[JIRA] [active-directory-plugin] (JENKINS-3404) mix LDAP and local Hudson users

21 views
Skip to first unread message

advorsky@vasco.com (JIRA)

unread,
Sep 28, 2015, 1:14:01 PM9/28/15
to jenkinsc...@googlegroups.com
Alexander Dvorsky updated an issue
 
Jenkins / Improvement JENKINS-3404
mix LDAP and local Hudson users
Change By: Alexander Dvorsky
Component/s: ldap-plugin
Component/s: security
Add Comment Add Comment
 
This message was sent by Atlassian JIRA (v6.4.2#64017-sha1:e244265)
Atlassian logo

advorsky@vasco.com (JIRA)

unread,
Sep 28, 2015, 1:15:01 PM9/28/15
to jenkinsc...@googlegroups.com
Alexander Dvorsky commented on Improvement JENKINS-3404
 
Re: mix LDAP and local Hudson users

This would make sense as well to have e.g. a user for automation, which doesn't need to exist in the active directory/ldap directory.
i would very welcome this as well...

fedesg@gmail.com (JIRA)

unread,
Feb 24, 2016, 1:22:02 PM2/24/16
to jenkinsc...@googlegroups.com

This bug have any estimated date?
As Alexander say make sense, for example I have external user that not exists in the active directory but I want that they can be logged.
Also, and most important, if my LDAP is down I can't use Jenkins, is really useful have a local account for this circumstance.

jens.rosenthal@compcom.de (JIRA)

unread,
Apr 22, 2016, 10:18:03 AM4/22/16
to jenkinsc...@googlegroups.com

Another important - at least I think so - use case is, that in case there is an LDAP problem, that needs a config update, I cannot login to jenkins to fix the problem.
So a "standard" account (the admin or root), that is NOT tied to the configured LDAP is needed.

heiko.nardmann@itechnical.de (JIRA)

unread,
Oct 12, 2016, 6:23:01 AM10/12/16
to jenkinsc...@googlegroups.com

I also would like to add some "Technical SCM Trigger User" that is used when the SCM creates a trigger. Such a user shall not be part of LDAP but just be part of Jenkins user database. This avoids an anonymous account inside Jenkins with Discover+Read privileges.

This involves either only changing the ldap-plugin or being able to iterate over a list of AbstractPasswordBasedSecurityRealm implementations (as far as I understand).

This would probably also involve that getSecurityRealm() has to be replaced by some getSecurityRealms() (returning a list of realms).

The same for setSecurityRealm(SecurityRealm securityRealm).

This message was sent by Atlassian JIRA (v7.1.7#71011-sha1:2526d7c)
Atlassian logo

605290478@qq.com (JIRA)

unread,
Oct 18, 2016, 5:55:02 AM10/18/16
to jenkinsc...@googlegroups.com
Sam Zhao commented on Improvement JENKINS-3404

Very appreciate for these features.
As a system admin, to keep Jenkins platform to high availability is very important.
If LDAP is down , users will not login Jenkins to do any job.

thefriendlycoder@gmail.com (JIRA)

unread,
Oct 25, 2016, 12:06:02 PM10/25/16
to jenkinsc...@googlegroups.com

I too would like to have the ability to define a couple of static local users on a Jenkins server, for pretty much the same reasons stated above - automated processes accessing Jenkins, accessing the dashboard when LDAP/AD are down, etc. This would be very helpful.

fbelzunc@gmail.com (JIRA)

unread,
Oct 31, 2016, 9:44:02 AM10/31/16
to jenkinsc...@googlegroups.com
Félix Belzunce Arcos resolved as Duplicate
 
Change By: Félix Belzunce Arcos
Status: Open Resolved
Assignee: Félix  Belzunce Arcos
Resolution: Duplicate

patryk.cichy@nokia.com (JIRA)

unread,
Nov 2, 2016, 3:46:01 AM11/2/16
to jenkinsc...@googlegroups.com
Patryk Cichy commented on Improvement JENKINS-3404
 
Re: mix LDAP and local Hudson users

Why is this marked as duplicate? JENKINS-39065 should be marked as duplicate - it only covers AD plugin and this ticket is also about LDAP plugin.

mail@martinmajewski.net (JIRA)

unread,
Jan 14, 2019, 6:12:03 AM1/14/19
to jenkinsc...@googlegroups.com

2019 and still nothing at this front?

We have users whose AD accounts are disabled due to ID renewal and for this period they cannot log into Jenkins. A local user store would be much appreciated!

Best wishes,
Martin

This message was sent by Atlassian Jira (v7.11.2#711002-sha1:fdc329d)

gdupin@gmail.com (JIRA)

unread,
Feb 6, 2019, 9:39:03 AM2/6/19
to jenkinsc...@googlegroups.com

Agree with all comments above : this feature is important for many some use cases.
For me, it would be useful to configure Jenkins with Configuration-as-Code plugin with a local non-LDAP user that will be responsible to regularly apply Jenkins configuration (and as LDAP is a part of this configuration, cannot use a LDAP user for this)
Félix Belzunce Arcos any update on this please ? Or at least a estimation date ?
Thank you

gdupin@gmail.com (JIRA)

unread,
Feb 6, 2019, 9:39:08 AM2/6/19
to jenkinsc...@googlegroups.com
Guillaume Dupin edited a comment on Improvement JENKINS-3404
Agree with all comments above : this feature is important for many some
use cases.
For me, it would be useful to configure Jenkins with Configuration-as-Code plugin with a local non-LDAP user that will be responsible to regularly apply Jenkins configuration (and as LDAP is a part of this configuration, cannot use a LDAP user for this)
[~fbelzunc] any update on this please ? Or at least a estimation date ?
Thank you

gdupin@gmail.com (JIRA)

unread,
Feb 6, 2019, 9:40:02 AM2/6/19
to jenkinsc...@googlegroups.com
Guillaume Dupin edited a comment on Improvement JENKINS-3404
Agree with all comments above : this feature is important for many use cases.
For me, it would be useful to configure Jenkins with Configuration-as-Code plugin with a local
( non-LDAP ) user that will be responsible to regularly apply Jenkins configuration (and as LDAP is a part of this configuration, cannot use a LDAP user for this)

