×
This setting is controlled mainly by two axes: Security Realm, which determines users and their passwords, as well as what groups the users belong to.
A Security Realm which informs the Jenkins environment how and where to pull user (or identity) information from. Also commonly known as "authentication.".
You need to be very careful when interacting with Jenkins APIs from a Pipeline to avoid severe security and performance issues. ... standard Pipeline APIs like sh ...
As part of setting up your Pipeline project in Blue Ocean, Jenkins configures a secure and appropriately authenticated connection to your project's source ...
Missing: standard | Show results with:standard
These guidelines explain the considerations the Jenkins security team applies during security fix development. They will generally hold true for any ...
Nov 15, 2022 · This vulnerability allows attackers able to configure Pipelines to execute arbitrary code in the context of the Jenkins controller JVM. Pipeline ...
It displays an overview of all Pipeline projects configured on a Jenkins instance. ... Search pipelines: This field allows users to ... The Favorites list appears ...
Missing: standard | Show results with:standard
May 17, 2022 · Search K. Jenkins Security Home. For ... This allows attackers able to configure pipelines ... default, see SECURITY-2617 in the 2022-04-12 security ...
Missing: standard | Show results with:standard
Best Practices ; Automate job definition. Use organization folders; Use multibranch Pipelines; Use Pipeline ; Manage your jobs. Report build results; Build on ...
Jenkins can expose a TCP port that allows inbound agents to connect to it. It can be enabled, disabled, and configured in Manage Jenkins » Security. The two ...
Missing: standard | Show results with:standard