Create a GitLab on premises connection

 

Who can use this feature
gray-cloud.svgAvailable on monday dev
gray-lightning.svgAvailable on Enterprise plan

In order to set up an on premises connection with GitLab, you need to follow this guide.

Note: Below are the definitions that need to be done per GitLab's premise, which you'll only need to do once. In case you are the first user connecting to GitLab in your account, start there.

 

Definitions per user

  1. Open the monday workflow builder and create an new GitLab on-premises trigger

  2. When being asked to connect your GitLab account, add a new account

  3. The values you'll need to fill are as follows:
    • GitLab base url: the url for your on-premises gitlab

    • Client ID: the application ID from your GitLab application (first step in account definitions below)

    • Client Secret: the secret from your GitLab application  (first step in account definitions below)image (17) 1.png
  4. Click continue to GitLab and then authorize monday.com

 

That's it! you can now enjoy your new monday dev GitLab integration

 

Definitions that need to be done per GitLab Premise

Creating a GitLab app

 

Note: This step could be done per premise or per user, it doesn't matter as long as users have access to the app id and secret when first connecting to GitLab in monday.
This means that if you're creating it per account, keep the app ID and secret accessible to your future selves.

 

  1. Go to GitLab and navigate to the apps section by going to your user preferences, accessing the Applications tab, and adding a new application.

  2. In the new GitLab application, fill in the values as follows:

    Name: monday.com + GitLab (this is just a suggestion, but can be any value you'd like)
  3. Click on Save application

  4. You should then be redirected to this screen:Screenshot 2025-06-17 at 13.12.59 1.png
  5. Here you need to keep the application ID and Secret for creating the connection in monday.

 

GitLab API

For self-managed GitLab installations with network restrictions, it is critical to verify that all these API endpoints remain accessible:

  • GET /api/v4/groups
  • GET /api/v4/groups/<group_id>/projects
  • GET /api/v4/projects/<project_id>/hooks
  • GET /api/v4/user
  • GET /api/graphql
  • POST /oauth/token

 

Approve monday certification

In case your network blocks GoDaddy certificates:

For most users, this won't be an issue, depending on your VPN settings, but most VPNs are already familiar with GoDaddy.

Monday certificates are created with GoDaddy, so in case your networks won't verify GoDaddy certificates, you'll need to add the GoDaddy root certificate to your trusted certificates list in GitLab, for it to send the webhooks with SSL verification (which is the most secure).

 

To do that, you'll need to add this certificate to your GitLab container volumes:
under this directory (which should already exist): config/trusted-certs

Next, add a file called go-daddy-certificate.crt - the file name is unimportant, only the directory and file extension matter here, and add GoDaddy root certificate there (include the BEGIN CERTIFICATE/END CERTIFICATE headers/footers)

After that's done, you'll need to connect to your GitLab container's bash and run this command, which will tell GitLab to rebuild its trust store, including this new certificate: gitlab-ctl reconfigure

If you have any questions, please reach out to our team right here. We’re available 24/7 and happy to help.

Last modified on

Still have questions?
We can help.

Chat support

Get in touch with our support team through our chat for any questions, concerns, or inquiries.

Community forum

Learn, share ideas and connect with other monday.com customers.

Expert help

Hire a monday.com expert to optimize your workflows.