当前位置:网站首页>LDAP application (4) Jenkins access
LDAP application (4) Jenkins access
2022-07-06 08:18:00 【Rain emperor night tears】
LDAP Application articles (4)Jenkins Access
To configure Jenkins Access LDAP You need to be careful , Because once enabled in the configuration LDAP After verifying the user , Previous users will not be able to log in , Include admin Account .
Certificate configuration
If Jenkins adopt ldaps Access , Must be configured separately java Certificate of operating environment . If you use ldap Access Agreement , You can skip this part .
Download and import
Certificate configuration , It only takes two steps , That is, download and import . At the time of import , According to jdk The version location will be slightly different , In especial jdk11 Version above , No more jre Catalog , Please note that !
openssl s_client -connect <address>:636 >> host.crt
keytool -import -trustcacerts -alias <address> -file host1.crt -keystore /usr/java/jdk-17.0.3.1/lib/security/cacerts
When importing certificates , You need to enter the certificate password , The password defaults to : changeit . In fact, I don't know how this came from , It seems that everyone uses it like this ~~~
Some documents will first clear the BEGIN CERTIFICATE and END CERTIFICATE Content , But according to the actual measurement , These operations are not required .
Jenkins Configuration in
Security configuration
Get into Global security configuration in , Fill in the information according to the general operation on the Internet , Note the following two items : User search base And Group search base , Represents the search starting point for users and groups , Don't enter the complete DN Information , Just enter the last section of users and groups ou that will do .
Display Name LDAP attribute One is used to display the user name , But in general posixAccount Account does not have this attribute , It can be changed to cn attribute .
Do not save directly after modification , Be sure to click Test LDAP settings Button , Save after confirmation !!!
Role based matrix authorization
Role based matrix authorization will not be repeated here , Just configured in the previous step LDAP after , It must be here Assign Roles Page Global roles in , Ensure that at least one user has admin role . In this way, the user can be managed normally Jenkins.
Troubleshooting
As mentioned at the beginning , In case of an accident when modifying , Cause unable to log in , It can also be repaired by the following methods . stay Jenkins Look for config.xml file , If the environment variable is configured JENKINS_HOME , The file may be in the specified directory . Open the file , Configure the following content as false :
<useSecurity>flase</useSecurity>
restart Jenkins After service , You will find that the system allows anonymous login , And you can do anything .
Reference material
边栏推荐
- 指针和数组笔试题解析
- Sanzi chess (C language)
- MFC 给列表控件发送左键单击、双击、以及右键单击消息
- 07- [istio] istio destinationrule (purpose rule)
- MySQL view tablespace and create table statements
- Asia Pacific Financial Media | "APEC industry +" Western Silicon Valley invests 2trillion yuan in Chengdu Chongqing economic circle to catch up with Shanghai | stable strategy industry fund observatio
- Use dumping to back up tidb cluster data to S3 compatible storage
- From monomer structure to microservice architecture, introduction to microservices
- Common functions for PHP to process strings
- Wireshark grabs packets to understand its word TCP segment
猜你喜欢

Golang DNS write casually

How to use information mechanism to realize process mutual exclusion, process synchronization and precursor relationship
![[Yugong series] February 2022 U3D full stack class 011 unity section 1 mind map](/img/c3/1b6013bfb2441219bf621c3f0726ea.jpg)
[Yugong series] February 2022 U3D full stack class 011 unity section 1 mind map
![07- [istio] istio destinationrule (purpose rule)](/img/be/fa0ad746a79ec3a0d4dacd2896235f.jpg)
07- [istio] istio destinationrule (purpose rule)

Summary of phased use of sonic one-stop open source distributed cluster cloud real machine test platform
![[secretly kill little partner pytorch20 days -day01- example of structured data modeling process]](/img/ae/4e616882f6d68acdf8e885843e68a3.jpg)
[secretly kill little partner pytorch20 days -day01- example of structured data modeling process]

hcip--mpls

"Designer universe": "benefit dimension" APEC public welfare + 2022 the latest slogan and the new platform will be launched soon | Asia Pacific Financial Media

面向个性化需求的在线云数据库混合调优系统 | SIGMOD 2022入选论文解读
![08- [istio] istio gateway, virtual service and the relationship between them](/img/fb/09793f5fd12c2906b73cc42722165f.jpg)
08- [istio] istio gateway, virtual service and the relationship between them
随机推荐
使用 TiDB Lightning 恢复 S3 兼容存储上的备份数据
Migrate data from SQL files to tidb
21. Delete data
NFT smart contract release, blind box, public offering technology practice -- jigsaw puzzle
Artcube information of "designer universe": Guangzhou implements the community designer system to achieve "great improvement" of urban quality | national economic and Information Center
Common functions for PHP to process strings
Use br to back up tidb cluster data to S3 compatible storage
Yu Xia looks at win system kernel -- message mechanism
Erc20 token agreement
Ruffian Heng embedded bimonthly, issue 49
Step by step guide to setting NFT as an ens profile Avatar
LDAP应用篇(4)Jenkins接入
Wireshark grabs packets to understand its word TCP segment
The ECU of 21 Audi q5l 45tfsi brushes is upgraded to master special adjustment, and the horsepower is safely and stably increased to 305 horsepower
Configuring OSPF load sharing for Huawei devices
PHP - Common magic method (nanny level teaching)
备份与恢复 CR 介绍
Hill sort c language
Restore backup data on S3 compatible storage with tidb lightning
3. File operation 3-with