Commit ae8dd0cb authored by Amy Qualls's avatar Amy Qualls

Future tense cleanup, unowned files

Changes future tense to present tense in pages that have metadata of
group: unassigned.
parent ba7ae3a3
...@@ -12,7 +12,7 @@ recommended for ease of future upgrades or keeping the data you create. ...@@ -12,7 +12,7 @@ recommended for ease of future upgrades or keeping the data you create.
## Initial setup ## Initial setup
In this guide you'll configure a Digital Ocean droplet and set up Docker This guide configures a Digital Ocean droplet and sets up Docker
locally on either macOS or Linux. locally on either macOS or Linux.
### On macOS ### On macOS
...@@ -39,10 +39,10 @@ The rest of the steps are identical for macOS and Linux. ...@@ -39,10 +39,10 @@ The rest of the steps are identical for macOS and Linux.
1. Login to Digital Ocean. 1. Login to Digital Ocean.
1. Generate a new API token at <https://cloud.digitalocean.com/settings/api/tokens>. 1. Generate a new API token at <https://cloud.digitalocean.com/settings/api/tokens>.
This command will create a new DO droplet called `gitlab-test-env-do` that will act as a Docker host. This command creates a new Digital Ocean droplet called `gitlab-test-env-do` that acts as a Docker host.
NOTE: NOTE:
4GB is the minimum requirement for a Docker host that will run more than one GitLab instance. 4GB is the minimum requirement for a Docker host that runs more than one GitLab instance.
- RAM: 4GB - RAM: 4GB
- Name: `gitlab-test-env-do` - Name: `gitlab-test-env-do`
...@@ -70,7 +70,7 @@ Resource: <https://docs.docker.com/machine/drivers/digital-ocean/>. ...@@ -70,7 +70,7 @@ Resource: <https://docs.docker.com/machine/drivers/digital-ocean/>.
### Connect your shell to the new machine ### Connect your shell to the new machine
In this example we'll create a GitLab EE 8.10.8 instance. This example creates a GitLab EE 8.10.8 instance.
First connect the Docker client to the Docker host you created previously. First connect the Docker client to the Docker host you created previously.
......
...@@ -10,7 +10,7 @@ WARNING: ...@@ -10,7 +10,7 @@ WARNING:
As of September 13, 2017, the GitLab Enterprise Plus for Pivotal Cloud Foundry As of September 13, 2017, the GitLab Enterprise Plus for Pivotal Cloud Foundry
tile on Pivotal Network has reached its End of Availability (“EoA”) and is no tile on Pivotal Network has reached its End of Availability (“EoA”) and is no
longer available for download or sale through Pivotal. Current customers with longer available for download or sale through Pivotal. Current customers with
active subscriptions will continue to receive support from GitLab through their active subscriptions continue to receive support from GitLab through their
subscription term. Pivotal and GitLab are collaborating on creating a new subscription term. Pivotal and GitLab are collaborating on creating a new
Kubernetes-based tile for the Pivotal Container Service. Please contact GitLab Kubernetes-based tile for the Pivotal Container Service. Please contact GitLab
support with any questions regarding GitLab Enterprise Plus for Pivotal Cloud Foundry. support with any questions regarding GitLab Enterprise Plus for Pivotal Cloud Foundry.
......
...@@ -40,9 +40,9 @@ to endpoints like `http://localhost:123/some-resource/delete`. ...@@ -40,9 +40,9 @@ to endpoints like `http://localhost:123/some-resource/delete`.
To prevent this type of exploitation from happening, starting with GitLab 10.6, To prevent this type of exploitation from happening, starting with GitLab 10.6,
all Webhook requests to the current GitLab instance server address and/or in a all Webhook requests to the current GitLab instance server address and/or in a
private network will be forbidden by default. That means that all requests made private network are forbidden by default. That means that all requests made
to `127.0.0.1`, `::1` and `0.0.0.0`, as well as IPv4 `10.0.0.0/8`, `172.16.0.0/12`, to `127.0.0.1`, `::1` and `0.0.0.0`, as well as IPv4 `10.0.0.0/8`, `172.16.0.0/12`,
`192.168.0.0/16` and IPv6 site-local (`ffc0::/10`) addresses won't be allowed. `192.168.0.0/16` and IPv6 site-local (`ffc0::/10`) addresses aren't allowed.
