Table of contents

CloudBees Core on modern cloud platforms security guide


On this page

Introduction

Access controls are essential to ensure only authorized users have access to sensitive information, like credentials, to prevent potential malicious use of that information. In CloudBees Core, these controls are configured from a central dashboard in Operations Center and then enforced on all connected Managed or Client Masters.

Operations Center’s security options follow the standard Jenkins security model, offering two axes to security, as well as options for adjusting how strict enforcement of these security settings should be. Administrators can force connected masters to delegate all of their security settings, allow teams complete control over their own security settings, or delegate only some security settings to teams.