Trust Model
Understanding the underlying trust model of CloudBees CI, including key principles and considerations across different environments.
Pod Security Admission
Implementing Pod Security Admission policies to enforce security standards for pods within Kubernetes clusters.
Centrally Managing Security for Controllers
Strategies for centralizing security management of CloudBees CI controllers in various deployment setups.
Cyberark Credential Provider Plugin
Integrating the Cyberark Credential Provider Plugin for secure credential management within CloudBees CI.
HashiCorp Vault Plugin
Leveraging the HashiCorp Vault Plugin to securely store and manage secrets in CloudBees CI.
Enabling Advanced Use Cases
Implementing cross-controller triggers and bulk operations while maintaining security best practices.
Role-Based Access Control (RBAC)
Implementing and configuring RBAC to define granular access control policies within CloudBees CI.
RBAC Auto-Configurer
Automating RBAC configuration for streamlined and consistent access control management.
RBAC Authorize Project Plugin
Utilizing the RBAC Authorize Project plugin for enhanced project-level access control.
Setting Up Operations Center Access Controls
Configuring access controls within Operations Center to manage user permissions and privileges.
Setting Up Access Controls on Connected Controllers
Establishing access control policies on connected controllers for comprehensive security management.
Testing the SSH Connection to an Agent
Verifying and troubleshooting SSH connections to agents for secure communication.
Restricted Credentials
Implementing and managing restricted credentials for enhanced security and access control.
Folders Plus
Extending folder functionalities with Folders Plus plugin for advanced organizational capabilities.
Injecting Secrets into Builds
Securely injecting secrets into builds without compromising sensitive information.
Managing Build Agents with Nodes Plus
Utilizing the Nodes Plus plugin for enhanced management and security of build agents.
Extended Security Settings
Exploring and implementing advanced security settings within CloudBees CI.
Enhanced Credentials Masking
Implementing enhanced credentials masking to further protect sensitive information.
Understanding Beekeeper Security Warnings
Interpreting and addressing security warnings generated by Beekeeper to maintain a secure environment.
Alert administrators to potential issues in CloudBees CI instances.
Implementing CloudBees Administrative Monitors to alert administrators to potential issues in their instances.
Security Recommendations
Best practices and recommendations for securing CloudBees CI deployments across various environments.
Using Single Sign-On (SSO)
Implementing SSO for centralized user authentication and access management.
CloudBees CI Integration with Microsoft Entra ID
Integrating CloudBees CI with Microsoft Entra ID for enhanced identity and access management.
Operations Center Specific Permissions
Understanding and configuring specific permissions within Operations Center for granular access control.
Authentication Mapping
Configuring authentication mapping to align user identities across different systems.
Example Configurations
Reference examples of security configurations for CloudBees CI across various environments.
Delegating Administration
Delegating administrative tasks while maintaining security and control within CloudBees CI.
Data Collection for the CloudBees Analytics Plugin
Understanding data collection mechanisms and security implications of the CloudBees Analytics Plugin.
External Secrets Management
Implementing external secrets management solutions for enhanced security and control over secrets.
Replacing an Expired Certificate
Steps to replace an expired certificate and maintain secure connections within CloudBees CI.
List of URLs that Need Access
Comprehensive list of URLs that require access for proper functioning of CloudBees CI.
Block URL Access Plugin
Utilizing the Block URL Access plugin to restrict access to specific URLs for security purposes.
Serving Resources from Jenkins
Securely serving resources from Jenkins while adhering to security best practices.
Verifying Helm Charts Published with a Signature
Ensuring the authenticity and integrity of Helm charts using signature verification.
Block URL Access Plugin on Traditional platforms
Utilizing the Block URL Access plugin to restrict access to specific URLs in traditional environments.
Serving Resources on Traditional platforms
Securely serving resources from Jenkins in traditional environments while adhering to security best practices.