×
Any time
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
Verbatim
Search provided by Algolia. DevSecOps. 1 to ... Conjur Secrets. Used by 0.22% of instances ... Scan your web application for security vulnerabilities with Probely.
Sken.ai offers a DevOps-first Continuous Application Security Scanning. With Sken, your apps on Jenkins will be automatically scanned for security ...
Conjur Secrets. Used by 0.22% of instances ... Scan your web application for security vulnerabilities with Probely. ... Pipeline Utility Steps · Configuration as ...
7 days ago · OpenID Connect is an authentication and authorization protocol that allow users to use single sign-on (SSO) to access an application ...
Assigns the password for user $USER. If Jenkins security is enabled, you must log in as a user who has an admin role to configure Jenkins. --argumentsRealm.
Cross-Site Scripting (XSS) is a web application vulnerability that allows users with the ability to control what gets shown to other users on a web page to run ...
This page lists all security advisories that have been published so far. This index is also available as an RSS feed. 2024. Jenkins Security Advisory 2024-04 ...
This guide looks at form validation from a security point of view: What are the considerations for securing form validation, and how can they be best ...
See ConfidentialStore and ConfidentialKey for how to store secrets. Returns a secret key that survives across container start/stop. This value is useful for ...
The Jenkins Web application ARchive (WAR) file can be started from the command line like this: Download the latest Jenkins WAR file to an appropriate directory ...