当前位置:网站首页>Jenkins user rights management
Jenkins user rights management
2022-07-07 21:25:00 【Cloud computing security】
Jenkins edition :2.332.3
Catalog
One 、 Installing a plug-in
1.1 install
stay Jenkins Install the plug-in in the management plug-in of
Input Role You can find it , As shown in the figure below, I have already installed .
1.2 To configure
Click on Configure Global Security Enter the configuration
1、 stay Jenkins The following icons are found in the settings
2、 Select the plug-in just installed as my user permission
Two 、 Create the role
2.1 Plug in features
stay Jenkins Found under settings Manage and Assign Roles
And click into
The main function :
2.2 Role management
1、 Click on the image above Manage Roles
Enter role management
2、 Create a global role
Create a file called base The global role of , This role can be used as the basic permission of all users , That is, all ordinary users have basic permissions , And give the character Overall Under the Read
jurisdiction .
3、 Create project roles
Create a file called shop Project role of ,Pattern For filtering or matching regular expression items ,cms.*
Said to cms The first item will be matched to , After setting up , Assign corresponding permissions to the project role .
Pattern Can match the job (job)、 agent (agents)、 Folder (folders) And other project keywords and types .
The format is :jobs, agents, folders, etc
If there are more than one , Use commas in English "," Just separate .
4、 Create node roles
Node role is mainly used for master-slave Jenkins When the deployment , Configure node permissions .
2.3 Role assignment
1、 Create user
2、 Click on Assign Roles
Assign permissions to users
Follow the project role permissions configured above ,ops Users can only match with cms The opening project , He can't see other projects , Next, we will verify .
3、ops User login authentication
thus ,Jenkins User permissions are set !
边栏推荐
- Details of C language integer and floating-point data storage in memory (including details of original code, inverse code, complement, size end storage, etc.)
- 【C语言】指针进阶---指针你真的学懂了吗?
- I have to use my ID card to open an account. Is the bank card safe? I don't understand it
- Insufficient permissions
- 解决使用uni-app MediaError MediaError ErrorCode -5
- Deadlock conditions and preventive treatment [easy to understand]
- The little money made by the program ape is a P!
- Is it safe to open an account of BOC shares in kainiu in 2022?
- A brief understanding of the in arc__ bridge、__ bridge_ Retained and__ bridge_ transfer
- easyui 日期控件清空值
猜你喜欢
How to meet the dual needs of security and confidentiality of medical devices?
How does codesonar help UAVs find software defects?
Tensorflow2. How to run under x 1 Code of X
Make this crmeb single merchant wechat mall system popular, so easy to use!
Goal: do not exclude yaml syntax. Try to get started quickly
Using enumeration to realize English to braille
Virtual machine network configuration in VMWare
[C language] advanced pointer --- do you really understand pointer?
Usage of MySQL subquery keywords (exists)
程序猿赚的那点钱算个P啊!
随机推荐
Arlo's troubles
Awk processing JSON processing
How to choose financial products? Novice doesn't know anything
Implement secondary index with Gaussian redis
HOJ 2245 浮游三角胞(数学啊 )
神兵利器——敏感文件发现工具
The latest version of codesonar has improved functional security and supports Misra, c++ parsing and visualization
Numerical method for solving optimal control problem (0) -- Definition
AADL inspector fault tree safety analysis module
Hdu4876zcc love cards (multi check questions)
万字总结数据存储,三大知识点
Mahout-Pearson correlation的实现
Demon daddy guide post - simple version
Validutil, "Rethinking the setting of semi supervised learning on graphs"
EasyUI date control emptying value
UVA 12230 – crossing rivers (probability) "suggested collection"
Default constraint and zero fill constraint of MySQL constraint
Codeforces 474 F. Ant colony
Goal: do not exclude yaml syntax. Try to get started quickly
【OpenCV 例程200篇】223. 特征提取之多边形拟合(cv.approxPolyDP)