{"id":101452,"date":"2023-11-22T11:38:53","date_gmt":"2023-11-22T16:38:53","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=101452"},"modified":"2024-06-27T14:46:30","modified_gmt":"2024-06-27T18:46:30","slug":"configure-jenkins-to-use-cloud-ldap","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/configure-jenkins-to-use-cloud-ldap","title":{"rendered":"Configure Jenkins to Use Cloud LDAP"},"content":{"rendered":"\n
Using JumpCloud’s LDAP-as-a-Service to integrate Jenkins authentication and authorization allows administrators to map permissions to users and groups enabled in your JumpCloud LDAP Directory instance.<\/p>\n\n\n\n
Securing access to the Jenkins UI is configured at two levels under the Configure Global Security section in the Manage Jenkins panel. First, choose a Security Realm, which controls where User and Group information and authentication is managed and where JumpCloud LDAP is configured. Second, choose an Authorization Strategy, which provides the ability to assign explicit permissions to users and groups, allowing granular control of all available operations. <\/p>\n\n\n\n
JumpCloud LDAP supports all available Authorization Strategies, but the most commonly used strategies are Matrix-based security, Project-based Matrix Authorization Strategy, and Role-Based strategy.<\/p>\n\n\n\n