Enterprise users
- Tier: Premium, Ultimate
- Offering: GitLab.com
Enterprise users are similar to standard GitLab users, but are administered by an organization. Each enterprise user is claimed and managed by a specific top-level group. To claim enterprise users, you must verify a group domain and have an active subscription.
If the subscription expires or is canceled:
- Any existing enterprise users remain enterprise users in the group.
- Group Owners cannot manage their enterprise users.
- Primary emails for user accounts must be from a verified domain.
- New enterprise users cannot be associated with the group until a subscription is renewed.
Manage group domains
To claim GitLab.com users as enterprise users, you must add and verify ownership of a domain. Group domains are added to the top-level group and apply to all subgroups and projects in the group.
While each group can have multiple domains, you can associate each domain with only one group at a time. If you move your domain to another paid group, all enterprise users are automatically claimed by the new group.
Group domains are linked to a project in your top-level group. The linked project needs GitLab Pages, but does not need to create a GitLab Pages website. If GitLab Pages is turned off, you cannot verify the domain.
Even though the domain is linked to a project, it is available to the entire group hierarchy including all nested subgroups and projects. Members in the linked project with at least the Maintainer role can modify or remove the domain. If this project is deleted, your associated domains are also removed.
For more information on group domains, see epic 5299.
Add group domains
Prerequisites:
- You must have the Owner role for a top-level group.
- You must control a custom domain
example.com
or subdomainsubdomain.example.com
that matches the email domain you want to verify. - You must be able to create DNS
TXT
records for your domain to prove ownership. - You must have a dedicated project in the top-level group that uses GitLab Pages.
To add a custom domain for a group:
On the left sidebar, select Search or go to and find your group.
Select Settings > Domain Verification.
In the upper-right corner, select Add Domain.
Configure the domain settings:
- Domain: Enter the domain name.
- Project: Link to an existing project in the group.
- Certificate: Select a certificate option:
If you do not have or do not want to use an SSL/TLS certificate, select Automatic certificate management using Let’s Encrypt.
If you want to provide your own SSL/TLS certificate, select Manually enter certificate information. You can also add a certificate and key later.
A valid certificate is not required for domain verification. You can ignore self-signed certificate warnings if you are not using GitLab Pages.
Select Add Domain. GitLab saves the domain information.
Verify ownership of the domain:
- In TXT, copy the verification code.
- In your domain provider DNS settings, add the verification code as a
TXT
record. - In GitLab, on the left sidebar, select Search or go to and find your group.
- Select Settings > Domain Verification.
- Next to the domain name, select Retry verification ( ).
After successful verification, the domain status changes to Verified and can be used for enterprise user management.
Generally, DNS propagation completes in a few minutes, but can take up to 24 hours. Until it completes, the domain remains unverified in GitLab.
If the domain is still unverified after seven days, GitLab automatically removes the domain.
After verification, GitLab periodically reverifies the domain. To avoid potential issues,
maintain the TXT
record on your domain provider.
View group domains
To view all custom domains for a group:
- On the left sidebar, select Search or go to and find your group.
- Select Settings > Domain Verification.
Edit group domains
To edit a custom domain for a group:
- On the left sidebar, select Search or go to and find your group.
- Select Settings > Domain Verification.
- Next to the domain name, select Edit ( ).
From here, you can:
- View the custom domain.
- View the DNS record to add.
- View the TXT verification entry.
- Retry verification.
- Edit the certificate settings.
Delete group domains
Deleting a group domain can impact enterprise users in your group. After you delete the domain:
- Any existing enterprise users remain enterprise users in the group.
- Primary emails for user accounts must be from a verified domain.
- New enterprise users cannot be associated with the group until another domain is verified.
To delete a custom domain for a group:
- On the left sidebar, select Search or go to and find your group.
- Select Settings > Domain Verification.
- Next to the domain name, select Remove domain ( ).
- When prompted, select Delete domain.
Manage enterprise users
In addition to the standard group member permissions, Owners of a top-level group can also manage enterprise users in their group.
You can also use the API to interact with enterprise users.
Automatic claims of enterprise users
Prerequisites:
- The top-level group must add and verify a group domain.
