Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update GitLab OIDC to SAML by default #102

Closed
Tracked by #12
Racer159 opened this issue Apr 1, 2024 · 4 comments
Closed
Tracked by #12

Update GitLab OIDC to SAML by default #102

Racer159 opened this issue Apr 1, 2024 · 4 comments
Assignees
Labels
enhancement ✨ New feature or request

Comments

@Racer159
Copy link
Contributor

Racer159 commented Apr 1, 2024

Is your feature request related to a problem? Please describe.

As Ezra I want SAML to be the default GitLab auth so that I can have a more secure default for larger environments.

Describe the solution you'd like

  • Given I specify SSO to be on within the GitLab package
  • And provide no additional bundle overrides
  • When I deploy the package to the cluster
  • Then GitLab will be configured to connect to Keycloak over SAML.

Describe alternatives you've considered

We could leave it as is with OIDC but this is less secure: https://github.com/defenseunicorns/uds-package-gitlab/blob/main/adr/0002-keycloak-integration.md#decision

Additional context

This should minimize breakage for consumers - an option to keep OIDC for those that have / want it should be considered.

@Racer159
Copy link
Contributor Author

Racer159 commented Apr 30, 2024

When doing this we should normalize this package with helm best practices and the new sonarqube package's way of doing things - namely providing consistent values keys for sso configuration (i.e. sso.enabled in the config chart)

This will be a breaking change so we should call that out in the release notes / PR (with a !)

@Racer159
Copy link
Contributor Author

Ignore that previous comment - this is being done here: #115

@Racer159
Copy link
Contributor Author

Normalization should still happen though where we still need to do it though

@ericwyles
Copy link
Contributor

ericwyles commented May 7, 2024

Need this PR merged and a new release of uds-core to finish testing. defenseunicorns/uds-identity-config#77

EDIT: PR to uds-identity-config is merged and included in uds-core main. Just waiting on uds-core next release.

Racer159 added a commit that referenced this issue May 24, 2024
## Description

This PR adds saml protocol support for SSO and sets it as the default.
To go back to OIDC, set the value `sso.protocol` to `openid_connect`
(example in `bundle/uds-config.yaml`)

Also, when `saml` is set as the protocol, this also enables granting
admin access to gitlab using keycloak group membership. By default,
being a member of either `/GitLab Admin` or `/UDS Core/Admin` in
keycloak will grant GitLab admin access.

## Related Issue

Relates to #102 

## Type of change

- [ ] Bug fix (non-breaking change which fixes an issue)
- [x] New feature (non-breaking change which adds functionality)
- [x] Other (security config, docs update, etc)

## Checklist before merging

- [x] Test, docs, adr added or updated as needed
- [x] [Contributor Guide
Steps](https://github.com/defenseunicorns/uds-package-gitlab/blob/main/CONTRIBUTING.md#developer-workflow)
followed

---------

Co-authored-by: Wayne Starr <Racer159@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement ✨ New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants