Configuring SSO
These examples assume you are self-hosting Pipekit on the subdomain pipekit.example.com
. Replace this with your actual domain.
GitLab
Go to your GitLab group settings and click on "Applications"
Click on "New Application"
Fill in the details:
Name: [Choose a unique App name]
Tick "Confidential"
Scopes:
read_user
openid
profile
email
Click "Save application"
Note down the Application ID and Secret and pass them to the Helm Chart Values to configure Pipekit.
Microsoft (Azure AD/Entra)
Create a new app registration in your Azure AD tenant.
Fill in the details:
Name: [Choose a unique App name]
Supported account types: Choose the account types you want to support.
Redirect URI:
Platform: Web
After creating the app, create a Client Secret and note it down.
Then add the following API permissions:
Microsoft Graph:
email
openid
profile
User.Read
Note the Application (client) ID and pass it along with the Client Secret to the Helm Chart Values to configure Pipekit.
Last updated