×
Jenkins can expose a TCP port that allows inbound agents to connect to it. It can be enabled, disabled, and configured in Manage Jenkins » Security. The two ...
This setting is controlled mainly by two axes: Security Realm, which determines users and their passwords, as well as what groups the users belong to.
Missing: master | Show results with:master
There are essentially three ways of enabling the access control mechanism: Through web UI, go to http://jenkins/configureSecurityand check "Enable Agent → ...
Jan 4, 2013 · This vulnerability allows attacker with an HTTP access to the server to retrieve the master cryptographic key of Jenkins.
Jul 10, 2017 · It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications.
A Security Realm which informs the Jenkins environment how and where to pull user (or identity) information from. Also commonly known as "authentication.".
May 13, 2022 · This plugin uses Probely to scan your web application for security vulnerabilities. It enables security testing in your CI/CD pipeline.
Missing: master | Show results with:master
Dec 10, 2021 · The Jenkins project's response to a critical security vulnerability in the popular "Apache Log4j 2" library.
Missing: master | Show results with:master
Cross-Site Request Forgery (CSRF or XSRF) is a type of security vulnerability in web applications. Without protection from CSRF, a Jenkins user or ...
Missing: master | Show results with:master
Apr 20, 2017 · This blog post details how to securely connect to a Jenkins instance and how to setup a read-only public dashboard. We'll cover topics like: ...
Missing: master | Show results with:master