[~fbelzunc] any update on this please ? Or at least a estimation date ?
Thank you

gdupin@gmail.com (JIRA)

unread,
Feb 11, 2019, 12:14:07 PM2/11/19
to jenkinsc...@googlegroups.com
Guillaume Dupin edited a comment on Improvement JENKINS-3404
Agree with all comments above : this feature is important for many use cases.
For me, it would be useful to configure Jenkins with Configuration-as-Code plugin with a local (non-LDAP) user that will be responsible to apply Jenkins configuration (and as LDAP is a part of this configuration, cannot use a LDAP user for this)
@ [~fbelzunc] any update on this please ? Or at least a estimation date ?
Thank you

gdupin@gmail.com (JIRA)

unread,
Feb 11, 2019, 12:14:08 PM2/11/19
to jenkinsc...@googlegroups.com

gdupin@gmail.com (JIRA)

unread,
Feb 11, 2019, 12:15:02 PM2/11/19
to jenkinsc...@googlegroups.com
Guillaume Dupin edited a comment on Improvement JENKINS-3404
Agree with all comments above : this feature is important for many use cases.

For me, it would be useful to configure Jenkins with Configuration-as-Code plugin with a local (non-LDAP) user that will be responsible to apply Jenkins configuration (and as LDAP is a part of this configuration, cannot use a LDAP user for this)

@[~fbelzunc] any update on this please ? Or at least a an estimation date ?
Thank you

batmat@batmat.net (JIRA)

unread,
Feb 11, 2019, 2:51:06 PM2/11/19
to jenkinsc...@googlegroups.com

As Félix said above, doing this at the SecurityRealm level would likely imply duplicating code between the various implementations.

So, I'm inclined to think this issue here should actually be closed as a duplicate of JENKINS-15063. Because at least JENKINS-15063 has core as a component, as it should be IMO.

machn1k@icloud.com (JIRA)

unread,
Feb 13, 2019, 11:18:03 AM2/13/19
to jenkinsc...@googlegroups.com

As mentioned in some of the comments above, allowing for both LDAP and local security allows for real users to have access but also allowing for local users to be created for automation.  This support would allow us to create an ideal security environment for real users and automation.

machn1k@icloud.com (JIRA)

unread,
Feb 13, 2019, 11:25:04 AM2/13/19
to jenkinsc...@googlegroups.com
Mike Machnik edited a comment on Improvement JENKINS-3404
As mentioned in some of the comments above, allowing for both LDAP and local security allows for real users to have access but also allowing for local users to be created for automation.  This support would allow us to create an ideal security environment for real users and our automation.

jonas.julve@gmail.com (JIRA)

unread,
Mar 1, 2019, 5:32:02 PM3/1/19
to jenkinsc...@googlegroups.com
Jonas Julve assigned an issue to Jonas Julve
 
Change By: Jonas Julve
Assignee: Félix  Belzunce Arcos Jonas Julve

jonas.julve@gmail.com (JIRA)

unread,
Mar 1, 2019, 5:34:06 PM3/1/19
to jenkinsc...@googlegroups.com
Jonas Julve assigned an issue to Félix Belzunce Arcos
Change By: Jonas Julve
Assignee: Jonas Julve Félix  Belzunce Arcos

totoiverson@hotmail.com (JIRA)

unread,
Mar 21, 2019, 4:34:04 AM3/21/19
to jenkinsc...@googlegroups.com
Sharon Kwok commented on Improvement JENKINS-3404
 
Re: mix LDAP and local Hudson users

Agreed with all the comments above. We really need the support of both local security and LDAP security. Normal users should use LDAP for login, while local users are created for automation and remote API call. It would be highly appreciated if it could be implemented. 

smekkley-1@gmx.com (JIRA)

unread,
May 22, 2019, 11:15:04 AM5/22/19
to jenkinsc...@googlegroups.com
smek commented on Improvement JENKINS-3404

Is there workaround on this thing other than using PAM? I heard AD plugin supports this, so maybe it's not too difficult to support LDAP with that plugin?

rorynelsonscott@gmail.com (JIRA)

unread,
Aug 19, 2019, 3:39:05 PM8/19/19
to jenkinsc...@googlegroups.com

+1 to what's been said. Automating with a local user would be great while using LDAP for internal users.

rajiv270992@gmail.com (JIRA)

unread,
Sep 23, 2019, 5:17:03 AM9/23/19
to jenkinsc...@googlegroups.com
Rajiv KR commented on Improvement JENKINS-3404

Need this feature as we are trying to make api calls with ldap enabled jenkins, any local hudson users added to ldap will be really useful. Any update on this?

This message was sent by Atlassian Jira (v7.13.6#713006-sha1:cc4451f)
Atlassian logo

wenjunxiao@126.com (JIRA)

unread,
Oct 20, 2019, 12:11:05 PM10/20/19
to jenkinsc...@googlegroups.com

I try to mixing local user with others by this plugin [mixing-security-realm-plugin|https://github.com/wenjunxiao/mixing-security-realm-plugin]

Reply all
Reply to author
Forward
0 new messages