×
Click your name on the top right corner on every page, then click "Configure" to see your API token. (The URL $root/me/configure is a good shortcut.) You can ...
When your Jenkins is secured, you can use HTTP BASIC authentication to authenticate remote API requests. See Authenticating scripted clients for more details.
Jenkins Handbook · User Handbook Overview · Installing Jenkins · Docker · Kubernetes · Platform Information · Java Support Policy · Linux Support Policy · Using ...
Missing: /url | Show results with:/url
A 'reverse proxy' allows an alternate HTTP or HTTPS provider to communicate with web browsers on behalf of Jenkins. The alternate provider may offer ...
System Administration · Backing-up/Restoring Jenkins ... Authenticating scripted clients · Reverse proxy ... URLs to the canonical URL: https://jenkins.acme.example ...
Access to URLs provided by the security realm (to implement user signup or handle SSO authentication) ( /securityRealm/ ). agent.jar , remoting.jar , and ...
Docker Host Certificate Authentication credentials. Credential security. To maximize security, credentials configured in Jenkins are stored in an encrypted form ...
Missing: scripted- | Show results with:scripted-
Viewing logs · Logs on the system · Logs in Jenkins · Making custom logs available outside of the web UI · Debug logging in Jenkins.
Securing Jenkins has two aspects to it. Access control, which ensures users are authenticated when accessing Jenkins and their activities are authorized.
Missing: /url | Show results with:/url
Jenkins access control is split into two parts: Authentication (users prove who they are) is done using a security realm. The security realm determines user ...