GitLab CI/CD can issue OIDC tokens for each job via theDocumentation Index
Fetch the complete documentation index at: https://conductorone-groman-network-requirements-updates.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
id_tokens keyword. You exchange this token for a C1 access token using a curl command in your pipeline.
Prerequisites
- A service principal with a GitLab CI federation trust. See set up federation if you haven’t created one yet. Use the GitLab CI/CD preset.
- The trust’s client ID (for example
bright-eagle-55012@yourcompany.conductor.one/wfe)
Configure the pipeline
Addid_tokens to your job to request a GitLab OIDC token, then exchange it for a C1 access token:
id_tokens block tells GitLab to generate a signed JWT with your C1 tenant domain as the audience. The token is available as the C1_TOKEN environment variable within the job.
CEL expression examples
When creating the federation trust, the CEL expression controls which GitLab CI jobs can authenticate.Restrict to a project
Restrict to a project on protected refs only
Restrict to a specific branch
Common GitLab OIDC claims
| Claim | Example value | Description |
|---|---|---|
project_path | acme/infra | Full project path including group |
project_id | 12345 | Numeric project ID |
namespace_path | acme | Group or user namespace |
ref | main | Branch or tag name |
ref_protected | true | Whether the ref is protected |
ref_type | branch | branch or tag |
pipeline_source | push | What triggered the pipeline |
environment | production | Environment name (if used) |
environment_protected | true | Whether the environment is protected |