A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://docs.gitlab.com/administration/settings/visibility_and_access_controls/ below:

Control access and visibility | GitLab Docs

Administrators of GitLab instances can enforce specific controls on branches, projects, snippets, groups, and more. For example, you can define:

Prerequisites:

To access the visibility and access control options:

  1. On the left sidebar, at the bottom, select Admin.
  2. Select Settings > General.
  3. Expand Visibility and access controls.
Define which roles can create projects

You can add project creation protections to your instance. These protections define which roles can add projects to a group on the instance.

When you configure the Default minimum role required to create projects setting, you set the default for new groups. Existing groups retain their current permissions.

Prerequisites:

  1. On the left sidebar, at the bottom, select Admin.
  2. Select Settings > General.
  3. Expand Visibility and access controls.
  4. For Default minimum role required to create projects, select the desired role:
  5. Select Save changes.

If you select Administrators and Admin Mode is enabled, administrators must enter Admin Mode to create new projects.

Restrict project deletion to administrators

Prerequisites:

To restrict project deletion to only administrators:

  1. On the left sidebar, at the bottom, select Admin.
  2. Select Settings > General.
  3. Expand Visibility and access controls.
  4. Scroll to Allowed to delete projects, and select Administrators.
  5. Select Save changes.

To disable the restriction:

  1. Select Owners and administrators.
  2. Select Save changes.
Deletion protection

History

These protections help guard against accidental deletion of groups and projects on your instance.

Retention period

Groups and projects remain restorable during the retention period you define. By default, this is 7 days, but you can change it. If you set the retention period to 0 days, GitLab removes deleted groups and projects immediately. You can’t restore them.

The retention period must be between 1 and 90 days.

Delayed project deletion

History

Prerequisites:

To configure delayed project deletion:

  1. On the left sidebar, at the bottom, select Admin.
  2. Select Settings > General.
  3. Expand Visibility and access controls.
  4. Scroll to Deletion protection and set the retention period to a value between 1 and 90 days.
  5. Select Save changes.
Delayed group deletion

History

Groups remain restorable if the retention period is 1 or more days.

In GitLab 16.0 and later, the Keep deleted option is removed, and delayed group deletion is the default.

Override defaults and delete immediately

To override the delay, and immediately delete a project marked for removal:

  1. Restore the project.
  2. Delete the project as described in the Administering Projects page.
Configure project visibility defaults

To set the default visibility levels for new projects:

Prerequisites:

  1. On the left sidebar, at the bottom, select Admin.
  2. Select Settings > General.
  3. Expand Visibility and access controls.
  4. Select the desired default project visibility:
  5. Select Save changes.
Configure snippet visibility defaults

To set the default visibility levels for new snippets:

Prerequisites:

  1. On the left sidebar, at the bottom, select Admin.
  2. Select Settings > General.
  3. Expand Visibility and access controls.
  4. For Default snippet visibility, select your desired visibility level:
  5. Select Save changes.
Configure group visibility defaults

To set the default visibility levels for new groups:

Prerequisites:

  1. On the left sidebar, at the bottom, select Admin.
  2. Select Settings > General.
  3. Expand Visibility and access controls.
  4. For Default group visibility, select your desired visibility level:
  5. Select Save changes.

For more details on group visibility, see Group visibility.

Restrict visibility levels

History

When restricting visibility levels, consider how these restrictions interact with permissions for subgroups and projects that inherit their visibility from the item you’re changing.

This setting does not apply to projects created under a personal namespace. There is a feature request to extend this functionality to enterprise users.

To restrict visibility levels for groups, projects, snippets, and selected pages:

Prerequisites:

  1. On the left sidebar, at the bottom, select Admin.
  2. Select Settings > General.
  3. Expand Visibility and access controls.
  4. For Restricted visibility levels, select the desired visibility levels to restrict.
  5. Select Save changes.

You cannot restrict a visibility level that is set as the default for new projects or groups. Conversely, you cannot set a restricted visibility level as the default for new projects or groups.

Configure enabled Git access protocols

With GitLab access restrictions, you can select the protocols users can use to communicate with GitLab. Disabling an access protocol does not block port access to the server itself. The ports used for the protocol, SSH or HTTP(S), are still accessible. The GitLab restrictions apply at the application level.

GitLab allows Git actions only for the protocols you select:

To specify the enabled Git access protocols for all projects on your instance:

Prerequisites:

  1. On the left sidebar, at the bottom, select Admin.
  2. Select Settings > General.
  3. Expand Visibility and access controls.
  4. For Enabled Git access protocols, select your desired protocols:
  5. Select Save changes.

GitLab allows the HTTP(S) protocol for Git clone or fetch requests performed with GitLab CI/CD job tokens. This happens even if you select Only SSH, because GitLab Runner and CI/CD jobs require this setting.

Customize Git clone URL for HTTP(S)

You can customize project Git clone URLs for HTTP(S), which affects the clone panel shown to users on a project’s page. For example, if:

To specify a custom Git clone URL for HTTP(S) in gitlab.rb, set a new value for gitlab_rails['gitlab_ssh_host']. To specify a new value from the GitLab UI:

Prerequisites:

  1. On the left sidebar, at the bottom, select Admin.
  2. Select Settings > General.
  3. Expand Visibility and access controls.
  4. Enter a root URL for Custom Git clone URL for HTTP(S).
  5. Select Save changes.
Configure defaults for RSA, DSA, ECDSA, ED25519, ECDSA_SK, ED25519_SK SSH keys

These options specify the permitted types and lengths for SSH keys.

To specify a restriction for each key type:

  1. On the left sidebar, at the bottom, select Admin.
  2. Select Settings > General.
  3. Expand Visibility and access controls.
  4. Go to RSA SSH keys.
  5. For each key type, you can allow or prevent their use entirely, or allow only lengths of:
  6. Select Save changes.
Enable project mirroring

GitLab enables project mirroring by default. If you disable it, both pull mirroring and push mirroring no longer work in every repository. They can only be re-enabled by an administrator user on a per-project basis.

To allow project maintainers on your instance to configure mirroring per project:

Prerequisites:

  1. On the left sidebar, at the bottom, select Admin.
  2. Select Settings > Repository.
  3. Expand Repository mirroring.
  4. Select Allow project maintainers to configure repository mirroring.
  5. Select Save changes.
Configure globally-allowed IP address ranges

Administrators can combine IP address ranges with IP restrictions per group. Globally-allowed IP addresses enable aspects of the GitLab installation to work properly, even when groups set their own IP address restrictions.

For example, if the GitLab Pages daemon runs on the 10.0.0.0/24 range, globally allow that range. GitLab Pages can still fetch artifacts from pipelines, even if IP address restrictions for the group don’t include the 10.0.0.0/24 range.

To add a IP address range to the allowlist for a group:

Prerequisites:

  1. On the left sidebar, at the bottom, select Admin.
  2. Select Settings > General.
  3. Expand Visibility and access controls.
  4. In Globally-allowed IP ranges, provide a list of IP address ranges. This list:
  5. Select Save changes.
Prevent invitations to groups and projects

History

Administrators can prevent non-administrators from inviting users to all groups or projects on the instance. When you configure this setting, only administrators can invite users to groups or projects on the instance.

Features such as sharing or migrations can still allow access to these groups and projects.

Administrators can also prevent user invitations to a specific group.

Prerequisites:

To prevent invitations to an instance:

  1. On the left sidebar, at the bottom, select Admin.
  2. Select Settings > General.
  3. Expand Visibility and access controls.
  4. Select the Prevent group member invitations checkbox.
  5. Select Save changes.

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4