Tom Limoncelli wrote:
> What is Jenkins' security model?

In addition to what Mike Devlin <[email protected]> already wrote, it's
worth noting that a very typical way of using Jenkins is to check out
code from a repository (it supports most of the common ones like git and
subversion) then run that code. This lets you use the same controls on
your Jenkins job and your repository (plus the added benefit of commit
messages and everything else that comes with a VCS) so you don't have to
build yet another access control mechanism.

Adam
_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to