Uploaded image for project: 'Jenkins'
  1. Jenkins
  2. JENKINS-74965

Add support for Repository, Project and Workspace Access Token for Bitbucket Cloud

    • 933.v7119e94e8f56

      Access Tokens are passwords used for scripting tasks and integrating tools (such as CI/CD tools) with Bitbucket Cloud. Workspace Access Tokens are designed for use with a single application with limited permissions, so they don't require two-step verification (2SV, also known as two-factor authentication or 2FA).

      Workspace Access Tokens are not tied to a user's account but are connected to a Bitbucket workspace, restricting the token's access to a single workspace and any projects/repositories under that workspace, providing a more secure solution than user-based authentication methods such as App passwords.

      Project Access Tokens are tied to a Bitbucket project, not a user's account, restricting the token's access to a single project and any repositories in that project. This provides a more secure solution than user-based authentication methods such as App passwords.

      Repository Access Tokens are tied to a repository, not a user’s account. This restricts the token’s access to a single repository, providing a more secure solution than user-based authentication methods such as App passwords.

      Bitbucket documentation describe how these can be used in-place of legacy username:password format here:

      So in theory they should work in the same way that OAuth tokens do by setting jenkins:credentials:username to x-token-auth to perform git clone/feath/pull operation and send the token as Header Authorization: Bearer <access_token> for the REST APIs

          [JENKINS-74965] Add support for Repository, Project and Workspace Access Token for Bitbucket Cloud

          Nikolas Falco created issue -
          Nikolas Falco made changes -
          Status Original: Open [ 1 ] New: In Progress [ 3 ]
          Nikolas Falco made changes -
          Remote Link New: This issue links to "PR (Web Link)" [ 30296 ]
          Nikolas Falco made changes -
          Description Original: Access Tokens are passwords used for scripting tasks and integrating tools (such as CI/CD tools) with Bitbucket Cloud. Workspace Access Tokens are designed for use with a single application with limited permissions, so they don't require two-step verification (2SV, also known as two-factor authentication or 2FA).

          Workspace Access Tokens are not tied to a user's account but are connected to a Bitbucket workspace, restricting the token's access to a single workspace and any projects/repositories under that workspace, providing a more secure solution than user-based authentication methods such as App passwords.

          Project Access Tokens are tied to a Bitbucket project, not a user's account, restricting the token's access to a single project and any repositories in that project. This provides a more secure solution than user-based authentication methods such as App passwords.

          Repository Access Tokens are tied to a repository, not a user’s account. This restricts the token’s access to a single repository, providing a more secure solution than user-based authentication methods such as App passwords.

          Bitbucket documentation describe how these can be used in-place of legacy username:password format here:
           * [https://support.atlassian.com/bitbucket-cloud/docs/using-workspace-access-tokens/|Using Workspace Access Tokens]
           * [https://support.atlassian.com/bitbucket-cloud/docs/using-project-access-tokens/|Using Project Access Tokens]
           * [https://support.atlassian.com/bitbucket-cloud/docs/using-access-tokens/|Using Repository Access Tokens]

          So in theory they should work in the same way that OAuth tokens do by setting {{jenkins:credentials:username}} to {{x-token-auth}} to perform git clone/feath/pull operation and send the token as Header {{Authorization: Bearer <access_token>}} for the REST APIs
          New: Access Tokens are passwords used for scripting tasks and integrating tools (such as CI/CD tools) with Bitbucket Cloud. Workspace Access Tokens are designed for use with a single application with limited permissions, so they don't require two-step verification (2SV, also known as two-factor authentication or 2FA).

          Workspace Access Tokens are not tied to a user's account but are connected to a Bitbucket workspace, restricting the token's access to a single workspace and any projects/repositories under that workspace, providing a more secure solution than user-based authentication methods such as App passwords.

          Project Access Tokens are tied to a Bitbucket project, not a user's account, restricting the token's access to a single project and any repositories in that project. This provides a more secure solution than user-based authentication methods such as App passwords.

          Repository Access Tokens are tied to a repository, not a user’s account. This restricts the token’s access to a single repository, providing a more secure solution than user-based authentication methods such as App passwords.

          Bitbucket documentation describe how these can be used in-place of legacy username:password format here:
           * [Using Workspace Access Tokens|https://support.atlassian.com/bitbucket-cloud/docs/using-workspace-access-tokens/]
           * [Using Project Access Tokens|https://support.atlassian.com/bitbucket-cloud/docs/using-project-access-tokens/]
           * [Using Repository Access Tokens|https://support.atlassian.com/bitbucket-cloud/docs/using-access-tokens/]

          So in theory they should work in the same way that OAuth tokens do by setting {{jenkins:credentials:username}} to {{x-token-auth}} to perform git clone/feath/pull operation and send the token as Header {{Authorization: Bearer <access_token>}} for the REST APIs
          Nikolas Falco made changes -
          Resolution New: Fixed [ 1 ]
          Status Original: In Progress [ 3 ] New: Fixed but Unreleased [ 10203 ]
          Kalle Niemitalo made changes -
          Link New: This issue causes JENKINS-74970 [ JENKINS-74970 ]
          Kalle Niemitalo made changes -
          Link New: This issue causes JENKINS-74972 [ JENKINS-74972 ]
          Nikolas Falco made changes -
          Released As New: 933.v7119e94e8f56
          Status Original: Fixed but Unreleased [ 10203 ] New: Closed [ 6 ]
          Kalle Niemitalo made changes -
          Link Original: This issue causes JENKINS-74970 [ JENKINS-74970 ]

            nfalco Nikolas Falco
            nfalco Nikolas Falco
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

              Created:
              Updated:
              Resolved: