Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Azure Set-up

For managing client secrets and redirect URIs registered in the Entra portal.

Carbide Web

The oauth2 in carbide-web has defaults for most settings:

ENVDESCRIPTION
CARBIDE_WEB_ALLOWED_ACCESS_GROUPSThe list of DL groups allowed to access carbide-web
CARBIDE_WEB_ALLOWED_ACCESS_GROUPS_ID_LISTThe list of UUIDs in Azure that correspond to the DL groups allowed to access carbide-web
CARBIDE_WEB_OAUTH2_CLIENT_IDThe app ID of carbide-web in Azure/Entra
CARBIDE_WEB_OAUTH2_TOKEN_ENDPOINTThe URI for our tenant ID
CARBIDE_WEB_OAUTH2_CLIENT_SECRETA secret used to talk to MS entra/graph.
CARBIDE_WEB_PRIVATE_COOKIEJAR_KEYA secret used for encrypting the cookie values used for sessions.
CARBIDE_WEB_HOSTNAMEA hostname specific for each site that's needed for redirects. The value must match what's set in the Azure/Entra portal for the URL of the carbide-api web interface

Alternative Auth Flow

Some teams use gitlab automation to pull data from the Web UI.

To provide access using the alternative auth flow, perform the following steps:

  • Create a new secret for the team/process
  • Securely provide the team the new secret

The automated process will then be able to fetch an encrypted cookie that will grant access for 10 minutes.

Example:

curl --cookie-jar /tmp/cjar --cookie /tmp/cjar --header 'client_secret: ...' 'https://<the_web_ui_address>/admin/auth-callback'
curl --cookie /tmp/cjar 'https://<the_web_ui_address>/admin/managed-host.json'