×
Jan 18, 2024 · The Configuration as Code plugin is an opinionated way to configure Jenkins based on human-readable declarative configuration files. Writing ...
A Security Realm which informs the Jenkins environment how and where to pull user (or identity) information from. Also commonly known as "authentication.".
This setting is controlled mainly by two axes: Security Realm, which determines users and their passwords, as well as what groups the users belong to.
Nov 15, 2022 · This vulnerability allows attackers able to configure Pipelines to execute arbitrary code in the context of the Jenkins controller JVM. Pipeline ...
Oct 19, 2022 · This vulnerability allows attackers with permission to define untrusted Pipeline libraries and to define and run sandboxed Pipelines, to bypass ...
Missing: standard | Show results with:standard
Apr 8, 2024 · Allows Jenkins administrators to control what in-process scripts can be run by less-privileged users.
Mar 8, 2023 · This advisory announces vulnerabilities in the following Jenkins deliverables: Jenkins (core); update-center2. Descriptions. XSS vulnerability ...
FIPS-140 compliant code may result in less security as the approved standards can lag behind more secure modern standards. Your plugin and Jenkins code should ...
This controls whether a user (directly or through group memberships) has a permission. These can be independent, or work in combination. An independent ...
Missing: standard | Show results with:standard
Apr 9, 2024 · Jenkins Configuration as Code ... Activate the Role-Based Strategy by using the standard Manage Jenkins > Configure Global Security screen:.