You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This guide walks you through setting up a GitLab application to enable GitLab integration for your Plane workspace on a self-hosted instance. Since self-hosted environments don’t come pre-configured for GitLab, you’ll need to create an application, configure authentication, and set the necessary permissions to ensure seamless integration.
Self-hosted GitLab instances for organizations with specific compliance or security requirements
15
+
8
16
In this guide, you’ll:
9
17
10
-
1.[Create and configure a GitLab Application](/self-hosting/govern/integrations/gitlab#create-a-gitlab-application)
18
+
1.[Create and configure a GitLab Application](/self-hosting/govern/integrations/gitlab#create-gitlab-application)
11
19
2.[Configure your Plane instance](/self-hosting/govern/integrations/gitlab#configure-plane-instance)
12
20
21
+
<Warning>
22
+
**Activate GitLab integration**
23
+
24
+
After creating and configuring the GitLab application and configuring the instance as detailed on this page, you'll need to [setup the GitLab integration](https://docs.plane.so/integrations/gitlab) within Plane.
25
+
</Warning>
26
+
13
27
## Create GitLab Application
14
28
15
-
1. On the left sidebar in GitLab, select your avatar.
29
+
<Tabs>
30
+
<Tabtitle="GitLab Cloud">
31
+
1. On the left sidebar in GitLab, select your avatar.
16
32
17
-
2. Select **Preferences** tab.
33
+
2. Select **Preferences** tab.
18
34
19
-
3. Navigate to the **Applications** tab.
35
+
3. Navigate to the **Applications** tab.
20
36
21
-
4. Click on **Add new application** to begin the setup.
8. Set permissions by selecting the required **Scopes**. The table below explains each scope:
51
+
52
+
|Permission|Explanation|
53
+
|----------|-----------|
54
+
|`api`|Grants full read/write access to the API, including all groups, projects, container registry, dependency proxy, and package registry. Required for API requests.|
55
+
|`read_api`|Allows read-only access to all groups, projects, container registry, and package registry.|
56
+
|`read_user`|Grants read-only access to user profiles via the /user API endpoint, including username, public email, and full name. Also provides access to /users endpoints.|
57
+
|`read_repository`|Enables read-only access to repositories in private projects via Git-over-HTTP or the Repository Files API.|
58
+
|`write_repository`|Allows read/write access to repositories on private projects via Git-over-HTTP (not through the API).|
59
+
|`profile`|Grants read-only access to the user's profile data using OpenID Connect.|
60
+
|`email`|Provides read-only access to the user's primary email address using OpenID Connect.|
61
+
62
+
9. Click **Save Application** to finalize the setup.
63
+
</Tab>
64
+
65
+
<Tabtitle="GitLab Self-managed">
66
+
1. Log in to your GitLab instance.
67
+
2. Click on your profile icon in the top-right corner.
68
+
3. From the dropdown menu that appears, select **Edit profile**.
69
+
4. Look for and select the **Applications** option within this menu.
Fill in the application details with the following configuration:
33
76
34
-
8. Set permissions by selecting the required **Scopes**. The table below explains each scope:
77
+
-**Name**
78
+
Enter a descriptive name for your application (e.g., `Plane Local Dev` or `Plane Integration`).
35
79
36
-
|Permission|Explanation|
37
-
|----------|-----------|
38
-
|`api`|Grants full read/write access to the API, including all groups, projects, container registry, dependency proxy, and package registry. Required for API requests.|
39
-
|`read_api`|Allows read-only access to all groups, projects, container registry, and package registry.|
40
-
|`read_user`|Grants read-only access to user profiles via the /user API endpoint, including username, public email, and full name. Also provides access to /users endpoints.|
41
-
|`read_repository`|Enables read-only access to repositories in private projects via Git-over-HTTP or the Repository Files API.|
42
-
|`write_repository`|Allows read/write access to repositories on private projects via Git-over-HTTP (not through the API).|
43
-
|`profile`|Grants read-only access to the user's profile data using OpenID Connect.|
44
-
|`email`|Provides read-only access to the user's primary email address using OpenID Connect.|
80
+
-**Redirect URI**
81
+
The redirect URI depends on your Plane deployment:
4. Once you've completed the instance configuration, [activate the GitLab integration in Plane](https://docs.plane.so/integrations/gitlab).
129
+
4. Once you've completed the instance configuration, [activate the GitLab integration in Plane](https://docs.plane.so/integrations/gitlab?edition=gitlab-cloud).
130
+
131
+
</Tab>
132
+
133
+
<Tabtitle="GitLab Self-managed">
134
+
135
+
1. Copy the **Application ID** and **Secret** from the newly created application.
2. Once you've created the application, [activate the GitLab Self-managed integration in Plane](https://docs.plane.so/integrations/gitlab?edition=gitlab-self-managed).
0 commit comments