Integrations
GitLab
title: GitLab description: Configure GitLab integration for automatic compliance monitoring in Tidal Control sidebar_position: 6
GitLab
Configuring GitLab integration
The GitLab integration enables Tidal Control to automatically execute compliance tests on your GitLab environment via an access token configuration.
Requirements:
- Super User role in Tidal Control
- GitLab account with token creation rights
- Access to GitLab environment (gitlab.com or self-hosted)
Configuration step-by-step plan
What we're going to do: We'll create a GitLab access token in your GitLab account that allows Tidal to retrieve compliance data. An access token is a GitLab mechanism that enables external applications (Tidal) to securely access specific GitLab resources without sharing your password.
GitLab host configuration:
- Default:
https://gitlab.com
(GitLab.com SaaS) - Self-hosted: Use your own GitLab server URL (e.g.
https://gitlab.company.com
) - GitLab Enterprise: Custom enterprise instance URL
Configuration steps:
- Create GitLab access token
- Configure token
- Complete integration
Step 1: Create GitLab access token
- Go to your GitLab environment and log in
- Click your profile icon in the top right
- Select "Edit profile"
- Click "Access Tokens" in left sidebar
- Click "Add new token" under Personal Access Tokens
Step 2: Configure token
- Token name:
Tidal Control
- Description:
Read-only token for Tidal Control compliance monitoring
- Expiration date: Leave blank for maximum validity (or set according to organisation policy)
- Scopes: Select "read_api" for read-only access
- Click "Create personal access token"
Step 3: Complete integration
- Copy token value immediately (no longer visible after leaving page)
- Go to Settings → Integrations in Tidal Control
- Click the plus icon next to GitLab
- Fill in configuration:
- Name:
GitLab Production
- Host:
https://gitlab.com
(or your self-hosted URL) - Access Token: Copied token value
- Name:
- Click "Create" to save integration
Token validity: Leave expiration date blank for longest validity, unless organisation policy requires otherwise
Verification
After successful configuration, Settings → Integrations shows a "Connected" status for GitLab, GitLab-specific tests are available in the Tests section, and test refreshes deliver results without authentication errors.
Save token: Note the access token securely - it's no longer visible after creation and uniquely needed for troubleshooting
Troubleshooting
Troubleshooting issues:
- Verify access token correctly copied (no extra spaces)
- Check token expiration date not yet reached
- Confirm "read_api" scope selected during token creation
- Verify GitLab host URL correctly entered
Still having trouble?
Send an email to support@tidalcontrol.com, and we'll get in touch as soon as possible.
Gathering support info: Note which browser you're using, exact error messages, which steps you've already tried, and screenshots of the problem. This significantly speeds up the solution.
- Previous
- Atlassian Admin
- Next
- Jira Cloud