Trust model
Understand the underlying trust model of CloudBees CI, including key principles and considerations across different environments.
Pod Security Admission
Implement Pod Security Admission (PSA) policies to enforce security standards for pods within Kubernetes clusters.
Centrally manage security for controllers
Strategies to centralize security management of CloudBees CI controllers in various deployment setups.
Cyberark Credential Provider plugin
Integrate the Cyberark Credential Provider plugin for secure credential management within CloudBees CI.
HashiCorp Vault plugin
Leverage the HashiCorp Vault plugin to securely store and manage secrets in CloudBees CI.
Enable advanced use cases
Implement cross-controller triggers and bulk operations while maintaining security best practices.
Role-Based Access Control
Implement and configure Role-Based Access Control (RBAC) to define granular access control policies within CloudBees CI.
Role-Based Access Control Auto-Configurer plugin
Automate RBAC configuration for streamlined and consistent access control management.
Restrict job triggers
Implement restrictions on job triggers to control builds in folders or the entire CI instance.
Set up access controls on the operations center
Configure access controls within Operations Center to manage user permissions and privileges.
Set up access controls on connected controllers
Establish access control policies on connected controllers for comprehensive security management.
Test the SSH connection to an agent
Verify and troubleshoot SSH connections to agents for secure communication.
Restricted credentials
Implement and manage restricted credentials for enhanced security and access control.
Folders Plus
Extend folder functionalities with the Folders Plus plugin for advanced organizational capabilities.
Inject secrets into builds
Securely injecting secrets into builds without compromising sensitive information.
Manage build agents with Nodes Plus
Utilize the Nodes Plus plugin for enhanced management and security of build agents.
Extended security settings
Explore and implement advanced security settings within CloudBees CI.
Enhanced credentials masking
Implement enhanced credentials masking to further protect sensitive information.
Understand Beekeeper security warnings
Interpret and address security warnings generated by Beekeeper to maintain a secure environment.
Alert administrators to potential issues in CloudBees CI instances.
Implement CloudBees administrative monitors to alert administrators to potential issues in their instances.
Security recommendations
Best practices and recommendations to secure CloudBees CI deployments across various environments.
Use single sign-on
Implement single sign-on (SSO) for centralized user authentication and access management.
CloudBees CI integration with Microsoft Entra ID
Integrate CloudBees CI with Microsoft Entra ID for enhanced identity and access management.
Operations center-specific permissions
Understand and configure specific permissions within the operations center for granular access control.
Authentication mapping
Configure authentication mapping to align user identities across different systems.
Example configurations
Reference examples of security configurations for CloudBees CI across various environments.
Delegate Administration
Delegate administrative tasks while maintaining security and control within CloudBees CI.
Data collection for the CloudBees Analytics plugin
Understand data collection mechanisms and security implications of the CloudBees Analytics plugin.
External secrets management
Implement external secrets management solutions for enhanced security and control over secrets.
Replace an expired certificate
Steps to replace an expired certificate and maintain secure connections within CloudBees CI.
List of URLs that need access
Comprehensive list of URLs that require access for proper functioning of CloudBees CI.
Block URL Access plugin
Utilize the Block URL Access plugin to restrict access to specific URLs for security purposes.
Serve resources from Jenkins
Securely serve resources from Jenkins while adhering to security best practices.
Verify Helm Charts published with a signature
Ensure the authenticity and integrity of Helm charts using signature verification.