{"id":57012,"date":"2023-04-12T08:44:33","date_gmt":"2023-04-12T03:14:33","guid":{"rendered":"https:\/\/www.tothenew.com\/blog\/?p=57012"},"modified":"2023-04-14T08:53:39","modified_gmt":"2023-04-14T03:23:39","slug":"jenkins-security-management","status":"publish","type":"post","link":"https:\/\/www.tothenew.com\/blog\/jenkins-security-management\/","title":{"rendered":"Jenkins Security Management"},"content":{"rendered":"<p>In this blog, We will learn how to secure Jenkins. One can manage security levels in the Jenkins environment and project security through &#8220;Configure Global Security.&#8221; Securing Jenkins defines who is allowed to access\/use the system.<\/p>\n<p>Jenkins provides 5 types of authorization.<\/p>\n<ol>\n<li><strong>Anyone can do anything<\/strong>&#8211; This is the least secure setup allowing users to perform any operation in the Jenkins server.<\/li>\n<\/ol>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-57007 size-large\" src=\"\/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-33-10-1024x533.png\" alt=\"\" width=\"625\" height=\"325\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-33-10-1024x533.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-33-10-300x156.png 300w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-33-10-768x400.png 768w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-33-10-624x325.png 624w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-33-10.png 1458w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/p>\n<p><strong>2. Legacy Mode<\/strong>&#8211; This authorization uses an existing project.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-57008 size-large\" src=\"\/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-35-31-1024x547.png\" alt=\"\" width=\"625\" height=\"334\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-35-31-1024x547.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-35-31-300x160.png 300w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-35-31-768x410.png 768w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-35-31-624x333.png 624w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-35-31.png 1416w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/p>\n<p><strong>3. Logged-In users can do anything<\/strong>&#8211; Users who have logged in can do anything within this authorization setup.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-57009 size-large\" src=\"\/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-36-24-1024x522.png\" alt=\"\" width=\"625\" height=\"319\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-36-24-1024x522.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-36-24-300x153.png 300w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-36-24-768x391.png 768w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-36-24-624x318.png 624w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-36-24.png 1451w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/p>\n<p><strong>4. Matrix-based security<\/strong>&#8211; It is the best practice among all the authorization options.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-57010 size-large\" src=\"\/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-37-02-1024x532.png\" alt=\"\" width=\"625\" height=\"325\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-37-02-1024x532.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-37-02-300x156.png 300w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-37-02-768x399.png 768w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-37-02-624x324.png 624w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-37-02.png 1446w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/p>\n<p><strong>5. Project-based Matrix authorization strategy- <\/strong>This authorization option helps manage the user&#8217;s access to various tasks concerning the project.<br \/>\n<img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-57011 size-large\" src=\"\/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-37-45-1024x520.png\" alt=\"\" width=\"625\" height=\"317\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-37-45-1024x520.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-37-45-300x152.png 300w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-37-45-768x390.png 768w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-37-45-624x317.png 624w, \/blog\/wp-ttn-blog\/uploads\/2023\/04\/Screenshot-from-2023-04-02-11-37-45.png 1461w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/p>\n<div class=\"ap-custom-wrapper\"><\/div><!--ap-custom-wrapper-->","protected":false},"excerpt":{"rendered":"<p>In this blog, We will learn how to secure Jenkins. One can manage security levels in the Jenkins environment and project security through &#8220;Configure Global Security.&#8221; Securing Jenkins defines who is allowed to access\/use the system. Jenkins provides 5 types of authorization. Anyone can do anything&#8211; This is the least secure setup allowing users to [&hellip;]<\/p>\n","protected":false},"author":1569,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":7},"categories":[2348],"tags":[5184,1892,227,1682],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts\/57012"}],"collection":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/users\/1569"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/comments?post=57012"}],"version-history":[{"count":2,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts\/57012\/revisions"}],"predecessor-version":[{"id":57089,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts\/57012\/revisions\/57089"}],"wp:attachment":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/media?parent=57012"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/categories?post=57012"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/tags?post=57012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}