- The user account must meet at least one of the following conditions:
- The user account was created on or after February 1, 2021.
- The user account has a SAML or SCIM identity tied to the organization’s group.
- The user account has a
provisioned_by_group_id
attribute that matches the group ID. - The user account is already a member of the group subscription purchased or renewed on or after February 1, 2021.
After a group verifies ownership of a domain, users with an email address from a domain are automatically claimed by the group as enterprise users. No direct action is needed from group Owners.
Any existing group members with an email address from a different domain retain their existing access, but can not be managed by group Owners. To claim these users, they must update their primary email address to match your group domain.
The claim process can take up to four days to trigger. You can immediately run this process by manually re-verifying the group domain.
After a group claims an enterprise user:
- The user receives a welcome email.
- The group ID is added to the user’s
enterprise_group_id
attribute.
Identifying enterprise users
You can identify enterprise users from the members list.
All enterprise users have an Enterprise
badge next to their names.
You can discover any non-enterprise group members by analyzing the list of billable users at:
https://gitlab.com/groups/<group_id>/-/usage_quotas#seats-quota-tab
.
From this list, non-enterprise users have one of the following:
- An email address from a non-verified domain.
- No visible email address.
Restrict authentication methods
You can restrict the specific authentication methods available to enterprise users, which can help reduce the security footprint of your users.
Restrict group and project creation
You can restrict group and project creation for enterprise users, which helps you define:
- If enterprise users can create top-level groups.
- The maximum number of personal projects each enterprise user can create.
These restrictions are defined in the SAML response. For more information, see configure enterprise user settings from the SAML response.
Bypass email confirmation for provisioned users
By default, users provisioned with SAML or SCIM are sent a verification email to verify their identity. Instead, you can configure GitLab with a custom domain and GitLab automatically confirms user accounts. Users still receive an enterprise user welcome email.
For more information, see bypass user email confirmation with verified domains.
View the email addresses for an enterprise user
Prerequisites:
- You must have the Owner role for a top-level group.
To view an enterprise user’s email address:
- On the left sidebar, select Search or go to and find your project or group.
- Select Manage > Members.
- Hover over the enterprise user’s name.
You can also use the group and project members API to access users’ information. For enterprise users of the group, this information includes users’ email addresses.
Change the email addresses for an enterprise user
Enterprise users can follow the same process as other GitLab users to change their primary email address. The new email address must be from a verified domain. If your organization has no verified domains, your enterprise users cannot change their primary email address.
Only GitLab support can change the primary email address to an email address from a non-verified domain. This action releases the enterprise user.
Delete an enterprise user
Prerequisites:
- You must have the Owner role for the top-level group.
You can use the group enterprise users API to delete an enterprise user and permanently remove the account from GitLab. This action is different from releasing the user which only removes the enterprise management features from the user. When you delete the user, you can choose to either:
- Permanently delete the user and their contributions.
- Keep their contributions and transfer them to a system-wide ghost user account.
Release an enterprise user
You can remove enterprise management features from a user account. Removing an enterprise user might be required if, for example, a user wants to keep their GitLab account after leaving their company. Releasing a user does not alter their account roles or permissions, but removes the management options for the group Owner. If you need to permanently remove the account, you should delete the user instead.
To release the user, GitLab support must update the user’s primary email address to an email address from a non-verified domain. This action automatically releases the account.
Allowing group Owners to change primary emails is proposed in issue 412966.
Enable the extension marketplace for the Web IDE and workspaces
- Offering: GitLab.com, GitLab Self-Managed, GitLab Dedicated
Prerequisites:
- An administrator must enable the extension marketplace.
- You must have the Owner role for a top-level group.
To enable the extension marketplace for the Web IDE and workspaces:
- On the left sidebar, select Search or go to and find your group.
- Select Settings > General.
- Expand Permissions and group features.
- Under Web IDE and workspaces, select the Enable extension marketplace checkbox.
- Select Save changes.
Troubleshooting
Cannot disable two-factor authentication for an enterprise user
If a user does not have an Enterprise badge, a group Owner cannot disable or reset 2FA for their account. Instead, the Owner should tell the enterprise user to consider available recovery options.