Identity and Access Management v3

The Security Identity team is leading the technical strategy and automation implementation of next-generation identity and access management (IAM), role-based access control (RBAC), and administrative access controls for internal GitLab systems, cloud infrastructure, and tech stack applications.

Mission

GitLab is one of the stewards of the world’s source code and intellectual property. Our mission is to ensure that internal and administrative access to customer and product data is protected and industry trust is preserved.

Risks and Process Improvements

Our work focuses on the following risks and process improvement areas:

  1. Lateral Movement Risk: Restricting and securing access to GitLab’s internal data and systems based on “need to know” and least privilege security principles to prevent data leakage or data loss.
  2. Penetration Risk: Implement and manage security boundaries (“castle walls”) related to authentication, authorization, device trust, and least privilege for GitLab team members, temporary service providers, and service accounts that have access to internal GitLab systems and/or administrative access.
  3. Cloud Infrastructure Control Plane: We manage the top-level access and architecture for AWS and GCP cloud providers to enforce least privilege and separation of accounts and resources for workloads.
  4. Last Mile Process Automation: Implement custom code for vendor feature gaps for last mile compliance and provisioning automation that improve business efficiency and change management auditability. This improves back office and team member end user experience, automation, and audit reports with onboarding, career mobility, offboarding, and ad-hoc access requests using improved role-based access control architecture.
  5. Configuration State Management: Use GitOps configuration/infrastructure-as-code for system configuration where feasible to avoid risks with manual configuration and drift detection.

Future State Goals

Provisioning and Approvals

As we look ahead, we have a North Star vision that access and permissions are provisioned programatically, not manually by system administrators.

We also want to ensure that all approvals are systematic in nature to allow automated audit log exports. For example:

  1. A GitLab issue Markdown checkbox is visually auditable, but not programatically auditable. Anyone can select the box so manual effort is needed to verify that the appropriate person checked the box.
  2. A GitLab label is auditable if it exists, but not who applied it and timestamp of application. Although the UI shows which user applied the label, this isn’t easily accessible in the event log. Any user can apply the label, so there are risks with assurance of who had the authority to apply the label.
  3. When we use a Slack bot or Web UI form with a green and red button, the user is already authenticated and only that user has the ability to click that button based on policies that our systems define. We use API calls to perform actions that have additional validation checks and audit logs for tracking.

We want to provide a streamlined user experience for admins, managers, and end users alike to reduce friction and provide self service wherever possible. We have had success with past projects and want to bring our experience and lessons learned to the next generation of Identity Management.

“I created an AWS account with gitlabsandbox.cloud today. To be honest, I did not expect it to be fully automated. I got my AWS credentials in 5 minutes without bothering anyone. That’s amazing!” - Dmitriy Zaporozhets (DZ), GitLab Co-Founder, 2020-12-14

We will be using SaaS vendors (Google Workspace, Okta, Okta IGA, Workday) where possible and providing last mile automation, auditing, and user experience with our custom Identity Platform.

Auditability

We perform manual visual audits in Identity v2 with screenshots and CSV exports.

In Identity v3, we will use programmatic provisioning so every action and metadata diff is logged with a standardized schema for improved alerting, auditability, and dispatching automation for provisioning and deprovisioning. This also improves transparency for team members to self service the information they need and streamlines our user access review process with a history of point-in-time records of what changed, when, and automates any observations.

Elevated, Just-in-Time, and Admin Access

Our next-gen architecture will allow us to automate just-in-time access for elevated and administrative actions that are burdensome to manage manually.

For users that need perpetual administrative access, we have an additional admin account for each of the users in Customer Support, Infrastructure, IT, Security and other roles. See access level wristbands to learn more.

We are also investing in additional administrative control plane separation. Details are not published in the public handbook for security reasons.

Roadmap

As any company grows, they go through phases of growth with many organic iterations throughout the journey. GitLab is currently outgrowing Identity v2 and is building our Identity v3 program.

GitLab Identity v1

GitLab Identity v1 was managed using Tech Ops practices by the Infrastructure and People Operations team prior to 2018.

GitLab Identity v2

GitLab Identity v2 is what we do today and have been doing since 2018 with baseline entitlements and access requests. See the Access Management Policy to learn more.

The processes that we do today meets audit and compliance requirements, however the processes are mostly manual that results in internal inefficiency. It takes a lot of labor hours to manage onboarding, access requests, access reviews, and offboarding processes.

You can see historical stats on access requests in this (internal) spreadsheet.

