Identity Access Requests
Not Live Yet
You are viewing a preview of documentation for the future state of GitLab Identity v3 (mid 2024). See the Access Management Policy for the GitLab Identity v2 current state with baseline entitlements and access requests. See the roadmap in the epics gantt chart.Access Requests
If a user needs access to an application, there are several approaches:
-
The user’s attributes match the existing criteria of a role or organization unit that has already been attached to the Okta application. Access is automatically granted without a request.
-
The organization unit group policy
CODEOWNER
(ex. division leader or department manager or Executive Business Assistant) can update the policy inaccessctl
to include the additional role. The manifest of users for the organization unit is automatically recalculated and the users will be added to the organization unit Okta group that has already been attached to the application. -
The application CODEOWNER can add the additional role group to the application using Terraform.
This provides improved maintenance since the division and department leaders or their delegate (ex. Executive Business Administrator) centrally manage the policies for organization unit groups and which roles are members.
Since the users that are attached to each group are managed by accessctl
policies and REST API calls (not Terraform), the changes to Terraform state management are far and few between which simplifies auditability.
ac0e3d5e
)