-
New Feature
-
Resolution: Duplicate
-
Minor
-
Jenkins 1.646
Role-based Authorization Strategy 2.2.0
Steps to reproduce:
- Create a user in Jenkins own user database with upper-case letters.
- Assign a role to this user, but use lower-case letters.
- Note that going back into Assign Roles shows the icon indicating that this user is valid.
- Note that this user does not have the appropriate role.
- Remove the previous role and assign the role to the user using upper-case letters.
- Note that the user now has the appropriate role.
Since a user can login to their account in a case insensitive way, the role assignments should also be handled in a case insensitive way. Right now, it is very hard to figure out why roles are not working when the case is not matched between the role screen and the user database.
- duplicates
-
JENKINS-19409 Support case-insensitive mode for user IDs
-
- Resolved
-
- is duplicated by
-
JENKINS-40442 Role assignments are case sensitive to login credentials
-
- Resolved
-
-
JENKINS-53580 Access denied, user no permission to Full / Read
-
- Closed
-
I have the same issue. My Jenkins instance uses Security Realm of Active Directory, and Authorization of Role-Based Strategy. If the user does not use the same user ID case I use in Role Strategy, then they get the "missing the Overall/Read permission" error.
As Active Directory does not care about case, my WORKAROUND is to enter 2 global and project entries for the user. One uppercase, DW12345, and one lowercase, dw12345. I could tell the user to use only lowercase, but then I would just get hassled by users who don't remember, or want an excuse to debate why we are moving to Jenkins. Love the plugin, as it works perfectly to control job visibility and read/write permissions. But the case sensitivity is an unnecessary pain.