Magdalena Frankiewicz activity https://gitlab.com/m_frankiewicz 2026-03-19T13:02:24Z tag:gitlab.com,2026-03-18:5217017671 Magdalena Frankiewicz commented on epic #16982 at GitLab.org 2026-03-18T11:20:18Z m_frankiewicz Magdalena Frankiewicz [email protected]

@lwanko

enable seat types to restrict themselves, for example, limiting the amount of available roles for a user, third phase: remove the synchronization.

Rather enable seat types to restrict available roles and this should come together with removing synchronisation.

tag:gitlab.com,2026-03-18:5217002669 Magdalena Frankiewicz commented on issue #580421 at GitLab.org / GitLab 2026-03-18T11:16:36Z m_frankiewicz Magdalena Frankiewicz [email protected]

Thanks a lot @lwanko - just to confirm - on the third screenshot you wanted to show the memberships in add-on/project and not in Lukas Wanko/project - correct?

tag:gitlab.com,2026-03-18:5216976133 Magdalena Frankiewicz commented on merge request !226507 at GitLab.org / GitLab 2026-03-18T11:10:25Z m_frankiewicz Magdalena Frankiewicz [email protected]

@lwanko got it, thanks. Could we add that field later, if needed?

tag:gitlab.com,2026-03-18:5216959588 Magdalena Frankiewicz commented on issue #584275 at GitLab.org / GitLab 2026-03-18T11:06:30Z m_frankiewicz Magdalena Frankiewicz [email protected]

Hi @grosal, thank you for the clear customer context and questions.

With Restricted access being enabled, new users are still being billed even if they ran out of seats in the subscription.

I believe that with RA enabled, it will not be possible to add new users, if the available billable seats are used. The users already present on the instance, also those that are in overage, won't be blocked or removed though when RA gets enabled. So if the overage is already present, enabling RA won't fix that, but it should disallow to add more users when there's no seats left.

Does the Restricted Access feature (which triggers Minimal Access assignment) work with OIDC-provisioned users, or only with SCIM/LDAP/SAML?

I undestand that this customer is using GitLab as an identity provider (not consumer). I've read https://docs.gitlab.com/administration/auth/oidc/ but don't see there what "OIDC-provisioned users" would mean - can you tell me how are the users created on GitLab?

I can confirm that when Restricted Access is enabled and no subscription seats are available, the Minimal Access fallback applies specifically to users provisioned through SAML, SCIM, or LDAP. OIDC is not supported with this fallback, but also not sure how it could 🤔

Does it mean on Self-Managed Premium:

  • Users with no groups or projects = billable
  • Users with no assigned roles = billable (same thing)
  • Users with Minimal Access role only = non-billable (after this issue's fix in 18.9)

That's all correct.

how should we prevent billing overages when users are provisioned via OIDC

Customer could add users to a group with a Minimal Access role.

@paulobarros please review and correct/add if needed.

@grosal hope that helps and happy to talk more or chat with the customer directly.

tag:gitlab.com,2026-03-18:5216741984 Magdalena Frankiewicz commented on issue #593576 at GitLab.org / GitLab 2026-03-18T10:20:59Z m_frankiewicz Magdalena Frankiewicz [email protected]

The text should be the same as in other locations.

tag:gitlab.com,2026-03-17:5212118960 Magdalena Frankiewicz commented on issue #593576 at GitLab.org / GitLab 2026-03-17T10:36:39Z m_frankiewicz Magdalena Frankiewicz [email protected]

OK, so we should have RA warning at SCIM config entry points that @karichards pointed to here.

Sounds good, @lwanko @paulobarros ?

tag:gitlab.com,2026-03-17:5211726136 Magdalena Frankiewicz commented on issue #593767 at GitLab.org / GitLab 2026-03-17T09:15:41Z m_frankiewicz Magdalena Frankiewicz [email protected]

Thank you @lwanko for creating this!

+1 on starting with point 2 — worth confirming current behaviour first; check whether Guests can still self-promote to a billable role when the user cap feature is enabled.

@dzubova does it fit in 18.11?

tag:gitlab.com,2026-03-17:5211664129 Magdalena Frankiewicz commented on issue #424246 at GitLab.org / GitLab 2026-03-17T09:01:57Z m_frankiewicz Magdalena Frankiewicz [email protected]

@mdischner thank you for raising this! I'm not working on this part of the Product, so tagging @gabrielengel_gl who's PM for Runners.

tag:gitlab.com,2026-03-17:5211646882 Magdalena Frankiewicz commented on merge request !226507 at GitLab.org / GitLab 2026-03-17T08:58:14Z m_frankiewicz Magdalena Frankiewicz [email protected]

@lwanko this field is linked to the state of the Zuora field, correct? It needs to be in ee/lib/gitlab_subscriptions/api/entities/internal/gitlab_subscription.rb, as this is internal endpoint and Jason's question is if it should be exposed also in ee/lib/api/entities/gitlab_subscription.rb, as this is customer facing endpoint - did I get it right?

I think it does add value

What value does it add for user, in your view?

@jagood what problem do you see in adding this field to user facing endpoint?

tag:gitlab.com,2026-03-13:5201361594 Magdalena Frankiewicz commented on issue #567749 at GitLab.org / GitLab 2026-03-13T13:15:27Z m_frankiewicz Magdalena Frankiewicz [email protected]

@lwanko we don't plan to disable RA by default for anyone - only to possibly enable it by default (force enable it) for chosen users/cohorts.

tag:gitlab.com,2026-03-13:5201352569 Magdalena Frankiewicz commented on merge request !225996 at GitLab.org / GitLab 2026-03-13T13:13:35Z m_frankiewicz Magdalena Frankiewicz [email protected]

@karichards thank you for videos. I'm two mind about it too @lwanko. I've asked Duo, it said we should consider warning for:

  • SCIM provisioning - Since SCIM is used for automated user provisioning and deprovisioning, it should show the warning when creating SCIM configurations
  • OAuth/OmniAuth providers - If they support user provisioning with restricted access enabled
  • Instance-level LDAP configuration - The warning is currently only on group-level LDAP sync; it might be needed on the instance-level LDAP settings page as well.

@paulobarros what's your opinion?