Spacelift
PrivacyT&Cs
  • 👋Hello, Spacelift!
  • 🚀Getting Started
  • 🌠Main concepts
    • Stack
      • Creating a stack
      • Stack settings
      • Organizing stacks
      • Stack locking
      • Drift detection
    • Configuration
      • Environment
      • Context
      • Runtime configuration
        • YAML reference
    • Run
      • Task
      • Proposed run (preview)
      • Tracked run (deployment)
      • Module test case
      • User-Provided Metadata
      • Run Promotion
      • Pull Request Comments
    • Policy
      • Login policy
      • Access policy
      • Approval policy
      • Initialization policy
      • Plan policy
      • Push policy
      • Task policy
      • Trigger policy
    • Resources
    • Worker pools
    • VCS Agent Pools
  • 🛰️Platforms
    • Terraform
      • Module registry
      • External modules
      • Provider
      • State management
      • Terragrunt
      • Version management
      • Handling .tfvars
      • CLI Configuration
      • Cost Estimation
      • Resource Sanitization
      • Storing Complex Variables
      • Debugging Guide
    • Pulumi
      • Getting started
        • C#
        • Go
        • JavaScript
        • Python
      • State management
      • Version management
    • CloudFormation
      • Getting Started
      • Reference
      • Integrating with SAM
      • Integrating with the serverless framework
    • Kubernetes
      • Getting Started
      • Authenticating
      • Custom Resources
      • Helm
      • Kustomize
  • ⚙️Integrations
    • Audit trail
    • Cloud Integrations
      • Amazon Web Services (AWS)
      • Microsoft Azure
      • Google Cloud Platform (GCP)
    • Source Control
      • GitHub
      • GitLab
      • Azure DevOps
      • Bitbucket Cloud
      • Bitbucket Datacenter/Server
    • Docker
    • GraphQL API
    • Single sign-on
      • GitLab OIDC Setup Guide
      • Okta OIDC Setup Guide
      • OneLogin OIDC Setup Guide
      • Azure AD OIDC Setup Guide
      • AWS IAM Identity SAML 2.0 Setup Guide
    • Slack
    • Webhooks
  • 📖Product
    • Privacy
    • Security
    • Support
      • Statement of Support
    • Disaster Continuity
    • Billing
      • Stripe
      • AWS Marketplace
    • Terms and conditions
    • Refund Policy
  • Cookie Policy
Powered by GitBook
On this page
  • Pre-requisites
  • Configure Account Settings
  • Setup OIDC
  • GitLab: Create GitLab Application
  • Configure OIDC Settings
  • GitLab OIDC Setup Completed

Was this helpful?

  1. Integrations
  2. Single sign-on

GitLab OIDC Setup Guide

Example instructions for setting up GitLab as a single sign-on source via OIDC.

PreviousSingle sign-onNextOkta OIDC Setup Guide

Last updated 2 years ago

Was this helpful?

If you'd like to set up the ability to sign in to your Spacelift account using an OIDC integration with GitLab, you've come to the right place. This example will walk you through the steps to get this setup, and you'll have single sign-on running in no time!

Pre-requisites

  • Spacelift account, with access to admin permissions

  • GitLab account, with permission to create GitLab Applications

Please note you'll need to be an admin on the Spacelift account to access the account settings to configure Single Sign-On.

Configure Account Settings

You'll need to visit the Spacelift account settings page to set up this integration, from the navigation side bar menu, select "Settings."

Setup OIDC

Next, you'll want to click the Set Up box underneath the "OIDC Settings" section. This will expand some configuration we will need to fill out in a few minutes, which we will be obtaining from GitLab. For now copy the authorized redirect URL as we will need to provide GitLab this URL when configuring our GitLab application.

GitLab: Create GitLab Application

Within your GitLab account, visit the Applications section of your account.

Remember the authorized redirect URL we copied earlier from Spacelift? We'll need that in this step. You'll want to paste that URL into the Redirect URI input as shown.

Ensure that the openId, profile and email scopes are check'd.

Click Save Application.

Configure OIDC Settings

Now that we have the GitLab Application setup, we'll need to take the Application ID and Secret to configure the Spacelift OIDC Settings.

Application ID = Spacelift's Client ID

Secret = Spacelift's Secret

In Spacelift, the Provider URL depends on where you are using GitLab, if you are using GitLab.com this value can be set as https://gitlab.com

When setting your Provider URL within Spacelift, do not include a trailing slash "/" at the end of your URL or you may receive an error.

GitLab OIDC Setup Completed

That's it! Your OIDC integration with GitLab should now be fully configured.

Create your GitLab Application as shown, the application's Name can be whatever you'd like. Spacelift sounds like a great name to use though .

⚙️
👏
Navigate to GitLab Applications within your account.
Complete the GitLab Application Configuration
Copy the Application ID and Secret values to your Spacelift OIDC configuration
Copy the values from GitLab into your Spacelift OIDC Settings.