This behavior can be overridden by enabling the option *"Allow requests to the This behavior can be overridden by enabling the option *"Allow requests to the
local network from web hooks and services"* in the *"Outbound requests"* section local network from web hooks and services"* in the *"Outbound requests"* section
...@@ -75,9 +75,9 @@ The allowlist can hold a maximum of 1000 entries. Each entry can be a maximum of ...@@ -75,9 +75,9 @@ The allowlist can hold a maximum of 1000 entries. Each entry can be a maximum of
255 characters. 255 characters.
You can allow a particular port by specifying it in the allowlist entry. You can allow a particular port by specifying it in the allowlist entry.
For example `127.0.0.1:8080` will only allow connections to port 8080 on `127.0.0.1`. For example `127.0.0.1:8080` only allows connections to port 8080 on `127.0.0.1`.
If no port is mentioned, all ports on that IP/domain are allowed. An IP range If no port is mentioned, all ports on that IP/domain are allowed. An IP range
will allow all ports on all IPs in that range. allows all ports on all IPs in that range.
Example: Example:
......
...@@ -249,7 +249,7 @@ Please refer to `group_rename` and `user_rename` for that case. ...@@ -249,7 +249,7 @@ Please refer to `group_rename` and `user_rename` for that case.
} }
``` ```
If the user is blocked via LDAP, `state` will be `ldap_blocked`. If the user is blocked via LDAP, `state` is `ldap_blocked`.
**User renamed:** **User renamed:**
......
...@@ -8,13 +8,13 @@ type: howto, reference ...@@ -8,13 +8,13 @@ type: howto, reference
# Email from GitLab **(STARTER ONLY)** # Email from GitLab **(STARTER ONLY)**
GitLab provides a simple tool to administrators for emailing all users, or users of GitLab provides a simple tool to administrators for emailing all users, or users of
a chosen group or project, right from the Admin Area. Users will receive the email a chosen group or project, right from the Admin Area. Users receive the email
at their primary email address. at their primary email address.
## Use-cases ## Use-cases
- Notify your users about a new project, a new feature, or a new product launch. - Notify your users about a new project, a new feature, or a new product launch.
- Notify your users about a new deployment, or that will be downtime expected - Notify your users about a new deployment, or that downtime is expected
for a particular reason. for a particular reason.
## Sending emails to users from within GitLab ## Sending emails to users from within GitLab
...@@ -24,9 +24,9 @@ at their primary email address. ...@@ -24,9 +24,9 @@ at their primary email address.
![admin users](email1.png) ![admin users](email1.png)
1. Compose an email and choose where it will be sent (all users or users of a 1. Compose an email and choose where to send it (all users or users of a
chosen group or project). The email body only supports plain text messages. chosen group or project). The email body only supports plain text messages.
HTML, Markdown, and other rich text formats are not supported, and will be HTML, Markdown, and other rich text formats are not supported, and is
sent as plain text to users. sent as plain text to users.
![compose an email](email2.png) ![compose an email](email2.png)
...@@ -40,7 +40,7 @@ Users can choose to unsubscribe from receiving emails from GitLab by following ...@@ -40,7 +40,7 @@ Users can choose to unsubscribe from receiving emails from GitLab by following
the unsubscribe link in the email. Unsubscribing is unauthenticated in order the unsubscribe link in the email. Unsubscribing is unauthenticated in order
to keep this feature simple. to keep this feature simple.
On unsubscribe, users will receive an email notification that unsubscribe happened. On unsubscribe, users receive an email notification that unsubscribe happened.
The endpoint that provides the unsubscribe option is rate-limited. The endpoint that provides the unsubscribe option is rate-limited.
<!-- ## Troubleshooting <!-- ## Troubleshooting
......