GitLab Identity v3

GitLab Identity v3 is where we want to be in FY25-2H (mid-late 2024) with a pseudo-greenfield approach to automate all of our policies and as much of our approvals, provisioning, and access reviews as possible.

Role Based Access Control (RBAC)

With the introduction of Identity Roles and Identity Groups, we can reduce the number of ad-hoc access requests by using predefined policies and automated provisioning based on role-based access control rather than named user access control.

If you are familiar with job families in Identity v2, this is the next generation with an improved architecture and schema for IAM and RBAC.

Identity Governance (IGA) Implementation

Identity Governance and Administration (IGA) vendor products are typically focused on a compliance lens, with the goal of managing the approval process when a user requests access to an application, and providing a UI for compliance team members to perform user access review audits for existing users that have access to an application.

We are in the early stages of implementing Okta’s IGA platform. You can learn more in the internal slide deck and materials in the Google Drive folder. You can also see additional feedback from team members during the RFP process in it/engops#289.

The high level goal is that Okta IGA provides an improved user experience for users to request access to Okta applications with a Web UI and Slack Bot that are not managed by baseline entitlements, and has helpful compliance backend UI features for performing user access reviews.

Custom Code

The Security department is leveraging vendors that specialize in Identity Management (ex. Okta, IGA solution, etc.), however no SaaS vendor has all of the features that we need.

Due to the existential and security risks associated with IAM/RBAC, the Security department is supporting our Identity Engineers who are building in-house infrastructure, scripts, and software integrations to build the last mile automation and tools.

The Identity Platform provides the API integration and plumbing of our vendor solutions and allow us to meet the challenges of the future, make GitLab easier to do business with internally, and unilaterally address our IAM and RBAC risks with a holistic approach.

The Identity Platform is a well architected library of scripts that use CI/CD pipeline jobs to parse YAML policy files, generate user manifests, and use the REST API for each respective vendor to check if the user belongs to the group, should be removed from the group, and sync the group members against our policy. See the full data flow for more details.

We will be using GitOps (a.k.a. Terraform and GitLab CI/CD pipelines) approach for assigning groups to Okta applications with state management.

Complex Systems

We have identified several key systems and applications that need our focus and investment to optimize Identity Security. We are focusing on managing the admin control plane and tech stack systems that are causing a lot of business inefficiencies related to onboarding and offboarding.

We describe these as the “complex” systems that don’t have easy button provisioning that 3rd party vendors can easily manage. We have to build custom automation using Terraform or REST API calls to handle the complex systems.

  • (New) Admin Control Plane with GitOps and Admin Accounts
  • GitLab SaaS Instance Admins
  • Google Cloud
  • Google Workspace Groups
  • GitLab SaaS Groups and Members (ex. gitlab-com, gitlab-org, gitlab-*, gl-* namespaces)
  • Okta Group Membership Policies/Rules (used by Okta Applications)

We are also closely involved with processes and systems that cause the most inefficiency or pain and suffering.

  • Onboarding issues and access requests
  • Baseline entitlement architecture and automation
  • Offboarding issues and access deprovisioning
  • Okta architecture
  • Google Workspace architecture
  • 1Password administration
  • Google Cloud architecture

For more details, see the related handbook pages, reach out to #security-identity-ops with questions, or schedule a call with Jeff Martin.

Automation Options

This is a low context simplified explanation.

Okta Authentication

A large number of our tech stack applications have authentication federated by Okta single-sign on (SSO) using any combination of SCIM, SAML, and OIDC protocols.

It is important to keep in mind that Okta is not an authorization platform. In other words, when you sign in, the application can see your name, email address, and profile attributes or a list of group names that you are a member of, however Okta cannot provision/grant you roles or permissions on the application itself.

Most applications have “simple” provisioning that requires adding the user and they are assigned baseline permissions and users do not need additional permissions. For discussion purposes, this covers ~80% of our applications.

A few applications have code logic with their Okta authentication integration that allows you to specify which user profile attributes or group names should be used to grant access to additional roles and permissions inside of the application, however we rarely see this functionality in applications. Most applications provide a UI that lets you manually assign a role to the existing user.

Authorization Automation

For ~20% of applications that require “resource” or “role” provisioning, we have to use no-code or our own scripts to achieve this. There are no features in Okta or other Identity solutions that offer these features. This requires using the vendor’s REST API with our own scripts to call endpoints respectively. Any integrations that you see advertised are usually Professional Services custom integrations that their engineers wrote scripts for.

