×
A Security Realm which informs the Jenkins environment how and where to pull user (or identity) information from. Also commonly known as "authentication.".
To safely support this wide spread of security and threat profiles, Jenkins offers many configuration options for enabling, customizing, or disabling various ...
Missing: /url | Show results with:/url
Managing Jenkins · System Configuration group · Security group · Status Information group · Troubleshooting group · Tools and Actions group · Uncategorized group.
Use these instructions if your Jenkins configuration is not managed using Configuration as Code plugin or Groovy Init Hooks. The following steps will delete the ...
User Handbook · User Handbook Overview · Installing Jenkins · Platform Information · Using Jenkins · Pipeline · Blue Ocean · Managing Jenkins · Securing Jenkins ...
Missing: /url | Show results with:/url
The Jenkins project takes security seriously. We make every possible effort to ensure users can adequately secure their automation infrastructure.
Missing: book/ | Show results with:book/
default-src 'none' prohibits loading scripts, URLs for AJAX/XHR/WebSockets/EventSources, fonts, plugin objects, media, and frames from anywhere (images and ...
Document Jenkins on Kubernetes. Security. Overview ... Users can still hit the URL ... Without any special plugins to manage authentication, an instance of Jenkins ...
Missing: book/ | Show results with:book/
Jenkins is a self-contained, open source automation server which can be used to automate all sorts of tasks related to building, testing, and delivering or ...
Missing: book/ | Show results with:book/
Jenkins access control is split into two parts: Authentication (users prove who they are) is done using a security realm. The security realm determines user ...