...@@ -51,7 +51,7 @@ For other distributions, follow the instructions in PostgreSQL's ...@@ -51,7 +51,7 @@ For other distributions, follow the instructions in PostgreSQL's
[download page](https://www.postgresql.org/download/) to add their repository [download page](https://www.postgresql.org/download/) to add their repository
and then install `pgloader`. and then install `pgloader`.
If you are migrating to a Docker based installation, you will need to install If you are migrating to a Docker based installation, you must install
pgloader within the container as it is not included in the container image. pgloader within the container as it is not included in the container image.
1. Start a shell session in the context of the running container: 1. Start a shell session in the context of the running container:
...@@ -69,7 +69,7 @@ pgloader within the container as it is not included in the container image. ...@@ -69,7 +69,7 @@ pgloader within the container as it is not included in the container image.
## Omnibus GitLab installations ## Omnibus GitLab installations
For [Omnibus GitLab packages](https://about.gitlab.com/install/), you'll first For [Omnibus GitLab packages](https://about.gitlab.com/install/), you first
need to enable the bundled PostgreSQL: need to enable the bundled PostgreSQL:
1. Stop GitLab: 1. Stop GitLab:
...@@ -84,13 +84,13 @@ need to enable the bundled PostgreSQL: ...@@ -84,13 +84,13 @@ need to enable the bundled PostgreSQL:
postgresql['enable'] = true postgresql['enable'] = true
``` ```
1. Edit `/etc/gitlab/gitlab.rb` to use the bundled PostgreSQL. Please check 1. Edit `/etc/gitlab/gitlab.rb` to use the bundled PostgreSQL. Review all of the
all the settings beginning with `db_`, such as `gitlab_rails['db_adapter']` settings beginning with `db_` (such as `gitlab_rails['db_adapter']`). To use
and alike. You could just comment all of them out so that we'll just use the default values, you can comment all of them out.
the defaults.
1. [Reconfigure GitLab](../administration/restart_gitlab.md#omnibus-gitlab-reconfigure) 1. [Reconfigure GitLab](../administration/restart_gitlab.md#omnibus-gitlab-reconfigure)
for the changes to take effect. for the changes to take effect.
1. Start Unicorn and PostgreSQL so that we can prepare the schema: 1. Start Unicorn and PostgreSQL so that we can prepare the schema:
```shell ```shell
...@@ -110,9 +110,9 @@ need to enable the bundled PostgreSQL: ...@@ -110,9 +110,9 @@ need to enable the bundled PostgreSQL:
sudo gitlab-ctl stop unicorn sudo gitlab-ctl stop unicorn
``` ```
After these steps, you'll have a fresh PostgreSQL database with up-to-date schema. After these steps, you have a fresh PostgreSQL database with up-to-date schema.
Next, we'll use `pgloader` to migrate the data from the old MySQL database to the Next, use `pgloader` to migrate the data from the old MySQL database to the
new PostgreSQL one: new PostgreSQL one:
1. Save the following snippet in a `commands.load` file, and edit with your 1. Save the following snippet in a `commands.load` file, and edit with your
...@@ -178,7 +178,7 @@ You can now verify that everything works as expected by visiting GitLab. ...@@ -178,7 +178,7 @@ You can now verify that everything works as expected by visiting GitLab.
## Source installations ## Source installations
For installations from source that use MySQL, you'll first need to For installations from source that use MySQL, you must first
[install PostgreSQL and create a database](../install/installation.md#6-database). [install PostgreSQL and create a database](../install/installation.md#6-database).
After the database is created, go on with the following steps: After the database is created, go on with the following steps:
...@@ -211,9 +211,9 @@ After the database is created, go on with the following steps: ...@@ -211,9 +211,9 @@ After the database is created, go on with the following steps:
sudo -u git -H bundle exec rake db:create db:migrate RAILS_ENV=production sudo -u git -H bundle exec rake db:create db:migrate RAILS_ENV=production
``` ```
After these steps, you'll have a fresh PostgreSQL database with up-to-date schema. After these steps, you have a fresh PostgreSQL database with up-to-date schema.
