Jenkins LDAP Support From JumpCloud®

By George Lattimore Posted April 5, 2019

OpenLDAP Jenkins

As a continuous integration/continuous development (CI/CD) tool with over 1,400 plugins, Jenkins is instrumental in helping software organizations ship code to production. When coupled with a strong DevOps methodology, Jenkins can quickly become invaluable to an organization’s workflow and success. In turn, JumpCloud® provides directory services for a great deal of DevOps organizations, and seeks to continuously streamline enablement of Jenkins via LDAP.

Complexities for Managing User Access to Jenkins

A core part of implementing Jenkins is managing user access and roles in the software development and operations process. As a critical part of any DevOps organization’s code, infrastructure, and deployment, it’s important to ask, who manages this user access and how is it secured?

OpenLDAP

Well, for those overseeing even a modest-sized software organization (devs and ops personnel), manually managing access to Jenkins can be laborious and even painful. As a result, many organizations turn to authenticating user access to Jenkins via LDAP. It’s the natural thought process to combine Jenkins with LDAP, and there are certainly some upsides to leveraging LDAP. For some organizations, however, this means building and maintaining their own OpenLDAP® or Active Directory® server, which can be painful and time consuming in its own way as well. Instead of robbing Peter to pay Paul, so to speak, organizations are looking for a turnkey solution that can really smooth out the process by managing user access to Jenkins via LDAP.

Streamline Jenkins via LDAP with a Cloud Directory

To satisfy this need, many organizations are off-loading their authentication and authorization process to a cloud-based directory service. Through a cloud directory, such as JumpCloud Directory-as-a-Service®, user management really finds its wings as authentication can be federated via LDAP, SAML, RADIUS, SSH, native OS APIs, and more. Specifically for Jenkins, organizations can simply point their Jenkins instance to the cloud-based Directory-as-a-Service platform, which handles LDAP authentication through a global, load balanced network of LDAP servers.

The benefit to software development and operations engineers is the ability to eliminate on-prem infrastructure and the heavy lifting of implementing, managing, and securing an LDAP server. What’s more, user identities stored in the Directory-as-a-Service platform can be leveraged across far more than just Jenkins, including Windows® , macOS® , and Linux®  systems, AWS®  cloud server, G Suite and Office 365, web applications, WiFi, and more.

Explore Directory-as-a-Service for Free

JumpCloud understands that each DevOps organization is different, and brings their own needs, requirements, and challenges to the table. That’s why the entire platform is freely available to test, explore, and implement for up to 10 users. Get a feel for the functionality, and try out automating Jenkins user management via LDAP to see firsthand how the cloud directory can simplify your workflow. If you’d rather speak to a representative first about Jenkins LDAP support from JumpCloud, drop us a note and we’ll get back to you shortly to answer any questions you may have.

George Lattimore

George is a writer at JumpCloud, a central source for authenticating, authorizing, and managing your IT infrastructure through the cloud. With a degree in Marketing and an MS in Public Communications and Technology, George enjoys writing about how the IT landscape is adapting to a diversified field of technology.

Recent Posts