You can see the GitLab product Members API endpoint as an example. We can force users to sign in with Okta, however Okta cannot automate which groups and projects the user has access to or the role/permission level for each of those groups or projects.

No Code Automation

You may have heard of no code solutions like Okta Workflows, Tines, Workato, Zapier, etc that can solve these needs. While they work reasonably well in simple use cases for users who do not have code experience, they are not the tool for the job in all cases, particularly complex ones.

Remember that no-code workflows are point-to-point and are not usually part of a shared ecosystem that might provide economies of scale. In other words, you can’t call a function/method from another class.

With any WYSIWYG tool, you cannot use expression language syntax natively like you can when writing a few lines of code, so you have to catch data, pull an attribute, then plug that string attribute into the next function. The end result is that no-code workflows become overly complicated and can become 50 steps that can be accomplished with 5 lines of code.

In other words, no-code is great for something very simple, but should not be relied on for complex workflows without good reason. In Identity v2, we’ve tried to stretch the limits of no-code workflows, and believe that scripts running in CI/CD pipelines offer easier maintenance if well architected.

Custom Code Automation

The concept of writing code or custom applications can be perceived as burdensome and requires significant investment. Our strategy is to use small scripts that are run with GitLab CI/CD pipelines, allowing us to keep the code base small and dogfooding the GitLab product while maintaining the smallest possible codebase footprint for automation.

See the Identity Platform to learn more about our approach.

Separation of Concerns

Tech Stack Kingdoms

We have refactored our tech stack into Identity Kingdoms (analogous to a realm) to provide separation of concerns between Business, Cloud, and Product (SaaS and Dedicated) unique needs, particularly with administrative control planes and least privilege configuration. This allows us to create automation and policies specific to each kingdom’s compliance requirements to enable the respective teams to operate efficiently within our top-level architecture and guardrails.

Learn more on the Identity Kingdoms handbook page.

Trust Landscape DRIs

The Security team focuses on customer, compliance, and product trust, while the Business Technology and IT team focuses on corporate and financial trust.

  • Administrator Trust: Security Department - Identity Ops
  • Automation Trust: Security Department - Identity Engineering
  • Boundary Trust: Security Department - Identity Engineering
  • Compliance Trust: Security Department - Commercial Compliance Team
  • Customer Trust: Engineering, Product, and Security division
  • Financial Trust: Business Technology/IT Department
  • Product Feature Trust: Development Department and Product Management
  • Product Reliability Trust: Infrastructure Department

Technological Trust

In addition to maintaining human confidence, we also need to ensure supply chain confidence and that no single vendor breach can compromise the integrity of our architecture, particularly the boundaries that we refer to as castle walls. By using a defense-in-depth approach, we are able to minimize the external attack surface.

Learn more on the Identity Boundaries handbook page.

Data Sources

We consider Workday to be the source of truth for team members. All users and their attributes are synced with Okta every hour with built-in vendor integrations.

The Temporary Service Provider process is the SSOT for contractors and external users. The IT team manages automation that creates temporary service provider users in Okta with -ext@gitlab.com email addresses.

Workday has department, job title, and manager metadata, but does not have sufficient sub-department/team/role metadata that is needed for RBAC (that are being evaluated). Workday also does not have any of our temporary service provider contractors. In our current iteration, we consider Workday to be focused on People Group related use cases.

We have flexible control of custom attributes in Okta that we can pull (and push) so we consider Okta Users and their attributes to be the aggregated SSOT for Identity.

When a user’s Okta status changes to deprovisioned (pushed from Workday), we consider them to be offboarded.

The Identity Team aggregates the information from each team to create a consolidated hierarchy of teams that are used for role-based access control and add them to our policy files that are used to generate manifests. See Identity Roles for a full list of data sources and policies.

