Cyber Attack | Data Breach Jenkins LDAP Support from JumpCloud® – Security Boulevard

Published on April 6th, 2019 📆 | 5746 Views ⚑

0

Jenkins LDAP Support from JumpCloud® – Security Boulevard


iSpeech.org

As a continuous integration/continuous development (CI/CD) tool with over 1,400 plugins, Jenkins is instrumental in helping software organizations ship code to production. When coupled with a strong DevOps methodology, Jenkins can quickly become invaluable to an organization’s workflow and success. In turn, JumpCloud® provides directory services for a great deal of DevOps organizations, and seeks to continuously streamline enablement of Jenkins via LDAP.

Complexities for Managing User Access to Jenkins

OpenLDAP

A core part of implementing Jenkins is managing user access and roles in the software development and operations process. As a critical part of any DevOps organization’s code, infrastructure, and deployment, it’s important to ask, who manages this user access and how is it secured?





Well, for those overseeing even a modest-sized software organization (devs and ops personnel), manually managing access to Jenkins can be laborious and even painful. As a result, many organizations turn to authenticating user access to Jenkins via LDAP. It’s the natural thought process to combine Jenkins with LDAP, and there are certainly some upsides to leveraging LDAP. For some organizations, however, this means building and maintaining their own OpenLDAP® or Active Directory® server, which can be painful and time consuming in its own way as well. Instead of robbing Peter to pay Paul, so to speak, organizations are looking for a turnkey solution that can really smooth out the process by managing user access to Jenkins via LDAP.

Streamline Jenkins via LDAP with a Cloud Directory

To satisfy this need, many organizations are off-loading their authentication and authorization process to a cloud-based directory service. Through a cloud directory, such as JumpCloud Directory-as-a-Service®, user management really finds its wings as authentication can be federated via LDAP, SAML, RADIUS, SSH, native OS APIs, and more. Specifically for Jenkins, organizations can simply point their Jenkins instance to the cloud-based Directory-as-a-Service platform, which handles LDAP authentication through a global, load balanced network of LDAP servers.

The benefit to software development and operations engineers is the ability to eliminate on-prem infrastructure and the heavy lifting of implementing, managing, and securing an LDAP server. (Read more...)

Source link

Tagged with:



Comments are closed.