell
```
shell
...
@@ -541,7 +541,7 @@ for each of these users.
...
@@ -541,7 +541,7 @@ for each of these users.
### LDAP check
### LDAP check
The
[
Rake task to check LDAP
]
[
ldap-check
]
is a valuable tool
The
[
Rake task to check LDAP
]
(
../raketasks/ldap.md#check
)
is a valuable tool
to help determine whether GitLab can successfully establish a connection to
to help determine whether GitLab can successfully establish a connection to
LDAP and can get so far as to even read users.
LDAP and can get so far as to even read users.
...
@@ -561,11 +561,11 @@ users, [see what to do when no users are found](#no-users-are-found).
...
@@ -561,11 +561,11 @@ users, [see what to do when no users are found](#no-users-are-found).
### GitLab logs
### GitLab logs
If a user account is blocked or unblocked due to the LDAP configuration, a
If a user account is blocked or unblocked due to the LDAP configuration, a
message will be
[
logged to `application.log`
]
[
application-log
]
.
message will be
[
logged to `application.log`
]
(
../logs.md#applicationlog
)
.
If there is an unexpected error during an LDAP lookup (configuration error,
If there is an unexpected error during an LDAP lookup (configuration error,
timeout), the login is rejected and a message will be
[
logged to
timeout), the login is rejected and a message will be
[
logged to
`production.log`
]
[
production-log
]
.
`production.log`
]
(
../logs.md#productionlog
)
.
### ldapsearch
### ldapsearch
...
@@ -649,24 +649,3 @@ console](#rails-console) and run:
...
@@ -649,24 +649,3 @@ console](#rails-console) and run:
```
ruby
```
ruby
Rails
.
logger
.
level
=
Logger
::
DEBUG
Rails
.
logger
.
level
=
Logger
::
DEBUG
```
```
<!-- LINK REFERENCES -->
[
tail-logs
]:
https://docs.gitlab.com/omnibus/settings/logs.html#tail-logs-in-a-console-on-the-server
[
production-log
]:
../logs.md#productionlog
[
application-log
]:
../logs.md#applicationlog
[
reconfigure
]:
../restart_gitlab.md#omnibus-gitlab-reconfigure
[
restart
]:
../restart_gitlab.md#installations-from-source
[
ldap-check
]:
../raketasks/ldap.md#check
[
group-sync-rake
]:
../raketasks/ldap.md#run-a-group-sync
[
user-filter
]:
ldap.md#using-an-ldap-filter-to-limit-access-to-your-gitlab-server
[
user-sync
]:
ldap-ee.md#user-sync
[
group-sync
]:
ldap-ee.md#group-sync
[
admin-sync
]:
ldap-ee.md#administrator-sync
[
config
]:
ldap.md#configuration
[
group-links
]:
ldap-ee.md#adding-group-links
[
^1
]:
In
Active Directory, a user is marked as disabled/blocked if the user
account control attribute (
`userAccountControl:1.2.840.113556.1.4.803`
)
has bit 2 set. See
<https://ctogonewild.com/2009/09/03/bitmask-searches-in-ldap/>
for more information.
doc/user/application_security/container_scanning/index.md
View file @
d2f6785b
...
@@ -38,9 +38,9 @@ Having an extra job in your pipeline that checks for those vulnerabilities,
...
@@ -38,9 +38,9 @@ Having an extra job in your pipeline that checks for those vulnerabilities,
and the fact that they are displayed inside a merge request, makes it very easy
and the fact that they are displayed inside a merge request, makes it very easy
to perform audits for your Docker-based apps.
to perform audits for your Docker-based apps.
[
//
]:
#
"NOTE: The container scanning tool references the following heading in the code, so if you"
<!-- NOTE: The container scanning tool references the following heading in the code, so if you
[
//
]:
#
" make a change to this heading, make sure to update the documentation URLs used in the"
make a change to this heading, make sure to update the documentation URLs used in the
[
//
]:
#
" container scanning tool (https://gitlab.com/gitlab-org/security-products/analyzers/klar)"
container scanning tool (https://gitlab.com/gitlab-org/security-products/analyzers/klar) -->
## Requirements
## Requirements
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment