×
Click your name on the top right corner on every page, then click "Configure" to see your API token. (The URL $root/me/configure is a good shortcut.) You can ...
When your Jenkins is secured, you can use HTTP BASIC authentication to authenticate remote API requests. See Authenticating scripted clients for more details.
Sep 7, 2021 · Click your name on the top right corner on every page, then click "Configure" to see your API token. (The URL $root/me/configure is a good ...
Missing: book/ | Show results with:book/
> User Documentation Home. User Handbook. User Handbook ... Securing Jenkins · System Administration · Scaling ... Authenticating scripted clients · Reverse proxy ...
Missing: /url | Show results with:/url
Docker Host Certificate Authentication credentials. Credential security. To maximize security, credentials configured in Jenkins are stored in an encrypted form ...
Missing: scripted- | Show results with:scripted-
Securing Jenkins has two aspects to it. Access control, which ensures users are authenticated when accessing Jenkins and their activities are authorized.
Missing: /url | Show results with:/url
Jenkins has a built-in command line interface that allows users and administrators to access Jenkins from a script or shell environment.
The java.util.logging system by default sends every log above INFO to stdout. Jenkins is equipped with a GUI for configuring/collecting/reporting log records of ...
Authenticating scripted clients · Reverse proxy configuration · Reverse proxy - Issues · Managing systemd services · FIPS-140 · Reset the Jenkins administrator ...
Missing: /url | Show results with:/url
Authenticating scripted clients · Reverse proxy ... System Configuration matches the URL you're using to access Jenkins. ... For example, the URL https://jenkins.