Next, we'll use `pgloader` to migrate the data from the old MySQL database to the Next, use `pgloader` to migrate the data from the old MySQL database to the
new PostgreSQL one: new PostgreSQL one:
1. Save the following snippet in a `commands.load` file, and edit with your 1. Save the following snippet in a `commands.load` file, and edit with your
......
...@@ -65,7 +65,7 @@ sudo gitlab-rake gitlab:db:mark_migration_complete[20151103134857] ...@@ -65,7 +65,7 @@ sudo gitlab-rake gitlab:db:mark_migration_complete[20151103134857]
``` ```
Once the migration is successfully marked, run the Rake `db:migrate` task again. Once the migration is successfully marked, run the Rake `db:migrate` task again.
You will likely have to repeat this process several times until all failed You might need to repeat this process several times until all failed
migrations are marked complete. migrations are marked complete.
### GitLab < 8.6 ### GitLab < 8.6
...@@ -86,5 +86,5 @@ exit ...@@ -86,5 +86,5 @@ exit
``` ```
Once the migration is successfully marked, run the Rake `db:migrate` task again. Once the migration is successfully marked, run the Rake `db:migrate` task again.
You will likely have to repeat this process several times until all failed You might need to repeat this process several times until all failed
migrations are marked complete. migrations are marked complete.
...@@ -128,7 +128,7 @@ sudo -u git -H bundle exec rake gitlab:backup:restore RAILS_ENV=production ...@@ -128,7 +128,7 @@ sudo -u git -H bundle exec rake gitlab:backup:restore RAILS_ENV=production
Certain versions of GitLab may require you to perform additional steps when Certain versions of GitLab may require you to perform additional steps when
upgrading from Community Edition to Enterprise Edition. Should such steps be upgrading from Community Edition to Enterprise Edition. Should such steps be
necessary, they will listed per version below. necessary, they are listed per version below.
<!-- <!--
Example: Example:
......
...@@ -8,7 +8,7 @@ comments: false ...@@ -8,7 +8,7 @@ comments: false
# Upgrading Community Edition and Enterprise Edition from source # Upgrading Community Edition and Enterprise Edition from source
NOTE: NOTE:
Users wishing to upgrade to 12.0.0 will have to take some extra steps. See the Users wishing to upgrade to 12.0.0 must take some extra steps. See the
version specific upgrade instructions for 12.0.0 for more details. version specific upgrade instructions for 12.0.0 for more details.
Make sure you view this update guide from the branch (version) of GitLab you Make sure you view this update guide from the branch (version) of GitLab you
...@@ -284,12 +284,12 @@ longer handles setting it. ...@@ -284,12 +284,12 @@ longer handles setting it.
If you are using Apache instead of NGINX see the updated [Apache templates](https://gitlab.com/gitlab-org/gitlab-recipes/tree/master/web-server/apache). If you are using Apache instead of NGINX see the updated [Apache templates](https://gitlab.com/gitlab-org/gitlab-recipes/tree/master/web-server/apache).
Also note that because Apache does not support upstreams behind Unix sockets you Also note that because Apache does not support upstreams behind Unix sockets you
will need to let GitLab Workhorse listen on a TCP port. You can do this must let GitLab Workhorse listen on a TCP port. You can do this
via [`/etc/default/gitlab`](https://gitlab.com/gitlab-org/gitlab/blob/master/lib/support/init.d/gitlab.default.example#L38). via [`/etc/default/gitlab`](https://gitlab.com/gitlab-org/gitlab/blob/master/lib/support/init.d/gitlab.default.example#L38).
#### SMTP configuration #### SMTP configuration
If you're installing from source and use SMTP to deliver mail, you will need to If you're installing from source and use SMTP to deliver mail, you must
add the following line to `config/initializers/smtp_settings.rb`: add the following line to `config/initializers/smtp_settings.rb`:
```ruby ```ruby
......
...@@ -9,7 +9,7 @@ info: To determine the technical writer assigned to the Stage/Group associated w ...@@ -9,7 +9,7 @@ info: To determine the technical writer assigned to the Stage/Group associated w
Two-factor authentication (2FA) provides an additional level of security to your Two-factor authentication (2FA) provides an additional level of security to your
GitLab account. After being enabled, in addition to supplying your username and GitLab account. After being enabled, in addition to supplying your username and
password to sign in, you'll be prompted for a code generated by your one-time password to sign in, you are prompted for a code generated by your one-time
password authenticator (for example, a password manager on one of your devices). password authenticator (for example, a password manager on one of your devices).
