{"id":26123,"date":"2021-12-22T09:06:45","date_gmt":"2021-12-22T09:06:45","guid":{"rendered":"https:\/\/www.devopsschool.com\/blog\/?p=26123"},"modified":"2022-03-04T12:52:48","modified_gmt":"2022-03-04T12:52:48","slug":"understanding-authentication-and-authorization-methods-in-jenkins","status":"publish","type":"post","link":"https:\/\/www.devopsschool.com\/blog\/understanding-authentication-and-authorization-methods-in-jenkins\/","title":{"rendered":"Understanding Authentication and Authorization methods in jenkins"},"content":{"rendered":"\n<p><strong>Authentication &#8211; How to login into Jenkins<br>Authorization &#8211; User&#8217;s permissions to do in Jenkins<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to login into Jenkins or supported authentication methods in jenkins?<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Delegate to servlet container<\/li><li>&#8216;Jenkins&#8217; own user database<\/li><li>LDAP<\/li><li>Unix user\/group database<\/li><li>None<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How to set user&#8217;s permissions for setting up required access in Jenkins?<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Anyone can do anything<\/li><li>Legacy mode<\/li><li>Logged-in users can do anything<\/li><li>Matrix-based security<\/li><li>Project-based Matrix Authorization Strategy<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"781\" height=\"565\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-20.png\" alt=\"\" class=\"wp-image-26124\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-20.png 781w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-20-300x217.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-20-768x556.png 768w\" sizes=\"auto, (max-width: 781px) 100vw, 781px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Matrix-based security<\/h2>\n\n\n\n<p>In this scheme, you can configure who can do what by using a big table.<br>Each column represents a permission. Hover the mouse over the permission names to get more information about what they represent.<\/p>\n\n\n\n<p>Each row represents a user or a group (often called &#8216;role&#8217;, depending on the security realm.) This includes a special user &#8216;anonymous&#8217;, which represents unauthenticated users, as well as &#8216;authenticated&#8217;, which represents all authenticated users (IOW, everyone except anonymous users.) Use the text box below the table to add new users\/groups\/roles to the table, and click the [x] icon to remove it from the table.<\/p>\n\n\n\n<p>Permissions are additive. That is, if an user X is in group A, B, and C, then the permissions that this user actually has are the union of all permissions given to X, A, B, C, and anonymous.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"477\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-21-1024x477.png\" alt=\"\" class=\"wp-image-26127\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-21-1024x477.png 1024w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-21-300x140.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-21-768x358.png 768w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-21.png 1282w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Project-based Matrix Authorization Strategy<\/h2>\n\n\n\n<p>This mode is an extension to &#8220;Matrix-based security&#8221; that allows additional ACL matrix to be defined for each project separately (which is done on the job configuration screen.)<br>This allows you to say things like &#8220;Joe can access project A, B, and C but he can&#8217;t see D.&#8221; See the help of &#8220;Matrix-based security&#8221; for the concept of matrix-based security in general.<\/p>\n\n\n\n<p>ACLs are additive, so the access rights granted below will be effective for all the projects.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"411\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-22-1024x411.png\" alt=\"\" class=\"wp-image-26129\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-22-1024x411.png 1024w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-22-300x120.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-22-768x308.png 768w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-22.png 1228w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"> Project-based Matrix Authorization Strategy  &#8211; Folder Level Access <\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"604\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-23-1024x604.png\" alt=\"\" class=\"wp-image-26131\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-23-1024x604.png 1024w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-23-300x177.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-23-768x453.png 768w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-23.png 1147w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"> Project-based Matrix Authorization Strategy  &#8211; Job Level Access<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-25-1024x577.png\" alt=\"\" class=\"wp-image-26134\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-25-1024x577.png 1024w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-25-300x169.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-25-768x433.png 768w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-25-355x199.png 355w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2021\/12\/image-25.png 1136w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Authentication &#8211; How to login into JenkinsAuthorization &#8211; User&#8217;s permissions to do in Jenkins How to login into Jenkins or supported authentication methods in jenkins? Delegate to servlet container &#8216;Jenkins&#8217;&#8230; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_joinchat":[],"footnotes":""},"categories":[2],"tags":[],"class_list":["post-26123","post","type-post","status-publish","format-standard","hentry","category-uncategorised"],"_links":{"self":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/26123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=26123"}],"version-history":[{"count":4,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/26123\/revisions"}],"predecessor-version":[{"id":26135,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/26123\/revisions\/26135"}],"wp:attachment":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=26123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=26123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=26123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}