Add support for groups links to OIDC similar to LDAP group links and SAML group links.
Original issue
Bind the creation of a gitlab group to the OIDC group based on the provider response, allowing dynamic group creation instead of cherry picking each user when a new user comes in.
@adil.farrukh I don't think we should have this feature. Like LDAP and SAML, I think we should use the Group Link approach to map one or more OIDC groups to one or more GitLab groups.
Edit: This comment was in response to the original issue description, which was an automatic creation of GitLab groups based on OIDC groups.
This is exactly what I'm looking for. Two of my customers (both with premium license) would benefit from this feature. Currently we have an external job that syncs group membership, but it has a significant lag.
Why interested: Automate adding members to multiple groups in GitLab when the member is added to Groups in AD.
Problem they are trying to solve: Reduced workload of manually adding users to groups when using OIDC.
Current solution for this problem: None (possibly move to LDAP SSO)
Impact to the customer of not having this: When the person leaves the organization then we have disable the from AD as well as remove from Gitlab groups.
We are migrating away from our LDAP towards Azure AD
Problem they are trying to solve:
Currently users can log in from either the LDAP or AAD, but since the groups are only synced from LDAP, users have to log in at least once with their LDAP credentials for the identity to exist in their accounts. This creates a lot of helpdesk tickets as users log in through OIDC/AAD which is simpler, then have access to nothing.
Current solution for this problem:
Workaround is to either ask users to log in once through LDAP, or manually add their LDAP identity onto their Gitlab account, both of which take Helpdesk time.
Note for consideration as we work toward implementation.
I have wondered for a while if we would be best-served to transition from the specific "SAML Group Links" to a more generic "Group Links" concept, at least for everything but LDAP. LDAP has more unique abilities/needs such as the ability to specify an LDAP filter to indicate which users to sync. However, SAML, SCIM, and OIDC just have generic group names.
Besides reducing duplication, the other reason to consider this is some of these technologies work together for Authn/Authz. For example, users may authenticate via SAML or OIDC but their status is synced via SCIM. Additionally, the underlying identity provider is often the same (Okta supports both SCIM and SAML via a single backend directory). To unify group links ensures that multiple technologies work together, not against each other, and lowers administrative burden.
Why interested:
Immediate use case requires creating Azure AD groups directly within a designated Azure Administrative Unit (AU).By scoping GitLab credential access to the AU instead of granting Azure tenant-level access, we aim to significantly reduce security risks.
A GitLab Premiumcustomer with 2000 seats would like this issue to be prioritized. Why interested: "ITSecurity department requires GitLab group membership to be bound to OIDC groups". Cc @jwyc .