graph TB

subgraph "Workday"
    WORKDAY_WORKER[Worker]
    WORKDAY_REGION([Region])
    WORKDAY_DEPARTMENT([Department])
    WORKDAY_DIVISION([Division])
    WORKDAY_JOBTITLE([Job Title])
    WORKDAY_DEPARTMENT -.- WORKDAY_WORKER
    WORKDAY_DIVISION -.- WORKDAY_WORKER
    WORKDAY_REGION -.- WORKDAY_WORKER
    WORKDAY_JOBTITLE -.- WORKDAY_WORKER
    WORKDAY_WORKER -. "Manager Relationship" .-> WORKDAY_WORKER
end

subgraph Identity SaaS Vendor Services
direction LR
subgraph Okta GitLab Tenant
OKTA_PROFILE_MAPPING{{Workday to Okta<br>Profile Mapping}}
IDENTITY_VENDOR_OKTA_API_USERS[("Okta Users")]
IDENTITY_VENDOR_OKTA_API_ENDPOINT[("Okta API<br />https://gitlab.okta.com/api/v1")]
WORKDAY_WORKER -- "SCIM Provisioning<br />Every Hour" --> OKTA_PROFILE_MAPPING
OKTA_PROFILE_MAPPING --> IDENTITY_VENDOR_OKTA_API_USERS
IDENTITY_VENDOR_OKTA_API_USERS --> IDENTITY_VENDOR_OKTA_API_ENDPOINT
end
end

classDef slate fill:#cbd5e1,stroke:#475569,stroke-width:1px;
classDef red fill:#fca5a5,stroke:#dc2626,stroke-width:1px;
classDef orange fill:#fdba74,stroke:#ea580c,stroke-width:1px;
classDef yellow fill:#fcd34d,stroke:#ca8a04,stroke-width:1px;
classDef emerald fill:#6ee7b7,stroke:#059669,stroke-width:1px;
classDef cyan fill:#67e8f9,stroke:#0891b2,stroke-width:1px;
classDef sky fill:#7dd3fc,stroke:#0284c7,stroke-width:1px;
classDef violet fill:#c4b5fd,stroke:#7c3aed,stroke-width:1px;
classDef fuchsia fill:#f0abfc,stroke:#c026d3,stroke-width:1px;

Workday Fields

Here is a non-exhaustive list of Okta profile fields that we use for identity management.

  • Okta ID
  • Name
  • Email
  • Manager Email (managerId)
  • Cost Center (costCenter)
  • Division (division)
  • Department (department)
  • Job Title (title)
  • Hire Date (overlaps with created_at usually)
  • Management Level (workday_managementLevel)
  • Region (Americas, EMEA, APAC)
  • GitLab SaaS Username
  • GitLab SaaS ID
  • Slack ID

We have additional fields that we could use but choose not to for PII risk or irrelevant field reasons. This is a two way door decision on an attribute-by-attribute basis.

  • Corporate Entity (gitlab_loc)
  • Employee Number
  • Workday Job Code
  • Workday ID (similar to Employee Number)
  • Postal Address
  • City
  • State/Province
  • Postal Code
  • Mobile Phone Number
  • Country

User Array Fields

The Identity Platform automation uses our centralized (single) API call to Okta every hour to extract users that are used as the data source for additional automation.

dmurphy:
  provider_id: 00u1b2c3d4e5fg7h8357
  anonymized: false
  type: purple
  first_name: Dade
  last_name: Murphy
  full_name: 'Dade Murphy'
  email: dmurphy@gitlab.com
  handle: dmurphy
  manager: klibby
  id_role: sec_identity_eng
  organization_name: null
  cost_center: rd
  division: security
  department: security
  title: security_engineer
  management_level: individual_contributor
  region: americas
  gitlab_saas_id: 12345678
  gitlab_saas_username: z3r0c00l-example
  slack_id: UA1B2C3D4
  status: active
  created_at_date: 'YYYY-MM-DD'
  created_at_timestamp: 'YYYY-MM-DDTHH:MM:SS.000000Z'
  created_at_age_days: 123
  last_login_at_date: 'YYYY-MM-DD'
  last_login_at_timestamp: 'YYYY-MM-DDTHH:MM:SS.000000Z'
  last_login_at_age_days: 2
  password_updated_at_date: 'YYYY-MM-DD'
  password_updated_at_timestamp: 'YYYY-MM-DDTHH:MM:SS.000000Z'
  password_updated_at_age_days: 123
  profile_updated_at_date: 'YYYY-MM-DD'
  profile_updated_at_timestamp: 'YYYY-MM-DDTHH:MM:SS.000000Z'
  profile_updated_at_age_days: 123
  status_updated_at_date: 'YYYY-MM-DD'
  status_updated_at_timestamp: 'YYYY-MM-DDTHH:MM:SS.000000Z'
  status_updated_at_age_days: 123

Identity Team Functions

The Identity Engineering team was formed in the Security Threat Management sub-department with a cross-department realignment on 2023-12-01 to lead the design and implementation of our next-generation of identity and access management framework and program at GitLab that has been branded as Identity v3 that will be released iteratively throughout 2024.