By enabling 2FA, the only way someone other than you can sign in to your account By enabling 2FA, the only way someone other than you can sign in to your account
...@@ -22,20 +22,21 @@ TIP: **Tip:** ...@@ -22,20 +22,21 @@ TIP: **Tip:**
When you enable 2FA, don't forget to back up your [recovery codes](#recovery-codes)! When you enable 2FA, don't forget to back up your [recovery codes](#recovery-codes)!
In addition to time-based one time passwords (TOTP), GitLab supports U2F In addition to time-based one time passwords (TOTP), GitLab supports U2F
(universal 2nd factor) and WebAuthn (experimental) devices as the second factor of authentication. Once (universal 2nd factor) and WebAuthn (experimental) devices as the second factor
enabled, in addition to supplying your username and password to log in, you'll of authentication. After being enabled, in addition to supplying your username
be prompted to activate your U2F / WebAuthn device (usually by pressing a button on it), and password to sign in, you're prompted to activate your U2F / WebAuthn device
and it will perform secure authentication on your behalf. (usually by pressing a button on it) which performs secure authentication on
your behalf.
It is highly recommended that you set up 2FA with both a It's highly recommended that you set up 2FA with both a [one-time password authenticator](#one-time-password)
[one-time password authenticator](#one-time-password) or use [FortiAuthenticator](#one-time-password-via-fortiauthenticator) or use [FortiAuthenticator](#one-time-password-via-fortiauthenticator) and a
and a [U2F device](#u2f-device) or a [WebAuthn device](#webauthn-device), so you can still access your account [U2F device](#u2f-device) or a [WebAuthn device](#webauthn-device), so you can
if you lose your U2F / WebAuthn device. still access your account if you lose your U2F / WebAuthn device.
## Enabling 2FA ## Enabling 2FA
There are multiple ways to enable two-factor authentication: via a one time password authenticator There are multiple ways to enable two-factor authentication: by using a one-time
or a U2F / WebAuthn device. password authenticator or a U2F / WebAuthn device.
### One-time password ### One-time password
...@@ -62,8 +63,8 @@ To enable 2FA: ...@@ -62,8 +63,8 @@ To enable 2FA:
code** field. code** field.
1. Select **Submit**. 1. Select **Submit**.
If the pin you entered was correct, you'll see a message indicating that If the pin you entered was correct, a message displays indicating that
two-factor authentication has been enabled, and you'll be presented with a list two-factor authentication has been enabled, and you're shown a list
of [recovery codes](#recovery-codes). Be sure to download them and keep them of [recovery codes](#recovery-codes). Be sure to download them and keep them
in a safe place. in a safe place.
...@@ -77,7 +78,7 @@ You can use FortiAuthenticator as an OTP provider in GitLab. Users must exist in ...@@ -77,7 +78,7 @@ You can use FortiAuthenticator as an OTP provider in GitLab. Users must exist in
both FortiAuthenticator and GitLab with the exact same username, and users must both FortiAuthenticator and GitLab with the exact same username, and users must
have FortiToken configured in FortiAuthenticator. have FortiToken configured in FortiAuthenticator.
You'll also need a username and access token for FortiAuthenticator. The You need a username and access token for FortiAuthenticator. The
`access_token` in the code samples shown below is the FortAuthenticator access `access_token` in the code samples shown below is the FortAuthenticator access
key. To get the token, see the `REST API Solution Guide` at key. To get the token, see the `REST API Solution Guide` at
[`Fortinet Document Library`](https://docs.fortinet.com/document/fortiauthenticator/6.2.0/rest-api-solution-guide/158294/the-fortiauthenticator-api). [`Fortinet Document Library`](https://docs.fortinet.com/document/fortiauthenticator/6.2.0/rest-api-solution-guide/158294/the-fortiauthenticator-api).
