Menu
Configuration as Code pluginHomeDocsDemosTutorialBlogGitHub
Configuration as Code pluginHome
  • Docs
  • Demos
  • Tutorial
  • Blog
  • GitHub
  • JCasC development
    • API and design
    • Implementation details
  • Plugin compatibility
    • Compatibility
  • Plugin developers
    • Guide to plugin developers
    • Benchmarks
  • Features
    • Export
    • Configuration reload
    • Handling secrets
    • Creating jobs
  • Demos
    • Active Directory
    • Alauda DevOps Sync
    • Artifact Manager S3
    • Artifactory
    • Build agents
    • Config file provider
    • Credentials
    • Docker
    • Amazon EC2
    • Local security realm
    • External Workspace Manager
    • Git
    • GitHub
    • GitHub OAuth
    • GitLab
    • Git SCM
    • Google login
    • Graphite
    • JDK
    • Jenkins
    • JIRA
    • Jobs
    • Keycloak
    • Kubernetes
    • Helm
    • Kubernetes secrets
    • LDAP
    • Mailer
    • Matrix auth
    • Mercurial
    • Mesos
    • MSBuild
    • MS Test runner
    • NodeJS
    • Pipeline model definition
    • Proxy
    • Role strategy
    • SAML
    • Sbt
    • Simple theme
    • Slack
    • SonarQube
    • Statistics Gatherer
    • Terraform
    • TFS
    • Warnings next generation
    • Global libraries
  • Tutorial
    • Getting started

Active Directory

#Configure activeDirectory Security Realm

Basic configuration of the Active Directory plugin

For plugin version 2.12 and up:

#sample configuration

jenkins:
securityRealm:
activeDirectory:
domains:
- name: "acme"
servers: "ad1.acme.com:123,ad2.acme.com:456"
site: "site"
bindName: "admin"
bindPassword: "${BIND_PASSWORD}"
tlsConfiguration: JDK_TRUSTSTORE
groupLookupStrategy: "RECURSIVE"
removeIrrelevantGroups: true
customDomain: true
cache:
size: 500
ttl: 600
startTls: true
internalUsersDatabase:
jenkinsInternalUser: "jenkins"
Edit this page
Previous
« Creating jobs
Next
Alauda DevOps Sync »
  • sample configuration

Community

  • Gitter

Social

  • Blog
  • GitHub
Copyright © 2020. Built with Docusaurus.