The Identity Team has three functional specialties and collaborates cross-functionally with our stable counterparts.

Identity Infrastructure Engineering

The Identity Infrastructure team is focused on our top-level cloud provider infrastructure organization-level management for AWS and GCP in collaboration with the Infrastructure Security team.

We build self-service tools for users to create their own AWS accounts and GCP projects and provide castle wall hardening.

Each team that deploys infrastructure resources is responsible for managing their own infrastructure workloads and DevOps operations using industry best practices. In other words, the Security team creates the scaffolding for your castle and provides hardened castle walls, while your team is responsible for anything you build inside the castle walls.

See the Identity Infrastructure handbook page to learn more.

Identity Operations

When we operationalize GitLab Identity v3 in mid-2024, we will have cross-functional team members from IT Operations, People Operations, and Security Operations teams that will perform day-to-day administration of Okta, Okta IGA, and the Identity Platform and handle business and user requests.

In the interim, the Identity Platform Engineering and Identity Infrastructure team members provide coverage in collaboration with our counterparts.

Identity Platform Engineering

The GitLab Identity Security team has CI/CD script and fullstack development skills to build our own open source policy and provisioning automation for our IAM and RBAC needs to supplement our vendors and provide last mile automation “plumbing”.

You may already use GitLab Sandbox Cloud that is powered by HackyStack. We are refactoring HackyStack to become a component of the Identity Platform.

We are in the early incubation stage of building the Identity Platform that is powered by accessctl, a new open source project. As our Identity Platform matures throughout 2024, we will add documentation for the community to adopt our platform and best practices.

Real-Time Updates

Transparency

Due to the nature of the risks that we mitigate, our roadmap is only visible to internal team members in our epics roadmap.

You can learn more about our progress in our Identity Engineering epics and Identity Engineering issues.

We use public issue trackers for platform feature requests, however all issues related to GitLab’s business, data, infrastructure, and risks are created and managed in the Identity Engineering (internal) issue tracker and are linked in open source project merge requests (without disclosing title or contents) after the risk has been mitigated and merged.

After a risk has been mitigated and we believe that we have the latest best practices in place, we publish the documentation in our public handbook, internal handbook, and/or in the Access Control documentation.


