© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
P. P. DingareCI/CD Pipeline Using Jenkins Unleashedhttps://doi.org/10.1007/978-1-4842-7508-5_7

7. Managing Security with Jenkins

Pranoday Pramod Dingare1  
(1)
Pune, Maharashtra, India
 

In the previous chapter, you learned how to set up Maven and JDK and integrate them with Jenkins.

This chapter talks about different security-related settings that help you configure the authentication and authorization features in Jenkins.

Note

In simple terms, authentication means valid users can log into the Jenkins system and invalid users cannot. Authorization defines different kinds of accesses granted to the different types of users, such as admin/non-admin.

Configuring Global ...

Get CI/CD Pipeline Using Jenkins Unleashed: Solutions While Setting Up CI/CD Processes now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.