Securing Jenkins
In this chapter, the key aspects of securing Jenkins will be presented. Security is of paramount importance as Jenkins deals with sensitive data and plays a critical role in the software delivery pipeline. In the previous chapter, we partially explored how to secure Jenkins, including the server setup process, the underlying infrastructure, and plugin management, all aimed at safeguarding Jenkins installations from potential threats and vulnerabilities. In this chapter, we will explore vital measures to enhance the security around who gets to do what on your Jenkins instance. First, we will delve into user authentication and permissions by integrating Jenkins with Azure Active Directory (AD) (see [1] in the Further reading section at the end of this chapter). This integration ensures a centralized and secure user management system, leveraging Azure AD’s robust authentication capabilities. This section will guide you through the setup process and demonstrate...