×
Administrators may accidentally set up a security realm or authorization strategy in such a way that they are no longer able to administer or even access ...
Missing: /url | Show results with:/url
This is usually a verb, like "configure", "administer", "tag", etc. Authentication , which represents the current user and roles (AKA groups) he/she has. When a ...
Missing: book/ | Show results with:book/
This special interest group improves Jenkins use and adoption through documentation. The SIG encourages, creates, and reviews documentation contributions ...
Query the test-results of a completed build. Get objects representing the latest builds of a job. Search for artifacts by simple criteria. Block until jobs are ...
Jenkins can expose a TCP port that allows inbound agents to connect to it. It can be enabled, disabled, and configured in Manage Jenkins » Security. The two ...
Search K. > User Documentation Home. User Handbook. User Handbook Overview · Installing Jenkins · Docker · Kubernetes · Linux · macOS · Windows · Other Systems ...
> User Documentation Home. User Handbook. User ... Full URL of Jenkins, such as https://example.com ... Storing static AWS keys in Jenkins credentials is not very ...
Cross-Site Request Forgery (CSRF or XSRF) is a type of security vulnerability in web applications. Without protection from CSRF, a Jenkins user or ...
Using Jenkins agents. Table of Contents. Configuring agents with Docker. Environment; Generating an SSH key pair. Create a Jenkins SSH credential.
> User Documentation Home. User Handbook. User ... If this is an URL, Jenkins downloads the URL ... Searching plugins.jenkins.io for the desired plugin will provide ...