当前位置:网站首页>Jenkins user rights management
Jenkins user rights management
2022-07-07 21:25:00 【Cloud computing security】
Jenkins edition :2.332.3
Catalog
One 、 Installing a plug-in
1.1 install
stay Jenkins Install the plug-in in the management plug-in of
Input Role You can find it , As shown in the figure below, I have already installed .
1.2 To configure
Click on Configure Global Security Enter the configuration
1、 stay Jenkins The following icons are found in the settings
2、 Select the plug-in just installed as my user permission
Two 、 Create the role
2.1 Plug in features
stay Jenkins Found under settings Manage and Assign Roles
And click into
The main function :
2.2 Role management
1、 Click on the image above Manage Roles
Enter role management
2、 Create a global role
Create a file called base The global role of , This role can be used as the basic permission of all users , That is, all ordinary users have basic permissions , And give the character Overall Under the Read
jurisdiction .
3、 Create project roles
Create a file called shop Project role of ,Pattern For filtering or matching regular expression items ,cms.*
Said to cms The first item will be matched to , After setting up , Assign corresponding permissions to the project role .
Pattern Can match the job (job)、 agent (agents)、 Folder (folders) And other project keywords and types .
The format is :jobs, agents, folders, etc
If there are more than one , Use commas in English "," Just separate .
4、 Create node roles
Node role is mainly used for master-slave Jenkins When the deployment , Configure node permissions .
2.3 Role assignment
1、 Create user
2、 Click on Assign Roles
Assign permissions to users
Follow the project role permissions configured above ,ops Users can only match with cms The opening project , He can't see other projects , Next, we will verify .
3、ops User login authentication
thus ,Jenkins User permissions are set !
边栏推荐
- Static test tool
- 现在网上开户安全么?想知道我现在在南宁,到哪里开户比较好?
- Awk processing JSON processing
- Cantata9.0 | new features
- POJ 3140 contents division "suggestions collection"
- Le capital - investissement est - il légal en Chine? C'est sûr?
- ISO 26262 - considerations other than requirements based testing
- 恶魔奶爸 A3阶段 近常速语流初接触
- I have to use my ID card to open an account. Is the bank card safe? I don't understand it
- 恶魔奶爸 B3 少量泛读,完成两万词汇量+
猜你喜欢
C语言 整型 和 浮点型 数据在内存中存储详解(内含原码反码补码,大小端存储等详解)
Is embedded system really safe? [how does onespin comprehensively solve the IC integrity problem for the development team]
[200 opencv routines] 223 Polygon fitting for feature extraction (cv.approxpolydp)
使用枚举实现英文转盲文
C language helps you understand pointers from multiple perspectives (1. Character pointers 2. Array pointers and pointer arrays, array parameter passing and pointer parameter passing 3. Function point
Intelligent software analysis platform embold
Lex & yacc of Pisa proxy SQL parsing
Cantata9.0 | new features
H3C s7000/s7500e/10500 series post stack BFD detection configuration method
Mysql子查询关键字的使用方式(exists)
随机推荐
201215-03-19 - cocos2dx memory management - specific explanation "recommended collection"
Codeforces Round #275 (Div. 2) C – Diverse Permutation (构造)[通俗易懂]
使用高斯Redis实现二级索引
The latest version of codesonar has improved functional security and supports Misra, c++ parsing and visualization
Default constraint and zero fill constraint of MySQL constraint
国家正规的股票交易app有哪些?使用安不安全
恶魔奶爸 B2 突破语法,完成正统口语练习
Onespin | solve the problems of hardware Trojan horse and security trust in IC Design
How to meet the dual needs of security and confidentiality of medical devices?
How much does it cost to develop a small program mall?
[matrix multiplication] [noi 2012] [cogs963] random number generator
Codeforces round 296 (Div. 2) A. playing with paper[easy to understand]
Lex & yacc of Pisa proxy SQL parsing
[paper reading] maps: Multi-Agent Reinforcement Learning Based Portfolio Management System
神兵利器——敏感文件发现工具
Demon daddy B3 read extensively in a small amount, and completed 20000 vocabulary+
恶魔奶爸 指南帖——简易版
2022年在启牛开中银股票的账户安全吗?
Addition, deletion, modification and query of sqlhelper
Implementation of mahout Pearson correlation