- GitLab EE
- Using an LDAP filter to limit access to your GitLab server
- Enabling LDAP sign-in for existing GitLab users
- Adjusting LDAP user and group sync schedules
GitLab integrates with LDAP to support user authentication. This integration works with most LDAP-compliant directory servers, including Microsoft Active Directory, Apple Open Directory, Open LDAP, and 389 Server. GitLab EE includes enhanced integration, including group membership syncing.
The information on this page is relevant for both GitLab CE and EE. For more details about EE-specific LDAP features, see LDAP EE Documentation.
GitLab assumes that LDAP users are not able to change their LDAP 'mail', 'email' or 'userPrincipalName' attribute. An LDAP user who is allowed to change their email on the LDAP server can potentially take over any account on your GitLab server.
We recommend against using LDAP integration if your LDAP users are allowed to change their 'mail', 'email' or 'userPrincipalName' attribute on the LDAP server.
If a user is deleted from the LDAP server, they will be blocked in GitLab, as well. Users will be immediately blocked from logging in. However, there is an LDAP check cache time (sync time) of one hour (see note). This means users that are already logged in or are using Git over SSH will still be able to access GitLab for up to one hour. Manually block the user in the GitLab Admin area to immediately block all access.
Note: GitLab EE supports a configurable sync time, with a default of one hour.
To enable LDAP integration you need to add your LDAP server settings in
There is a Rake task to check LDAP configuration. After configuring LDAP using the documentation below, see LDAP check Rake task for information on the LDAP check Rake task.
Note: In GitLab EE, you can configure multiple LDAP servers to connect to one GitLab server.
Prior to version 7.4, GitLab used a different syntax for configuring
LDAP integration. The old LDAP integration syntax still works but may be
removed in a future version. If your
gitlab.yml file contains
LDAP settings in both the old syntax and the new syntax, only the old
syntax will be used by GitLab.
The configuration inside
gitlab_rails['ldap_servers'] below is sensitive to
incorrect indentation. Be sure to retain the indentation given in the example.
Copy/paste can sometimes cause problems.
sslcorresponds to 'Simple TLS' in the LDAP library.
tlscorresponds to StartTLS, not to be confused with regular TLS. Normally, if you specify
sslis will be on port 636 while
tls(StartTLS) would be on port 389.
plainalso operates on port 389.
gitlab_rails['ldap_enabled'] = true gitlab_rails['ldap_servers'] = YAML.load <<-EOS # remember to close this block with 'EOS' below main: # 'main' is the GitLab 'provider ID' of this LDAP server ## label # # A human-friendly name for your LDAP server. It is OK to change the label later, # for instance if you find out it is too large to fit on the web page. # # Example: 'Paris' or 'Acme, Ltd.' label: 'LDAP' # Example: 'ldap.mydomain.com' host: '_your_ldap_server' # This port is an example, it is sometimes different but it is always an integer and not a string port: 389 uid: 'sAMAccountName' # This should be the attribute, not the value that maps to uid. method: 'plain' # "tls" or "ssl" or "plain" # Examples: 'america\\momo' or 'CN=Gitlab Git,CN=Users,DC=mydomain,DC=com' bind_dn: '_the_full_dn_of_the_user_you_will_bind_with' password: '_the_password_of_the_bind_user' # Set a timeout, in seconds, for LDAP queries. This helps avoid blocking # a request if the LDAP server becomes unresponsive. # A value of 0 means there is no timeout. timeout: 10 # This setting specifies if LDAP server is Active Directory LDAP server. # For non AD servers it skips the AD specific queries. # If your LDAP server is not AD, set this to false. active_directory: true # If allow_username_or_email_login is enabled, GitLab will ignore everything # after the first '@' in the LDAP username submitted by the user on login. # # Example: # - the user enters 'firstname.lastname@example.org' and 'p@ssw0rd' as LDAP credentials; # - GitLab queries the LDAP server with 'jane.doe' and 'p@ssw0rd'. # # If you are using "uid: 'userPrincipalName'" on ActiveDirectory you need to # disable this setting, because the userPrincipalName contains an '@'. allow_username_or_email_login: false # To maintain tight control over the number of active users on your GitLab installation, # enable this setting to keep new users blocked until they have been cleared by the admin # (default: false). block_auto_created_users: false # Base where we can search for users # # Ex. 'ou=People,dc=gitlab,dc=example' or 'DC=mydomain,DC=com' # base: '' # Filter LDAP users # # Format: RFC 4515 https://tools.ietf.org/search/rfc4515 # Ex. (employeeType=developer) # # Note: GitLab does not support omniauth-ldap's custom filter syntax. # # Below an example for get only specific users # Example: '(&(objectclass=user)(|(samaccountname=momo)(samaccountname=toto)))' # user_filter: '' # LDAP attributes that GitLab will use to create an account for the LDAP user. # The specified attribute can either be the attribute name as a string (e.g. 'mail'), # or an array of attribute names to try in order (e.g. ['mail', 'email']). # Note that the user's LDAP login will always be the attribute specified as `uid` above. attributes: # The username will be used in paths for the user's own projects # (like `gitlab.example.com/username/project`) and when mentioning # them in issues, merge request and comments (like `@username`). # If the attribute specified for `username` contains an email address, # the GitLab username will be the part of the email address before the '@'. username: ['uid', 'userid', 'sAMAccountName'] email: ['mail', 'email', 'userPrincipalName'] # If no full name could be found at the attribute specified for `name`, # the full name is determined using the attributes specified for # `first_name` and `last_name`. name: 'cn' first_name: 'givenName' last_name: 'sn' ## EE only # Base where we can search for groups # # Ex. ou=groups,dc=gitlab,dc=example # group_base: '' # The CN of a group containing GitLab administrators # # Ex. administrators # # Note: Not `cn=administrators` or the full DN # admin_group: '' # An array of CNs of groups containing users that should be considered external # # Ex. ['interns', 'contractors'] # # Note: Not `cn=interns` or the full DN # external_groups:  # The LDAP attribute containing a user's public SSH key # # Ex. ssh_public_key # sync_ssh_keys: false # GitLab EE only: add more LDAP servers # Choose an ID made of a-z and 0-9 . This ID will be stored in the database # so that GitLab can remember which LDAP server a user belongs to. # uswest2: # label: # host: # .... EOS
Use the same format as
gitlab_rails['ldap_servers'] for the contents under
servers: in the example below:
production: # snip... ldap: enabled: false servers: main: # 'main' is the GitLab 'provider ID' of this LDAP server ## label # # A human-friendly name for your LDAP server. It is OK to change the label later, # for instance if you find out it is too large to fit on the web page. # # Example: 'Paris' or 'Acme, Ltd.' label: 'LDAP' # snip...
