You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+10-4Lines changed: 10 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,14 +18,20 @@ For more information about Workload Identity Federation and how to best authenti
18
18
19
19
## Example
20
20
21
+
> **Warning**
22
+
> GitLab SaaS use a single issuer URL across all organizations and some of the claims embedded in OIDC tokens might not be unique to your organization.
23
+
> To help protect against spoofing threats, you must use an attribute condition that restricts access to tokens issued by your GitLab group.
24
+
21
25
Create Workload Identity Pool and Provider:
22
26
23
27
```hcl
24
-
# Create Workload Identity Pool Provider for GitLab
28
+
# Create Workload Identity Pool Provider for GitLab and restrict access to GitLab group
25
29
module "gitlab-wif" {
26
30
source = "Cyclenerd/wif-gitlab/google"
27
31
version = "~> 1.0.0"
28
-
project_id = "your-project-id"
32
+
project_id = var.project_id
33
+
# Restrict access to username or the name of a GitLab group
| <aname="input_gitlab_account_id"></a> [gitlab\_account\_id](#input\_gitlab\_account\_id)| The account id of the service account for GitLab CI |`string`| n/a | yes |
59
+
| <aname="input_gitlab_group"></a> [gitlab\_group](#input\_gitlab\_group)| The GitLab group or user namespace (namespace path) |`string`| n/a | yes |
0 commit comments