InterviewSolution
| 1. |
How do you secure Jenkins? |
|
Answer» In the default setup of JENKINS 1.x, Jenkins does not play out any security checks. This implies the capacity of Jenkins to launch procedures and access local files are accessible to any individual who can get to Jenkins web UI and some more. Securing Jenkins has TWO viewpoints to it.
You should secure the entrance to Jenkins UI with the goal that clients are VALIDATED and suitable arrangement of authorizations are given to them. This setting is controlled for the most part in two ways:
You may utilize outside LDAP or Active Directory as the security domain, and you may pick "everybody full access once signed in" mode for approval methodology. Or then again you may let Jenkins run its very own client database, and perform access control dependent on the authorization/client grid. Some important security considerations:
|
|