In this chapter, we will cover the following recipes:
- Improving security with Jenkins configuration
- Configuring Authorization - Matrix-based security
- Configuring a Project-based Matrix Authorization Strategy
- Jenkins and OpenLDAP integration
- Jenkins and Active Directory integration
- Jenkins and OWASP Zed attack proxy integration
- Testing for OWASP's top 10 security issues
- Finding 500 errors and XSS attacks in Jenkins through fuzzing
- Avoiding sign-up bots with JCaptcha