×
To maximize security, credentials configured in Jenkins are stored in an encrypted form on the controller Jenkins instance (encrypted by the Jenkins instance ID) ...
When you update the designated repository, a new build is triggered, as long as the Pipeline is configured with an SCM polling trigger. Since Pipeline code ...
May 13, 2022 · This plugin uses Probely to scan your web application for security vulnerabilities. It enables security testing in your CI/CD pipeline.
The Jenkins Configuration as Code (JCasC) feature defines Jenkins configuration parameters in a human-readable YAML file that can be stored as source code.
Apr 9, 2024 · Enables user authorization using a Role-Based strategy. Roles can be defined globally or for particular jobs or nodes selected by regular ...
Missing: /search | Show results with:/search
Aug 4, 2016 · This plugin allows you to synchronize your hudson configuration files with an SCM, allowing you to specify a commit message every time a ...
Authentication and User Management. This plugin enables various Extended Read permissions in Jenkins for jobs, system configuration, etc. Baptiste Mathus.
We strive to fix all security vulnerabilities in Jenkins and plugins in a timely manner. However, the structure of the Jenkins project, which gives plugin ...
Jan 18, 2024 · This plugin allows configuration of Jenkins based on human-readable declarative configuration files.
May 17, 2022 · This vulnerability allows attackers to have Jenkins send an HTTP request to an attacker-specified webserver. This form validation method no ...