-
New Feature
-
Resolution: Unresolved
-
Critical
-
None
Authorize-project plugin has difficulties for its usage as it requires actual users to run builds as.
It can easily conflicts with policies of administrators:
- Administrators might don't want to use an actual user for managing authorizations of builds.
- E.g. Alice and Bob belongs to a DevOps team. They want to run a project with the authorization of DevOps, but not of Alice or Bob. Because it might cause problems when they quit the job.
- This can be resolved by defining a non-actual user used only to manage authorizations of builds.
- Administrator doesn't want to define or can't define non-actual users.
- It can be the case especialy when they use an external authentication system (such as Active Directory).
This can be resolved by introducing a feature to define non-actual users, just like build-in users such as ANONYMOUS and SYSTEM.
- They cannot be used to login Jenkins. (They don't have passwords)
- They have permissions. That is, AuthorizationStrategy should handle them as they handle actual users.
It might be a feature of authorize-project plugin, Jenkins core, or maybe a brand-new plugin.
- duplicates
-
JENKINS-15063 support for multiple security realms with failover
- Open
- relates to
-
JENKINS-32596 ACLDecorator
- Open
-
JENKINS-33793 Anonymous GET endpoint for input step approval
- Open
-
JENKINS-50249 disable "build by token" by default using a system property in Jenkins
- Open