diff --git a/doc/administration/credentials_inventory.md b/doc/administration/credentials_inventory.md index 7fd66eb279be83e8a1b3535852b79cc4c0553be8..340cf2e5606dafc794ef75971b38a069b5004f74 100644 --- a/doc/administration/credentials_inventory.md +++ b/doc/administration/credentials_inventory.md @@ -10,43 +10,45 @@ type: howto > - [Introduced](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/20912) in GitLab 12.6. > - [Bot-created access tokens not displayed in personal access token list](https://gitlab.com/gitlab-org/gitlab/-/issues/351759) in GitLab 14.9. -GitLab administrators are responsible for the overall security of their instance. To assist, GitLab -provides a Credentials inventory to keep track of all the credentials that can be used to access -their self-managed instance. +As a GitLab administrator, you are responsible for the overall security of your instance. +To assist, GitLab provides an inventory of all the credentials that can be used to access +your self-managed instance. -Use Credentials inventory to see for your GitLab instance all: +In the credentials inventory, you can view all: -- Personal access tokens (PAT). +- Personal access tokens (PATs). - Project access tokens (introduced in GitLab 14.8). - Group access tokens ([introduced](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/102959) in GitLab 15.6). - SSH keys. - GPG keys. -You can also [revoke](#revoke-a-users-personal-access-token) and [delete](#delete-a-users-ssh-key) and see: +You can also [revoke](#revoke-a-users-personal-access-token), [delete](#delete-a-users-ssh-key), and view: - Who they belong to. - Their access scope. - Their usage pattern. -- When they expire. [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/214809) in GitLab 13.2. -- When they were revoked. [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/214809) in GitLab 13.2. +- [In GitLab 13.2 and later](https://gitlab.com/gitlab-org/gitlab/-/issues/214809), when they: + - Expire. + - Were revoked. -To access the Credentials inventory: +## Revoke a user's personal access token + +> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/214811) in GitLab 13.4. + +You can revoke a user's personal access token. 1. On the left sidebar, select **Search or go to**. 1. Select **Admin Area**. 1. Select **Credentials**. +1. By the personal access token, select **Revoke**. -## Revoke a user's personal access token - -> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/214811) in GitLab 13.4. +If a **Revoke** button is not available, the token may be expired or revoked, or an expiration date set. -If you see a **Revoke** button, you can revoke that user's PAT. Whether you see a **Revoke** button depends on the token state, and if an expiration date has been set. For more information, see the following table: - -| Token state | Show Revoke button? | Comments | -|-------------|---------------------|----------------------------------------------------------------------------| -| Active | Yes | Allows administrators to revoke the PAT, such as for a compromised account | -| Expired | No | Not applicable; token is already expired | -| Revoked | No | Not applicable; token is already revoked | +| Token state | Revoke button displayed? | Comments | +|-------------|--------------------------|----------------------------------------------------------------------------| +| Active | Yes | Allows administrators to revoke the PAT, such as for a compromised account | +| Expired | No | Not applicable; token is already expired | +| Revoked | No | Not applicable; token is already revoked | When a PAT is revoked from the credentials inventory, the instance notifies the user by email. @@ -56,10 +58,13 @@ When a PAT is revoked from the credentials inventory, the instance notifies the > [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/243833) in GitLab 14.8. -The **Revoke** button next to a project access token can be selected to revoke that particular project access token. This both: +1. On the left sidebar, expand the top-most chevron (**{chevron-down}**). +1. Select **Admin Area**. +1. Select **Credentials**. +1. Select the **Project Access Tokens** tab. +1. By the project access token, select **Revoke**. -- Revokes the token project access token. -- Enqueues a background worker to delete the project bot user. +The project access token is revoked and a background worker is queued to delete the project bot user.  @@ -67,8 +72,13 @@ The **Revoke** button next to a project access token can be selected to revoke t > [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/225248) in GitLab 13.5. -You can **Delete** a user's SSH key by navigating to the credentials inventory's SSH Keys tab. -The instance then notifies the user. +1. On the left sidebar, expand the top-most chevron (**{chevron-down}**). +1. Select **Admin Area**. +1. Select **Credentials**. +1. Select the **SSH Keys** tab. +1. By the SSH key, select **Delete**. + +The instance notifies the user.  @@ -77,11 +87,11 @@ The instance then notifies the user. > - [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/282429) in GitLab 13.10. > - [Feature flag removed](https://gitlab.com/gitlab-org/gitlab/-/issues/292961) in GitLab 13.12. -You can view all existing GPG in your GitLab instance by navigating to the +You can view all existing GPG in your GitLab instance by going to the credentials inventory GPG Keys tab, as well as the following properties: - Who the GPG key belongs to. - The ID of the GPG key. -- Whether the GPG key is [verified or unverified](../user/project/repository/gpg_signed_commits/index.md) +- Whether the GPG key is [verified or unverified](../user/project/repository/gpg_signed_commits/index.md). 