CloudBees CI on traditional platforms security guide

1 minute readSecurity

Access controls are essential to ensure only authorized users have access to sensitive information, like credentials, to prevent potential malicious use of that information. In CloudBees CI, these controls are configured from a central dashboard in operations center and then enforced on all connected managed or client controllers.

The operations center’s security options follow the standard Jenkins security model, offering two axes to security, as well as options for adjusting how strict enforcement of these security settings should be. Administrators can force connected controllers to delegate all of their security settings, allow teams complete control over their own security settings, or delegate only some security settings to teams.