Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
    • Switch to GitLab Next
  • Sign in / Register
GitLab FOSS
GitLab FOSS
  • Project overview
    • Project overview
    • Details
    • Activity
    • Releases
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
    • Locked Files
  • Issues 0
    • Issues 0
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
    • Iterations
  • Merge Requests 0
    • Merge Requests 0
  • Requirements
    • Requirements
    • List
  • Operations
    • Operations
    • Incidents
    • Environments
  • Packages & Registries
    • Packages & Registries
    • Container Registry
  • Analytics
    • Analytics
    • Code Review
    • Insights
    • Issue
    • Repository
    • Value Stream
  • Snippets
    • Snippets
  • Members
    • Members
  • Activity
  • Graph
  • Create a new issue
  • Commits
  • Issue Boards
Collapse sidebar
  • GitLab.org
  • GitLab FOSSGitLab FOSS
  • Issues
  • #40385

Closed
Open
Opened Nov 21, 2017 by Devcurmudgeon@devcurmudgeon

Prohibit admin impersonation of other users

Description

GitLab allows administrators to impersonate other users, taking actions on behalf of these users. GitLab does not provide an audit trail for actions taken under impersonation, and some higher security environments may wish to disable this feature to improve the reliability of the audit trail. Beyond auditing, some organizations may wish to disable this feature for security.

Approach

We should add an option to config/gitlab.yml and gitlab.rb that disables admin impersonations. Impersonations should be enabled by default.

When impersonations are disabled:

  • Attempting to impersonate in the UI or via impersonation token (either by using an existing token or attempting to create a new one) should throw an error.

OP from @devcurmudgeon:

Description

GitLab allows admin staff to impersonate other users. In some situations GitLab user organisations may need to turn this feature off, and be sure that audit trails and history truly reflect the users that performed the actions, for example where projects are subject to external audit.

Proposal

It's not clear to me how this functionality is currently implemented, so I can't comment on how to turn it off, but it should be possible for an organisation working in (say) a secure or safety-critical environment to assert with complete confidence that relevant gitlab code history and other metadata are intact, and could not have been modified by a rogue admin.

Overview

Where GitLab is adopted for (say) regulated industries, the code and processes used to create it may be subject to independent review to establish trust, or to assess liability and accountability in the event.

Use cases

Any organisation that needs to provide guarantees about its code and processes.

Customers

https://gitlab.my.salesforce.com/0016100001CXro6

Edited Nov 06, 2018 by Jeremy Watson (ex-GitLab)
Assignee
Assign to
11.6
Milestone
11.6 (Past due)
Assign milestone
Time tracking
None
Due date
None
Reference: gitlab-org/gitlab-foss#40385