summaryrefslogtreecommitdiff
path: root/doc/integration
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2020-03-20 21:09:17 +0000
committerGitLab Bot <gitlab-bot@gitlab.com>2020-03-20 21:09:17 +0000
commit68f1860e6f1f9e8441c434f4e62238c359ce8c7c (patch)
treed12eab92b88fdcd0bdcea4586ec5352898b16e6c /doc/integration
parent1af0d38d9c5a88d7123283c714857dc4da991371 (diff)
downloadgitlab-ce-68f1860e6f1f9e8441c434f4e62238c359ce8c7c.tar.gz
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'doc/integration')
-rw-r--r--doc/integration/saml.md15
1 files changed, 15 insertions, 0 deletions
diff --git a/doc/integration/saml.md b/doc/integration/saml.md
index 001e2883de0..3597fe6df1e 100644
--- a/doc/integration/saml.md
+++ b/doc/integration/saml.md
@@ -67,6 +67,8 @@ in your SAML IdP:
auto_link_saml_user: true
```
+1. Ensure that the SAML [`NameID`](../user/group/saml_sso/index.md#nameid) and email address are fixed for each user, as described in the section on [Security](#security). Otherwise, your users will be able to sign in as other authorized users.
+
1. Add the provider configuration:
For Omnibus package:
@@ -430,6 +432,8 @@ args: {
}
```
+Make sure you read the [Security](#security) section before changing this value.
+
## Response signature validation (required)
We require Identity Providers to sign SAML responses to ensure that the assertions are
@@ -544,6 +548,17 @@ args: {
GitLab will sign the request with the provided private key. GitLab will include the configured public x500 certificate in the metadata for your Identity Provider to validate the signature of the received request with. For more information on this option, see the [Ruby SAML gem documentation](https://github.com/onelogin/ruby-saml/tree/v1.7.0). The Ruby SAML gem is used by the [OmniAuth SAML gem](https://github.com/omniauth/omniauth-saml) to implement the client side of the SAML authentication.
+## Security
+
+Avoid user control of the following attributes:
+
+- [`*NameID*`](../user/group/saml_sso/index.md#nameid)
+- *Email* when used with `omniauth_auto_link_saml_user`
+
+These attributes define the SAML user. If users can change these attributes, they can impersonate others.
+
+Refer to the documentation for your [SAML Identity Provider](../user/group/saml_sso/index.md#providers) for information on how to fix these attributes.
+
## Troubleshooting
### GitLab+SAML Testing Environments