Role Based Strategy for Users

Renju Ratheesh
A free video tutorial from Renju Ratheesh
Engineering Delivery Head @ TVS Next
4.3 instructor rating • 1 course • 9,909 students

Learn more from the full course

Jenkins - The Complete Tutorial | Master CICD and DevOps

The All in One Definitive Course on Jenkins - Go from a novice to a Jenkins Guru. Learn DevOps & automate CICD pipeline

05:20:37 of on-demand video • Updated October 2018

  • We will start with understanding the concepts of DevOps, Continuous Integration, Continuous Delivery & Continuous Deployment.
  • We will understand how Jenkins fits perfectly as the CICD server. We will learn about its fundamentals & capabilities.
  • After learning how to install Jenkins, we will learn about the basics of a Jenkins job & its configuration options.
  • We will then move to see Jenkins in action in the CICD lifecycle & automate the pipeline from Code checkin, Quality Checks, Unit testing, functional testing & Deployments.
  • Source code repository – We will look at how Jenkins can integrate with GIT & be a starting point for automated builds based on developer checkins.
  • Code Quality – We will look at how Jenkins can integrate with code quality tools like SonarQube to highlight any issues with the developer code.
  • Automated Build, Test & Deployments – We will look at how Jenkins can trigger maven scripts to start a build, see how it can integrate with Selenium to automate functional testing & finally see how it can help with deploying the executables on web servers.
  • We will then move on to learning about the Jenkins pipeline where will cover about build pipeline, delivery pipeline, scripted pipelines & the famous declarative pipeline. Create a multi-stage Jenkins job and visualize the complicated pipeline.
English [Auto] Hello and welcome back in the last review we saw Holly Hughes matron based Sacirbey option the control user permissions in the. But there was a drawback in that approach and shoddier are able to get it in. The approach works fine. Only three or a handful of users and you are able to configure permissions for each of them individually. Imagine the scenario that you have hundreds of users. It would become a big challenge literally manage every user individually. Here is where a rule based authorization comes in handy using the rule based authorization strategy plug in. You can create rules and assign the same Mattocks based volitions to the rules. And when you're adding users you merely have to assign them roles which in turn grant them politicians and delegates. So let's go ahead and download the roll based authorization strategy glugging. Plus here I am in my gentle instance. Let's go ahead and click on Manish Jenkins and click on manage plugins here. So as you saw earlier this is a place where we have to come and install any plugins that we need. Right. So for us you have to go down to the available section just to just to document read and think that all the install will be installed that way. Anything that we need you. We go back to the available data. So here let the search for rule be just like that plug plugging that we roll this authorization strategy. It is a smart description again unable to use an authorization using a rule based practice. So let's go ahead and select this and say download now and install Alkermes can we stop insulations notes started that just click on this so that Denton's can restart. They go ahead and execute these starting now. Here you go. Jenkins is restarting after installing the logging OK. So we are back in the Denton's dashboard space opera installing the rule based authorization strategy. So now we should go back down to managing this go to configure global security. Once we are here under the authorization bar you should not see a new option which is called Rule. The strategy block. Let's select that and then click on apply and see Austin doing that. If you come down here you should see a new option with SEUS manage and assign roles. Right so there's a new option that has been installed after we installed the rule based authorization started the plug. So let's click on this. Here you see an option called manager rules. Let's go in there. So let's assume that in our company we have say rules. One is the product thing and the other one is the devil. I mean the manager. So let's go in Adam here let's see project the. And then you have c o manager. So these are global level rules. OK. And let's use real access at this global level. Right. So that is the first part there no let us add. Leader. Slate So let's see if we have the level of push let's say the the the pattern of the project that they use will be. There's dark star so let's add them and then let's also create a project rule party that's to us and imagine that their project naming convention starts with. That's dark stuff lately and that. So within here let's grant them all the axes. We don't need to give them access to credit. But let's give them every other access we OK. They go. You've given all accesses except for the credential access to both the dev and Tester rules. Right. So let's click on Save your. So not if you've created the last the next step is to assign these rules to the users that you just cleared. Right Stephen and Mary right. So in the global rules let's go ahead and add them. Let's see Stephen and me they let's say both of them belong to the project. The and then for the item related rules let us add Stephen or let's add media as well. Let's see if Steven will have Stephen as a developer and maybe is up to me. So no let's go ahead and click on see. So no what we've done is we've created the rules and you assign rules to both Steven and me. Right. So let's go back to the then Jenkins dashboard piece. Sure. So we have a couple of projects that start with this. Let's go and create a project that started divestments Let's see there's Roger one let it be a freestyle project it's called Ok I don't want to get it right. And also miss going to conceive again. And we're back with Xenophon's dashboard. You see the project right. So no let's go ahead and try and log in as Stephen and me and see what they're able to see. Right. So let's open up a Incognito window here let's look. Let me sign in as Stephen. There you know you've in Steven Right. And he's got access to all living them projects. The gascolator job is not able to see because we have given him only access to the devil products not for this specific project. He's got all the access so he's able to see it. He has the build option here. And plus he has the I don't think it option here. So yes complete control or the death project. But again if could see he does not have the management option. Right. So let's try to log in as me. Let's just call Adam Logoglu Stephen your let slide in is Mittie. Now if a log in this Minniti see he or she has access only to the test related jobs and not within are devlopment related products. And again she has complete control over these products she can do them. She can run them. She's she's she's able to configure them so she has full control what would these products. So that's how we use the roll based authorization strategy log in to give access to users in there is no this is a much more flexible approach in terms of managing a lot of users. Because any time you add a new user. Only if you go back and do is assign them the rules right. And at a later point in time it's going to change the rules for all the developers only to go and do the same thing metrics that we define for the devil or for who they are and you are all set for all levels. So this is a much more flexible and a more comprehensive approach to managing user security. In Jenkin's This now brings us to the end of this video to put the recap in this video. We learned how to create users in that case. Then we learned about the different authentication and authorization options available at junkets. We even use the matrix based authorization glad to use that access. And finally we used the whole best strategy blogging to create rules and that ease of access. I hope you like this video and I will see you in the next one. Until then have fun and happy learning.