3
Securing Jenkins
In this chapter, the key aspects of securing Jenkins will be presented. Security is of paramount importance as Jenkins deals with sensitive data and plays a critical role in the software delivery pipeline. In the previous chapter, we partially explored how to secure Jenkins, including the server setup process, the underlying infrastructure, and plugin management, all aimed at safeguarding Jenkins installations from potential threats and vulnerabilities. In this chapter, we will explore vital measures to enhance the security around who gets to do what on your Jenkins instance. First, we will delve into user authentication and permissions by integrating Jenkins with Azure Active Directory (AD) (see [1] in the Further reading ...
Get Learning Continuous Integration with Jenkins - Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.