GitLab - OIDC

In order to use GitLabs as an IdP to authenticate the Akeyless Vault via OIDC, you need to follow the below steps.

Create an application

  1. In your GitLab account, go to Edit profile > Applications.

  2. For Redirect URI set, select the "opened", “profile” and “email“ scope and click Save application.

  1. Once the Application has been created, you need to obtain the Client ID, Client secret:

  1. In order to bind the Gitlab Client ID with your Akeyless Vault account, you need to create an OIDC Authentication Method using either CLI or UI, as described below.

Create OIDC Authentication Method - CLI

akeyless create-auth-method-oidc --name 'my Gitlab app' --issuer --client-id {your-client-id}  --client-secret {your-client-secret} --unique-identifier {your-unique-identifier (e.g 'email' or 'username'')}

Login with OIDC - CLI

  1. You should configure a new profile with your Access-ID from the previous step and OIDC type (if no profile name is provided the default will be configured):
akeyless configure --access-id <your-access-id> --access-type oidc --profile 'gitlab-oidc'
  1. Now, you can run any Akeyless CLI command and be authenticated with Google:
akeyless list-items --profile gitlab-oidc