Skip to content

Commit 347546f

Browse files
committed
Split up glossary into more questions
1 parent eb1c998 commit 347546f

File tree

1 file changed

+10
-9
lines changed

1 file changed

+10
-9
lines changed

docs/faq.adoc

+10-9
Original file line numberDiff line numberDiff line change
@@ -19,12 +19,11 @@ Examples of common external credentials stores for cloud providers or self-hoste
1919

2020
A full listing (including some developer-level details) of https://www.jenkins.io/doc/developer/extensions/credentials/[plugins that provide credentials extensions] is available in the developer documentation.
2121

22-
=== How should I organize my credentials?
22+
=== How do credentials get accessed?
2323

24-
It's important to understand the access model of credentials in order to organize them most appropriately.
2524
Credentials are accessed through a combination of scopes and contexts, which are further categorized into types and domains.
2625

27-
The _context_ of a credential is the path in Jenkins where the credentials are accessed.
26+
The _context_ of a credential is the path in Jenkins (i.e., the URL) where the credentials are accessed.
2827
Contexts include the root Jenkins context, jobs, users, agents, views, folders, and generally any other kind of model object.
2928

3029
The _scope_ of a credential can be _global, system,_ or _user,_ which determines the visibility of a credential to a context.
@@ -37,18 +36,20 @@ Global-scoped credentials are visible to their associated contexts and any child
3736
Global-scoped credentials in the Jenkins Credentials Provider (system credentials) are accessible to any job in the system!
3837
====
3938

40-
Credentials _stores_ are the underlying storage mechanism for secrets, and credentials _providers_ combine them with the functionality to manage secrets in a context for a certain set of scopes.
39+
The _domain_ of a credential is a property of credentials that allows them to be grouped together more logically in the UI.
40+
This does *not* provide any security feature itself and is strictly enforced through the UI.
41+
42+
=== How should I organize my credentials?
43+
44+
Different credentials _providers_ give different means of organizing and exposing credentials.
4145
For example, the Jenkins Credentials Provider uses a system-wide credentials store at the root context and supports both system and global scoped credentials.
4246
Folder plugins provide a Folder Credentials Provider to anchor credentials storage in a folder along with the advanced authorization strategies possible there.
4347
User-scoped credentials are primarily accessed through the User Credentials Provider which stores secrets with the user profile in Jenkins.
4448

45-
Credentials _types_ include things like username/password, secret text, SSH key, etc.
46-
Finally, credentials _domains_ provide a way to help organize credentials by domain name, URI, protocol, and other requirements which can make it much easier to identify the appropriate credentials to use from the UI.
47-
(Domains are _not_ enforced at usage time, only for purposes of the UI.)
48-
4949
Credentials should be organized to minimize granting access.
50-
Common conventions include splitting up credentials by team or product into separate folders.
50+
This can make use of both logical organization into team or product folders as well as fine grained ACLs to grant access to credentials per principal.
5151
Deployment credentials can be added to a user's profile to be used interactively in a deployment job to further isolate credentials access.
52+
Enabling the _Credentials/UseOwn_ or _Credentials/UseItem_ permissions (link:fflags.adoc[feature flags documentation]) allows for further refinement of permissions (e.g., to allow some users to run a build, but only allow certain users to use its folder's or triggering user's deployment credentials).
5253

5354
=== What plugins do I need to be secure?
5455

0 commit comments

Comments
 (0)