jenkins the definitive guide
Nevertheless, if you can get it to work for your application, running your tests in parallel is one of the more effective way to ...
Chapter 7. Securing Jenkins 7.1. Introduction Jenkins supports several security models, and can integrate with several user repo ...
Figure 7.1. Enabling security in Jenkins In the remainder of this chapter, we will look at how to configure Jenkins security for ...
Figure 7.2. The Jenkins Sign up page This approach is obviously a little too simple for many situations—it is useful for small t ...
Figure 7.3. The list of users known to Jenkins If you click on a user in this list, Jenkins takes you to a page displaying vario ...
Alternatively, you can activate a user by clicking on the Configure menu option in the user details screen, and provide an email ...
Figure 7.7. You can also manage Jenkins users from the Jenkins configuration page From here, you can view and edit the users who ...
To integrate Jenkins with your LDAP repository, Just select “LDAP” in the Security Realm section, and fill in the appropriate de ...
Figure 7.10. Using LDAP Groups in Jenkins 7.4.3. Using Microsoft Active Directory Microsoft Active Directory is a directory serv ...
More precisely, if Jenkins is running on a Windows machine and you do not specify a domain, that machine must be a member of the ...
7.4.6. Using Atlassian Crowd If your organization is using Atlassian products such as JIRA and Confluence, you may also be using ...
Figure 7.13. Using Atlassian Crowd as the Jenkins Security Realm With this plugin installed and configured, you can use users an ...
Figure 7.15. Using custom scripts to handle authentication Before invoking the authentication script, Jenkins sets two environme ...
(see Section 7.5, “Authorization—Who Can Do What”), you can write a second script, which determines the groups for a given user. ...
Figure 7.16. Matrix-based security configuration The special “anonymous” user is always present in the table. This user represen ...
You can grant a range of permissions, which are organized into several groups: Overall, Slave, Job, Run, View and SCM. Most of t ...
Workspace View and download the workspace contents for a build job. Remember, the workspace contains source code and artifacts, ...
administrator. If this happens, do not panic—there is an easy fix, as long as you have access to Jenkins’s home directory. Simpl ...
Figure 7.20. Configuring project-based security The way this works is easiest to understand with a few practical examples. In Fi ...
project-based security, use the system level matrix to define minimum default permissions applicable across all of your projects ...
«
6
7
8
9
10
11
12
13
14
15
»
Free download pdf