If you want to limit all GitLab access to a subset of the LDAP users on your
LDAP server, the first step should be to narrow the configured
it is sometimes necessary to filter users further. In this case, you can set up
an LDAP user filter. The filter must comply with
gitlab_rails['ldap_servers'] = YAML.load <<-EOS main: # snip... user_filter: '(employeeType=developer)' EOS
production: ldap: servers: main: # snip... user_filter: '(employeeType=developer)'
Tip: If you want to limit access to the nested members of an Active Directory group you can use the following syntax:
user_filter DN contains a special characters. For example a comma
This character needs to be escaped as documented in RFC 4515.
Due to the way the string is parsed the special character needs to be convered
to hex and
\ in hex) added before it.
As an example the above DN would look like
Please note that GitLab does not support the custom filter syntax used by omniauth-ldap.
When a user signs in to GitLab with LDAP for the first time, and their LDAP email address is the primary email address of an existing GitLab user, then the LDAP DN will be associated with the existing user. If the LDAP email attribute is not found in GitLab's database, a new user is created.
In other words, if an existing GitLab user wants to enable LDAP sign-in for themselves, they should check that their GitLab email address matches their LDAP email address, and then sign into GitLab via their LDAP credentials.
You can manually configure LDAP user and group sync times by setting the following configuration values.
Note: These are cron formatted values. You can use a crontab generator to create these values, for example http://www.crontabgenerator.com/.
By default, GitLab will run a worker once per day at 01:30 a.m. server time to check and update GitLab users against LDAP.
gitlab_rails['ldap_sync_worker_cron'] = "* */12 * * *"
Reconfigure GitLab for the changes to take effect.
cron_jobs ldap_sync_worker_cron: "* */12 * * *"
Restart GitLab for the changes to take effect.
By default, GitLab will run a group sync process every hour, on the hour.
Note: It's recommended not to run group sync at too short intervals as this could lead to multiple syncs running concurrently. This is primarily a concern for installations with a large number of LDAP users. Please review the LDAP group sync benchmark metrics to see how your installation compares before proceeding.
gitlab_rails['ldap_group_sync_worker_cron'] = "*/30 * * * *"
Reconfigure GitLab for the changes to take effect.
cron_jobs ldap_group_sync_worker_cron: "*/30 * * * *"
Restart GitLab for the changes to take effect.
Not implemented by
You should disable anonymous LDAP authentication and enable simple or SASL
authentication. The TLS client authentication setting in your LDAP server cannot
be mandatory and clients cannot be authenticated with the TLS protocol.
Not supported by GitLab's configuration options.
method: ssl, the underlying authentication method used by
simple_tls. This method establishes TLS encryption with
the LDAP server before any LDAP-protocol data is exchanged but no validation of
the LDAP server's SSL certificate is performed.
This example uses ldapsearch and assumes you are using ActiveDirectory. The following query returns the login names of the users that will be allowed to log in to GitLab if you configure your own user_filter.
ldapsearch -H ldaps://$host:$port -D "$bind_dn" -y bind_dn_password.txt -b "$base" "$user_filter" sAMAccountName
- Variables beginning with a
$refer to a variable from the LDAP section of your configuration file.
- Replace ldaps:// with ldap:// if you are using the plain authentication method.
389is the default
636is the default
- We are assuming the password for the bind_dn user is in bind_dn_password.txt.
- Make sure the user you are binding with has enough permissions to read the user's tree and traverse it.
- Check that the
user_filteris not blocking otherwise valid users.
Run the following check command to make sure that the LDAP settings are correct and GitLab can see your users:
# For Omnibus installations sudo gitlab-rake gitlab:ldap:check # For installations from source sudo -u git -H bundle exec rake gitlab:ldap:check RAILS_ENV=production
If you are getting 'Connection Refused' errors when trying to connect to the
LDAP server please double-check the LDAP
method settings used by
GitLab. Common combinations are
method: 'plain' and
port: 389, OR
method: 'ssl' and
If a user account is blocked or unblocked due to the LDAP configuration, a
message will be logged to
If there is an unexpected error during an LDAP lookup (configuration error,
timeout), the login is rejected and a message will be logged to