Apr 23, 2024 · In most cases, you will be using LDAP groups, so ensure that you verify reverse group lookup by testing with a user account that is a member of ...
Permission, which represents an activity that requires a security privilege. · Authentication , which represents the current user and roles (AKA groups) he/she ...
To make scripted clients (such as wget) invoke operations that require authorization (such as scheduling a build), use HTTP BASIC authentication to specify the ...
Docker Host Certificate Authentication - copy and paste the appropriate details into the Client Key, Client Certificate and Server CA Certificate fields. In the ...
You can search for definitions of modules, packages, types, fields, methods, system properties and other terms defined in the API. These items can be searched ...
Jenkins access control is split into two parts: Authentication (users prove who they are) is done using a security realm. The security realm determines user ...
Install artifacts to custom-specified directory structures. Authentication support for Jenkins instances. Ability to search for builds by subversion revision.
A Security Realm which informs the Jenkins environment how and where to pull user (or identity) information from. Also commonly known as "authentication.".
You can search for definitions of modules, packages, types, fields, methods and other terms defined in the API, using some or all of the name. "Camel-case" ...
Where an immediate action against a job requires that a credential be selected by the user triggering the action, this permission allows the user to select ...
Missing: doc | Show results with:doc