diff options
author | Patricio Cano <suprnova32@gmail.com> | 2016-07-14 22:47:36 -0500 |
---|---|---|
committer | Patricio Cano <suprnova32@gmail.com> | 2016-07-18 17:52:29 -0500 |
commit | ce58437cfad3c82371b1790e47f97bc5e1d9a889 (patch) | |
tree | 2a1189a8caf804f90fffb2159df6db260596abf8 /doc | |
parent | 8382cff34590648c76fad4ff18a1e1ad74418501 (diff) | |
download | gitlab-ce-ce58437cfad3c82371b1790e47f97bc5e1d9a889.tar.gz |
Fixed `signup_domain_valid?` flow and added documentation.
Diffstat (limited to 'doc')
-rw-r--r-- | doc/administration/access_restrictions.md | 22 | ||||
-rw-r--r-- | doc/administration/img/domain_blacklist.png | bin | 0 -> 178444 bytes |
2 files changed, 20 insertions, 2 deletions
diff --git a/doc/administration/access_restrictions.md b/doc/administration/access_restrictions.md index 51d7996effd..08bb8ff4e19 100644 --- a/doc/administration/access_restrictions.md +++ b/doc/administration/access_restrictions.md @@ -1,6 +1,6 @@ # Access Restrictions -> **Note:** This feature is only available on versions 8.10 and above. +> **Note:** These features are only available on versions 8.10 and above. With GitLab's Access restrictions you can choose which Git access protocols you want your users to use to communicate with GitLab. This feature can be enabled @@ -35,4 +35,22 @@ not selected. > **Note:** Please keep in mind that disabling an access protocol does not actually block access to the server itself. The ports used for the protocol, be it SSH or HTTP, will still be accessible. What GitLab does is restrict access on the - application level.
\ No newline at end of file + application level. + +## Blacklist email domains + +With this feature enabled, you can block email addresses of an specific domain +from creating an account on your GitLab server. This is particularly useful to +prevent spam. Disposable email addresses are usually used by malicious users to +create dummy accounts and spam issues. + +This feature can be activated via the `Application Settings` in the Admin area, +and you have the option of entering the list manually, or uploading a file with +the list. + +The blacklist accepts wildcards, so you can use `*.test.com` to block every +`test.com` subdomain, or `*.io` to block all domains ending in `.io`. Domains +should be separated by a whitespace, semicolon, comma, or a new line. + +![Domain Blacklist](img/domain_blacklist.png) + diff --git a/doc/administration/img/domain_blacklist.png b/doc/administration/img/domain_blacklist.png Binary files differnew file mode 100644 index 00000000000..a7894e5f08d --- /dev/null +++ b/doc/administration/img/domain_blacklist.png |