...@@ -170,9 +171,9 @@ To set up 2FA with a U2F device: ...@@ -170,9 +171,9 @@ To set up 2FA with a U2F device:
1. Click **Enable Two-Factor Authentication**. 1. Click **Enable Two-Factor Authentication**.
1. Connect your U2F device. 1. Connect your U2F device.
1. Click on **Set up New U2F Device**. 1. Click on **Set up New U2F Device**.
1. A light will start blinking on your device. Activate it by pressing its button. 1. A light begins blinking on your device. Activate it by pressing its button.
You will see a message indicating that your device was successfully set up. A message displays, indicating that your device was successfully set up.
Click on **Register U2F Device** to complete the process. Click on **Register U2F Device** to complete the process.
### WebAuthn device ### WebAuthn device
...@@ -208,7 +209,7 @@ To set up 2FA with a WebAuthn compatible device: ...@@ -208,7 +209,7 @@ To set up 2FA with a WebAuthn compatible device:
1. Select **Set up New WebAuthn Device**. 1. Select **Set up New WebAuthn Device**.
1. Depending on your device, you might need to press a button or touch a sensor. 1. Depending on your device, you might need to press a button or touch a sensor.
You will see a message indicating that your device was successfully set up. A message displays, indicating that your device was successfully set up.
Recovery codes are not generated for WebAuthn devices. Recovery codes are not generated for WebAuthn devices.
## Recovery codes ## Recovery codes
...@@ -219,12 +220,12 @@ Recovery codes are not generated for U2F / WebAuthn devices. ...@@ -219,12 +220,12 @@ Recovery codes are not generated for U2F / WebAuthn devices.
WARNING: WARNING:
Each code can be used only once to log in to your account. Each code can be used only once to log in to your account.
Immediately after successfully enabling two-factor authentication, you'll be Immediately after successfully enabling two-factor authentication, you're
prompted to download a set of generated recovery codes. Should you ever lose access prompted to download a set of generated recovery codes. Should you ever lose access
to your one-time password authenticator, you can use one of these recovery codes to log in to to your one-time password authenticator, you can use one of these recovery codes to log in to
your account. We suggest copying and printing them, or downloading them using your account. We suggest copying and printing them, or downloading them using
the **Download codes** button for storage in a safe place. If you choose to the **Download codes** button for storage in a safe place. If you choose to
download them, the file will be called `gitlab-recovery-codes.txt`. download them, the file is called `gitlab-recovery-codes.txt`.
If you lose the recovery codes or just want to generate new ones, you can do so If you lose the recovery codes or just want to generate new ones, you can do so
from the [two-factor authentication account settings page](#regenerate-2fa-recovery-codes) or from the [two-factor authentication account settings page](#regenerate-2fa-recovery-codes) or
...@@ -233,8 +234,8 @@ from the [two-factor authentication account settings page](#regenerate-2fa-recov ...@@ -233,8 +234,8 @@ from the [two-factor authentication account settings page](#regenerate-2fa-recov
## Logging in with 2FA Enabled ## Logging in with 2FA Enabled
Logging in with 2FA enabled is only slightly different than a normal login. Logging in with 2FA enabled is only slightly different than a normal login.
Enter your username and password credentials as you normally would, and you'll Enter your username and password credentials as you normally would, and you're
be presented with a second prompt, depending on which type of 2FA you've enabled. presented with a second prompt, depending on which type of 2FA you've enabled.
### Log in via a one-time password ### Log in via a one-time password
...@@ -246,19 +247,19 @@ recovery code to log in. ...@@ -246,19 +247,19 @@ recovery code to log in.
To log in via a U2F device: To log in via a U2F device:
1. Click **Login via U2F Device**. 1. Click **Login via U2F Device**.
1. A light will start blinking on your device. Activate it by touching/pressing 1. A light begins blinking on your device. Activate it by touching/pressing
its button. its button.
You will see a message indicating that your device responded to the authentication A message displays, indicating that your device responded to the authentication
request and you will be automatically logged in. request, and you're automatically logged in.
