Skip to content

Allow Group Owners to Selectively Bypass Email Validation using a Group Verified Domain

Problem to solve

Our Commercial customers have expressed interest in a way to add users to their groups without validating their emails. The theory is, if they come through their SSO solution, they should not need to be verified again in GitLab. Since this could result in a security issue, the verifying of emails coming through SSO should be limited to domains the customer proves ownership over. Related to #23611 (closed). If an email added through SSO does not belong to the customer's group verified domain(s), then it should require extra validation. We should not automatically validate emails for any other domains coming through SSO.

Intended users

User experience goal

Users coming to GitLab from corporate SSO should have a seamless adoption experience if the customer has already verified ownership of their corporate domains.

Proposal

Allow customers to add verified domains to their GitLab.com hosted group as described in #23611 (closed). The framework for such a feature already exists within Pages Custom domains and SSL/TLS Certificates. We can then use that verified domain to auto-verify account emails that belong to that verified domain. We could expand this a little more and prevent users from adding additional emails to these types of accounts. Tying into and further locking down Group Managed Accounts.

Further details

When users are added through SSO that do not have resolvable emails, they are unable to validate them. Since SaaS users do to have access to admin tools, users need to open a support ticket to resolve. We have customers that run into this issue on a regular basis, requiring many tickets to validate those accounts. We should make it easier for companies and their employees to adopt and grow their userbase, with as little friction to getting started as possible, while also keeping their groups secure.

Permissions and Security

Only group Owners should be able to verify a corporate domain and enable the verification bypass on that verified domain. Both in the UI and via the API.

Documentation

Self-managed customers can already bypass the validation by disabling User email confirmation at sign-up. They also have admin rights, so can do all of the things described in Updating to GitLab 13.2: Email confirmation issues

Availability & Testing

What does success look like, and how can we measure that?

Success is customer SSO accounts being created with their corporate domains without any friction. Measured by the reduction in support tickets and requests to verify corporate domain accounts.

What is the type of buyer?

For the SSO validation bypass, the tier could be Ultimate/Gold based on the type of buyer. It would fit better in Premium/Silver with the rest of the Group SSO features. This feature was initially requested by a current Ultimate customer - https://gitlab.my.salesforce.com/0016100000KvahJ (Internal) and entered on their behalf.

Is this a cross-stage feature?

Based on the proposal, suspect the following groups/stages:

Links / references

Directly related to Group domain verification

This page may contain information related to upcoming products, features and functionality. It is important to note that the information presented is for informational purposes only, so please do not rely on the information for purchasing or planning purposes. Just like with all projects, the items mentioned on the page are subject to change or delay, and the development, release, and timing of any products, features, or functionality remain at the sole discretion of GitLab Inc.

Edited by 🤖 GitLab Bot 🤖