Skip to content
GitLab
Next
Projects Groups Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • GitLab GitLab
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
    • Locked Files
  • Issues 44,763
    • Issues 44,763
    • List
    • Boards
    • Service Desk
    • Milestones
    • Iterations
    • Requirements
  • Merge requests 1,329
    • Merge requests 1,329
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
    • Test Cases
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Packages and registries
    • Packages and registries
    • Package Registry
    • Container Registry
    • Infrastructure Registry
  • Monitor
    • Monitor
    • Metrics
    • Incidents
  • Analytics
    • Analytics
    • Value stream
    • CI/CD
    • Code review
    • Insights
    • Issue
    • Repository
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • GitLab.orgGitLab.org
  • GitLabGitLab
  • Issues
  • #214723
Closed
Open
Issue created Apr 16, 2020 by Matt Gonzales (ex-GitLab)@mattgonzales-gitlabContributor

Allow admins and owners to make PAT expiration enforcement optional

Problem to solve

In 12.6 we introduced a PAT expiration setting that automatically revokes tokens when the expiration date has been met or exceeded. This creates friction for users and doesn't provide flexibility in building smoother user experiences around credential rotation.

Currently, the programmatic enforcement of this expiration setting is unchangeable and there's no way to allow for "soft" enforcement to avoid disruption for users.

Intended users

  • Sidney (Systems Administrator)
  • Cameron (Compliance Manager)

Further details

Proposal

Provide a checkbox that allows the administrator or owner to specify "optional enforcement" of PAT expiration.

If enabled, the behavior remains unchanged and PATs are automatically revoked when the date is met or exceeded.

If disabled, GitLab will continue to notify the user via email, CLI, and/or in-app messaging about the expired credential, but will not automatically invalidate it.

clip-2020-06-01

If a user's token is 7-days from expiring, we should display an in-app message to the user that says:

One or more of your personal access tokens will expire soon. Update Now

If a user's token has expired, we should display:

One or more of your personal access tokens has expired. Update Now

This message should probably persist until they dismiss it or take action.

Permissions and Security

Only administrators (for self-managed) and Group Owners (for GitLab.com) can modify this setting.

Documentation

Availability & Testing

What does success look like, and how can we measure that?

What is the type of buyer?

Is this a cross-stage feature?

Links / references

Edited Jun 10, 2020 by Dan Jensen
Assignee
Assign to
Time tracking