### Log in via WebAuthn device ### Log in via WebAuthn device
In supported browsers you should be automatically prompted to activate your WebAuthn device In supported browsers you should be automatically prompted to activate your WebAuthn device
(e.g. by touching/pressing its button) after entering your credentials. (e.g. by touching/pressing its button) after entering your credentials.
You will see a message indicating that your device responded to the authentication A message displays, indicating that your device responded to the authentication
request and you will be automatically logged in. request and you're automatically logged in.
## Disabling 2FA ## Disabling 2FA
...@@ -269,7 +270,7 @@ If you ever need to disable 2FA: ...@@ -269,7 +270,7 @@ If you ever need to disable 2FA:
1. Go to **Account**. 1. Go to **Account**.
1. Click **Disable**, under **Two-Factor Authentication**. 1. Click **Disable**, under **Two-Factor Authentication**.
This will clear all your two-factor authentication registrations, including mobile This clears all your two-factor authentication registrations, including mobile
applications and U2F / WebAuthn devices. applications and U2F / WebAuthn devices.
## Personal access tokens ## Personal access tokens
...@@ -312,7 +313,7 @@ a new set of recovery codes with SSH: ...@@ -312,7 +313,7 @@ a new set of recovery codes with SSH:
ssh git@gitlab.example.com 2fa_recovery_codes ssh git@gitlab.example.com 2fa_recovery_codes
``` ```
1. You will then be prompted to confirm that you want to generate new codes. 1. You are prompted to confirm that you want to generate new codes.
Continuing this process invalidates previously saved codes: Continuing this process invalidates previously saved codes:
```shell ```shell
...@@ -358,13 +359,13 @@ To regenerate 2FA recovery codes, you need access to a desktop browser: ...@@ -358,13 +359,13 @@ To regenerate 2FA recovery codes, you need access to a desktop browser:
1. In the **Register Two-Factor Authenticator** pane, click **Regenerate recovery codes**. 1. In the **Register Two-Factor Authenticator** pane, click **Regenerate recovery codes**.
NOTE: NOTE:
If you regenerate 2FA recovery codes, save them. You won't be able to use any previously created 2FA codes. If you regenerate 2FA recovery codes, save them. You can't use any previously created 2FA codes.
### Ask a GitLab administrator to disable two-factor authentication on your account ### Ask a GitLab administrator to disable two-factor authentication on your account
If you cannot use a saved recovery code or generate new recovery codes, ask a If you cannot use a saved recovery code or generate new recovery codes, ask a
GitLab global administrator to disable two-factor authentication for your GitLab global administrator to disable two-factor authentication for your
account. This will temporarily leave your account in a less secure state. account. This temporarily leaves your account in a less secure state.
Sign in and re-enable two-factor authentication as soon as possible. Sign in and re-enable two-factor authentication as soon as possible.
## Note to GitLab administrators ## Note to GitLab administrators
......
...@@ -305,7 +305,7 @@ you are asked to sign in again to verify your identity for security reasons. ...@@ -305,7 +305,7 @@ you are asked to sign in again to verify your identity for security reasons.
NOTE: NOTE:
When any session is signed out, or when a session is revoked When any session is signed out, or when a session is revoked
via [Active Sessions](active_sessions.md), all **Remember me** tokens are revoked. via [Active Sessions](active_sessions.md), all **Remember me** tokens are revoked.
While other sessions will remain active, the **Remember me** feature will not restore While other sessions remain active, the **Remember me** feature doesn't restore
a session if the browser is closed or the existing session expires. a session if the browser is closed or the existing session expires.
### Increased sign-in time ### Increased sign-in time
......
...@@ -21,7 +21,7 @@ You receive notifications for one of the following reasons: ...@@ -21,7 +21,7 @@ You receive notifications for one of the following reasons:
While notifications are enabled, you receive notification of actions occurring in that issue, merge request, or epic. While notifications are enabled, you receive notification of actions occurring in that issue, merge request, or epic.
NOTE: NOTE:
Notifications can be blocked by an admin, preventing them from being sent. Notifications can be blocked by an administrator, preventing them from being sent.
## Tuning your notifications ## Tuning your notifications
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment