Skip to content
Snippets Groups Projects
Commit cedfe9d2 authored by Patricio Cano's avatar Patricio Cano
Browse files

Documentation of feature

parent ea04b019
No related branches found
No related tags found
No related merge requests found
Loading
Loading
@@ -304,6 +304,13 @@ production: &base
# (default: false)
auto_link_saml_user: false
 
# Set different Omniauth providers as external so that all users creating accounts
# via these providers will not be able to have access to internal projects. You
# will need to use the full name of the provider, like `google_oauth2` for Google.
# Refer to the examples below for the full names of the supported providers.
# (default: [])
external_providers: []
## Auth providers
# Uncomment the following lines and fill in the data of the auth provider you want to use
# If your favorite auth provider is not listed you can use others:
Loading
Loading
Loading
Loading
@@ -120,6 +120,29 @@ OmniAuth provider for an existing user.
 
The chosen OmniAuth provider is now active and can be used to sign in to GitLab from then on.
 
## Configure OmniAuth Providers as External
>**Note:**
This setting was introduced with version 8.7 of GitLab
You can define which OmniAuth providers you want to be `external` so that all users
creating accounts via these providers will not be able to have access to internal
projects. You will need to use the full name of the provider, like `google_oauth2`
for Google. Refer to the examples for the full names of the supported providers.
**For Omnibus installations**
```ruby
gitlab_rails['omniauth_external_providers'] = ['twitter', 'google_oauth2']
```
**For installations from source**
```yaml
omniauth:
external_providers: ['twitter', 'google_oauth2']
```
## Using Custom Omniauth Providers
 
>**Note:**
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment