Arnica Documentation
  • Introduction
  • Getting Started
    • 🔑Sign Up
    • ▶️SCM Integrations
      • Azure DevOps
      • Bitbucket Cloud
      • Bitbucket Server & Datacenter
      • Github
        • GitHub Audit Logs
        • Github App Permissions
      • Gitlab
    • 📤ChatOps
      • Microsoft Teams
      • Slack
        • Adding Arnica to a New Channel
        • Interacting With the Arnica Slackbot
    • 🎫Ticket Management
      • 🐛Jira Integration
      • 📋ADO Boards Integration
    • 🧠Artificial Intelligence
      • Azure OpenAI
      • OpenAI ChatGPT
    • 🏨On Premise Integrations
  • Inventory
    • 💼Identities, Repositories & Organizations
    • 📇Software Bill of Materials (SBOM)
    • 🦄Prioritization & Product Ownership
  • Hardcoded Secrets
    • 🕵️Secret Detection
    • ⏪Realtime Secret Mitigation
    • 🥕Secrets Policy Settings
  • Code Risks
    • 🎼Static Application Security Testing (SAST)
      • Custom SAST Rules
    • 🧩Software Composition Analysis (SCA)
    • 🔡3rd Party Package Licenses
      • Override License Classifications
    • 🤹3rd Party Package Reputation
      • Identifying Low Rep Packages
      • How to Find Alternative Packages
    • ⛅Infrastructure as Code Security (IaC)
    • 🤖Code Risk Policy Settings
      • Developer Feedback On Push
      • Require Review Before Dismissal
      • 0 New High Severity Vulnerabilities
      • Enforce Remediation SLA
    • 🪄Code Risk Magic Links
    • 📦Code Risk Language and Framework Support
  • Platform Operations
    • 🚪Joining an Existing Org
    • ❌Deleting a Tenant
    • 🫂How do I invite members to my tenant?
      • New User Invitations
    • 👥Users & Roles
    • 🔇Deleting Integrations
    • ⌛Scheduled Jobs
      • How often do Jobs run?
    • 💸Billing
  • Security
    • 🎮Role Based Access Control (RBAC)
    • 🛡️Data Handling
    • 🏛️SSO Integration
      • Okta Integration
      • Entra ID Integration
Powered by GitBook
On this page
  • Ensure service account continuity
  • Create a dedicated application user
  • Prerequisites
  • Grant permissions to application user
  • Installation process
  • Generate a Personal Access Token
  • Integrate

Was this helpful?

  1. Getting Started
  2. SCM Integrations

Gitlab

PreviousGithub App PermissionsNextChatOps

Last updated 1 month ago

Was this helpful?

Overview

Arnica’s Gitlab integration accesses selected environments to extract the and take remediation actions.

Ensure service account continuity

Create a dedicated application user

Arnica's Gitlab integration leverages a Gitlab generated app password tied to a specified user. To avoid the revocation of this token upon the impersonated user's departure, it is highly recommended to create and integrate using a standard application user.

The created user will be visible to all developers as part of Arnica's interactions, such as comments on merge requests. Hence, it is recommended to name the service account properly, such as arnica-service-account

Prerequisites

Grant permissions to application user

  1. Login to Gitlab, and click on the required Gitlab group

  2. Click on "Manage" -> "Groups"

    -Or Navigate to https://gitlab.com/groups/[YOUR_GROUP]/-/group_members

  3. Click on Invite Members , type the username or email of the dedicated service account, select an Owner role, and click on Invite

  1. Accept the invite by the dedicated service account.

If your environment is comprised of multiple groups, repeat the steps above for each group with the same user.

For on-prem GitLab deployments, you must expose the GitLab server over a reachable URL so Arnica can connect and interact with it.

Installation process

Generate a Personal Access Token

  1. Click on Create App Password and assign the following settings to the token:

  1. Remove token expiration by clicking on the "X" next to the Expiration Date.

  2. Click on Create personal access token.

  3. Copy the credentials into a temporary place to use them later in the integration process below.

Integrate

  1. Click on the Access Token tab.

  2. Fill in the token from the step above.

  3. Click on Validate to ensure that the token works properly and then click on OK.

Arnica will integrate with all groups associated with this user. Arnica's default policies include scan-only functionality. While scanning will begin immediately, developers will not see any impact until Arnica's polices are updated to take actions.

Login with the application user and navigate to the .

Navigate to the in Arnica and click on GitLab.

▶️
Personal Access Tokens page
Integrations page
necessary data