Identity Access Requests
The access request process has been automated with Identity Roles and Identity Groups. This page explains the processes that are used to update the role and group policies in accessctl, or adding additional roles and groups to applications with Terraform.
Identity Approvals
A GitLab repository is securely hosted in the Identity Kingdom Black Ops GitLab self-managed instance that is used for managing configuration-as-code/infrastructure-as-code for any actions that can be performed in the Admin UI. This moves all day-to-day administrative actions and global configuration into state management with MR approval rules and CI/CD automation.
Identity Architecture Boundaries
For our organization-level and product production systems access, we use paranoia-level defense in depth for device, user, permission, and lateral movement assurance. This page describes how the Identity Team uses a variety of mechanisms and tools to secure our castle wall boundaries.
Identity Counterparts
Identity and Access Management (IAM) and Role-Based Access Control (RBAC) is a shared responsibility across several teams at GitLab. This page has a directory of all of our stable counterparts.
Identity GitOps Architecture
We use Terraform with a GitOps CI/CD pipeline for managing configuration-as-code and any actions that can be performed in the Admin UI. This moves all day-to-day administrative actions and global configuration into state management with MR approval rules and CI/CD automation.
Identity Infrastructure Management
The Identity Infrastructure team is focused on our top-level cloud provider infrastructure organization-level management for AWS and GCP in collaboration with the Infrastructure Security team. We handle all AWS and GCP access requests and are the maintainers of HackyStack that powers the GitLab Sandbox Cloud. Each team that deploys infrastructure resources is responsible for managing their own infrastructure workloads using industry best practices inside the castle walls created by Security.
Identity Kingdoms and Tech Stack
We have refactored our tech stack into `Identity Kingdoms` (analogous to a realm) to provide separation of concerns between Business, Cloud, and Product (SaaS and Dedicated) unique needs, particularly with administrative control planes and least privilege configuration. This allows us to create automation and policies specific to each kingdom's compliance requirements to enable the respective teams to operate efficiently within our top-level architecture and guardrails.
Identity Platform
The Identity Platform is a collection of microservices and tools that allow us to fetch IAM/RBAC data using each vendor's API, and use GitOps practices to handle state management for provisioning and deprovisioning users and roles across our tech stack applications that have complex hierarchy and permissions that are not supported by Identity Governance vendors. Each of the concepts were invented to help us standardize our IAM/RBAC architecture as we build homegrown automation.
Identity User Guide - Audit and Compliance
The Identity Platform manages access to our tech stack applications. We have automation for extracting audit and compliance artifacts including user listing, RBAC role mappings, application and group user membership, resource configuration, etc. This page provides a quick reference guide and runbooks for internal audit and compliance team members to perform audits and provides reference architecture and policy information for external auditors and compliance community to understand how our platform works to satisfy and exceed compliance requirements.
Identity User Guide - Change Management
The Identity Platform manages the top-level of administrative access and infrastructure for GitLab systems access, and manages access policies for our tech stack applications. We manage all configuration using Terraform (Configuration/Infrastructure-as-Code) or REST API (guess and check policy enforcement with API endpoints) base state management with a GitOps CI/CD approach. This page provides a quick reference guide and runbooks for how we have embedded change management in all of our processes and automation with configuration-as-code state management, merge request approval rules, approval user experience, audit and diff logging, and more.
Identity User Guide - Developers
The Identity Platform is a series of open source tools and reference architecture (paved roads) that the Identity Engineering team has created. We believe that everyone can contribute and help us add more business value, user experience quality of life improvements, and security best practices. This page provides a quick reference guide and runbooks for how internal team members can contribute to the platform and provides an orientation of all the components within the Identity Platform. You can see the Identity Platform documentation for each component to dive deeper and view the contribution guide for each repository after you understand the landscape.
Identity User Guide - Identity Operations
The Identity Platform and Infrastructure has several backend components, infrastructure, and services. This page provides a quick reference guide and runbooks for Identity Operations team members to manage various aspects of the Identity Platform.
Identity User Guide - Incident Response
The Identity Platform manages the top-level of administrative access and infrastructure for GitLab systems access, and manages access policies for our tech stack applications. We manage all configuration using Terraform or REST API for base state management with a GitOps CI/CD approach. We use YAML files for day-to-day user, group and policy management. This page provides a quick reference guide and runbooks for Security Operations team members to respond to incidents and self service guide for frequently asked questions and use cases.
Identity User Guide - Managers
The Identity Platform handles Identity and Access Management (IAM), role-based access control (RBAC), and the application, group, and infrastructure provisioning automation for all users at GitLab. This page provies a quick reference guide and runbook for people managers and directors to create and update Identity Role and Identity Group policies, manage which applications and groups that the people on your team have access to with self-service updates to Identity Role and Identity Group policies. This also includes instructions for adding, renaming, refactoring, or removing job roles and teams from the Identity Platform.
Identity User Guide - Offboarding Operations
The Identity Platform handles the automation of deprovisioning user access to applications, groups, and infrastructure when they leave the company (referred to as offboarding). This page provides a quick reference guide and runbooks for IT, People Operations, and Security Operations team members to manage day-to-day workflows and a self service guide for frequently asked questions and use cases.
Identity User Guide - Onboarding Operations
The Identity Platform handles the automation of provisioning user access to applications, groups, and infrastructure when they join the company (referred to as onboarding). This page provides a quick reference guide and runbooks for IT, People Operations, and Security Operations team members to manage day-to-day workflows and a self service guide for frequently asked questions and use cases.
Identity User Guide - Policy Management
The Identity Platform manages the top-level of administrative access and infrastructure for GitLab systems access, and manages access policies for our tech stack applications. We manage all configuration using Terraform (Configuration/Infrastructure-as-Code) or REST API (guess and check policy enforcement with API endpoints) base state management with a GitOps CI/CD approach. This page provides a quick reference guide and runbooks for how we have embedded change management in all of our processes and automation with configuration-as-code state management, merge request approval rules, approval user experience, audit and diff logging, and more.
Identity User Guide - Team Members
The Identity Platform handles Identity and Access Management (IAM), role-based access control (RBAC), and the application, group, and infrastructure provisioning automation for all users at GitLab. This page provies a quick reference guide and runbook for team members (end users) to understand how their role is used to automatically get access to applications, and learn how to get access to additional applications and systems.
Identity User Guide - Tech Stack Applications
The Identity Platform manages access to our tech stack applications. This page provides a quick reference guide and runbooks for tech stack application and system owners to integrate and manage their application with Okta authentication and Identity Platform access management policies.
Last modified November 14, 2024: Fix broken external links (ac0e3d5e)