当前位置:网站首页>Jenkins user rights management
Jenkins user rights management
2022-07-07 21:25:00 【Cloud computing security】

Jenkins edition :2.332.3
Catalog
One 、 Installing a plug-in
1.1 install
stay Jenkins Install the plug-in in the management plug-in of
Input Role You can find it , As shown in the figure below, I have already installed .

1.2 To configure
Click on Configure Global Security Enter the configuration
1、 stay Jenkins The following icons are found in the settings

2、 Select the plug-in just installed as my user permission

Two 、 Create the role
2.1 Plug in features
stay Jenkins Found under settings Manage and Assign Roles And click into

The main function :

2.2 Role management
1、 Click on the image above Manage Roles Enter role management

2、 Create a global role
Create a file called base The global role of , This role can be used as the basic permission of all users , That is, all ordinary users have basic permissions , And give the character Overall Under the Read jurisdiction .
3、 Create project roles
Create a file called shop Project role of ,Pattern For filtering or matching regular expression items ,cms.* Said to cms The first item will be matched to , After setting up , Assign corresponding permissions to the project role .

Pattern Can match the job (job)、 agent (agents)、 Folder (folders) And other project keywords and types .
The format is :jobs, agents, folders, etc If there are more than one , Use commas in English "," Just separate .
4、 Create node roles
Node role is mainly used for master-slave Jenkins When the deployment , Configure node permissions .

2.3 Role assignment
1、 Create user

2、 Click on Assign Roles Assign permissions to users

Follow the project role permissions configured above ,ops Users can only match with cms The opening project , He can't see other projects , Next, we will verify .
3、ops User login authentication

thus ,Jenkins User permissions are set !
边栏推荐
- Postgresql数据库character varying和character的区别说明
- Intelligent software analysis platform embold
- Codeforces round 275 (Div. 2) C – diverse permutation (construction) [easy to understand]
- openGl超级宝典学习笔记 (1)第一个三角形「建议收藏」
- 数值法求解最优控制问题(〇)——定义
- Prometheus remote_ write InfluxDB,unable to parse authentication credentials,authorization failed
- POJ 3140 contents division "suggestions collection"
- 2022年在启牛开中银股票的账户安全吗?
- sqlHelper的增删改查
- C language helps you understand pointers from multiple perspectives (1. Character pointers 2. Array pointers and pointer arrays, array parameter passing and pointer parameter passing 3. Function point
猜你喜欢
MySQL约束之默认约束default与零填充约束zerofill

Focusing on safety in 1995, Volvo will focus on safety in the field of intelligent driving and electrification in the future

C语言 整型 和 浮点型 数据在内存中存储详解(内含原码反码补码,大小端存储等详解)

使用枚举实现英文转盲文
Mysql子查询关键字的使用方式(exists)
![[C language] advanced pointer --- do you really understand pointer?](/img/ee/79c0646d4f1bfda9543345b9da0f25.png)
[C language] advanced pointer --- do you really understand pointer?

C语言多角度帮助你深入理解指针(1. 字符指针2. 数组指针和 指针数组 、数组传参和指针传参3. 函数指针4. 函数指针数组5. 指向函数指针数组的指针6. 回调函数)

恶魔奶爸 B3 少量泛读,完成两万词汇量+

How does codesonar help UAVs find software defects?

Using enumeration to realize English to braille
随机推荐
Jetty:配置连接器[通俗易懂]
A brief understanding of the in arc__ bridge、__ bridge_ Retained and__ bridge_ transfer
Static test tool
How much does it cost to develop a small program mall?
AADL inspector fault tree safety analysis module
Devil daddy B1 hearing the last barrier, break through with all his strength
[function recursion] do you know all five classic examples of simple recursion?
Feature generation
UVA 11080 – place the guards
The new version of onespin 360 DV has been released, refreshing the experience of FPGA formal verification function
[UVALive 6663 Count the Regions] (dfs + 离散化)[通俗易懂]
[matrix multiplication] [noi 2012] [cogs963] random number generator
华泰证券可以做到万一佣金吗,万一开户安全嘛
Postgresql数据库character varying和character的区别说明
Onespin | solve the problems of hardware Trojan horse and security trust in IC Design
uva 12230 – Crossing Rivers(概率)「建议收藏」
Demon daddy B2 breaks through grammar and completes orthodox oral practice
Using enumeration to realize English to braille
SQL injection error report injection function graphic explanation
Object-C programming tips timer "suggestions collection"