The Okta Admin Onboarding runbook provides setup instructions for team members that have been provisioned a BLACK admin account to get started with setting up Okta, Google Workspace, and 1Password that is configured separately from your PURPLE accounts.
This runbook requires an access request using the Admin_Black_Account template. All approvals must be completed before provisioning can take place.
AR Temp Credentials
vault named Okta Temp Admin - {firstInitial}{lastName}-admin@gitlab.com
.https://gitlab.okta.com
.https://gitlab.okta.com
and navigate to Directory > People.User
{First name}
{Last name}
{firstinitial}{lastname}-admin@gitlab.com
{firstinitial}{lastname}-admin@gitlab.com
Activate Now
(checked)
(checked)
This task will automatically provision the user's Google Workspace email account based on the
G Suite SSO
application being assigned to the group.
tf_okta_admin_group_
.tf_okta_admin_group_everyone
it_okta_admin_group_{role}
(based on the access request)tf_okta_admin_group_everyone
tab.{firstInitial}{lastName}-admin@gitlab.com
(not their non-admin user).+
icon to add the user to the group.tf_okta_admin_group_{role}
tab.{firstInitial}{lastName}-admin@gitlab.com
(not their non-admin user).+
icon to add the user to the group.This task requires the Google Workspace user account to be initialize for a few minutes before 1Password invitation email can be sent to avoid undeliverable bounce messages. Please take this opportunity to update the access request with the steps that you have performed so far (including screenshots) before starting these steps.
1PW-Workflow-Activation
and open the group.{firstInitial}{lastName}-admin@gitlab.com
(not their non-admin user).+
icon to add the user to the group.STOP! This task should be performed on the same day that you perform the assisted onboarding call and should not be performed at the time that you provision the previous tasks.
AR Temp Credentials
vault named Okta Temp Admin - {firstInitial}{lastName}-admin@gitlab.com
.This is ephemeral for 60 minutes and the password is about to be changed so there is not a security risk with how you share it.
Private
vault.Until we have a Chrome Profile set up with your new email account, we will perform the next few tasks using an incognito browser window to avoid interfering with your existing Okta account.
These steps should be performed in a Chrome incognito browser window.
https://gitlab.okta.com
into the URL bar of your incognito browser window.{firstInitial}{lastName}-admin@gitlab.com
Your Okta password has expired
.Our Okta admin account policies require
YubiKey 5 FIPS
models that are verified by IT Engineering behind-the-scenes. There is no way to restrict these models in the Okta configuration, so please be sure not to enroll your Mac Touch ID or other WebAuthn factors. You will be contacted by IT if any of your factors are not allowed and were removed administratively.
Set up security methods
.Security Key or Biometric Authenticator
.
G Suite SSO Account
tile.Welcome to your new account
screen with the terms and conditions, click the I understand button.
https://gitlab.com/{username}
and right click on your avatar and choose Save image as to save it to your desktop.
Signing in to Google
section, click the 2-Step Verification row.Have your security key?
, click the NEXT button. You can ignore the instructions for Make sure your key is with you, but not connected to your device
. You can leave your YubiKey inserted.
YubiKey 5C FIPS
).
Other Profiles
section.
Set up your new Chrome profile
, click the Sign in button.
Sign in to Chrome
, enter your admin email address (ex. dmurphy-admin@gitlab.com
).
dmurphy-admin@gitlab.com
credentials. Copy the password from the 1Password record.
Your organization will manage this profile
. Click the Continue button.
Turn on sync?
, click the Settings button.
Sync everything
to Customize sync
, then uncheck the Passwords
toggle.Manage what you sync
to return back to the main configuration screen.
GitLab Admin (Black)
and choose a theme color (ex. Black). This name refers to the PURPLE vs BLACK wristband access levels.
GitLab Admin (Black)
profile selected, press Cmd+Shift+B to show the bookmarks menu bar.https://gitlab.okta.com
and sign in with your {handle}-admin@gitlab.com
account using the credentials stored in 1Password. You will be prompted to verify your identity with USB Key MFA and touching your YubiKey.Admin
button and open in a new tab.Okta Admin
.
G Suite SSO Mail
tile and open in a new tab.Gmail
.Join gitlab on 1Password
.
{handle}@gitlab.com
account.1Password Emergency Kit
PDF file from the Downloads
folder.
1Password Emergency Kit
PDF file and click Delete Immediately.
your account administrator has been notified to complete the recovery
.Warning: You need to wait to receive a
Welcome to 1Password
email in your new{handle}-admin@gitlab.com
Gmail inbox (not your normal email account). Please refresh your email inbox until this email appears indicating that your account has been provisioned. This allows time for the background job automation to provision your 1Password account. No manual intervention is needed by an administrator, this simply takes up to 5 minutes usually.
https://gitlab.1password.com
.{handle}-admin@gitlab.com
), secret key, and master password.Get the 1Password browser extension
section, click the Get it now button.
Integrate with 1Password app
. This allows us to add separate 1Password accounts that don't conflict with your normal user account on your laptop.
Accounts & Vaults
.gitlab
account and click Sign Out.{handle}-admin@gitlab.com
), secret key, and master password.{handle}-admin@gitlab.com
1Password account from this Chrome browser profile. You will not be able to access this 1Password account from the normal Mac app.1Password
.
+
button to add a new Login
record.Okta Admin
{firstInitial}{lastName}-admin@gitlab.com
https://gitlab.okta.com
This password change allows us to rotate your credentials now that the record is stored in your BLACK account vault, and ensures that your PURPLE account vault does not have the credentials to sign into your Okta Admin account.
Okta Admin
bookmark that you created.Password
security method and click the Reset button. Press Yes when prompted.Okta Temp Admin
1Password record).Okta Temp Admin
record from your 1Password app since these credentials are no longer valid and are exclusively stored in your admin vault now.If you experience any problems, please tag @it-eng
in #it_help
for assistance.
If you have feedback on this runbook, please create a new merge request with suggested changes.