Important: This plug-in is maintained by the Jenkins community and won’t be supported by Microsoft as of February 29, 2024.
A Jenkins Plugin that supports authentication & authorization via Azure Active Directory.
-
Open
Azure Active Directory, clickApp registrations -
Click
New registration -
Add a new Reply URL
https://{your_jenkins_host}/securityRealm/finishLogin. Make sure "Jenkins URL" (Manage Jenkins => Configure System) is set to the same value ashttps://{your_jenkins_host}. -
Click
Certificates & secrets, under Client secrets clickNew client secretto generate a new key, copy thevalue, it will be used asClient Secretin Jenkins. -
Click
Authentication, under 'Implicit grant', enableID tokens. -
(optional) To enable AzureAD group support: Click
Manifestand modify the"groupMembershipClaims": "None"value to"groupMembershipClaims": "SecurityGroup", then 'Save' it.
In order for Jenkins to be able to lookup data from Azure AD it needs some Graph API permissions.
This is used for:
- Autocompleting users and groups on the 'Configure Global Security' page
- Jenkins looking up the user, e.g. when you use the Rest API
- Group display name support (rather than just object ID)
Note: You can skip this part and just use the claims returned when authenticating.
-
Click
API permissions -
Add a permission
-
Microsoft Graph
-
Application permissions
-
Add 'User.Read.All', 'Group.Read.All' and 'People.Read'
-
Click
Grant admin consent. If you are not an admin in your tenant, please contact an admin to grant the permissions.
Click Manage Jenkins in the left menu, then click Configure Global Security
-
Check
Azure Active Directoryand fill in the credential. -
Click
Verify Applicationto make sure your input is valid. -
Save the configuration, (logged-in users will have permission to do anything)
-
Log in with Azure AD
-
Return to 'Configure Global Security' to configure authorization
Note: if you haven't setup Graph API permissions, verify application will fail, skip over this step
Jenkins will match permissions based on the Object ID of a user or group.
This plugin extends the traditional Matrix Authorization Strategy with the ability to search by users / groups by display name when configuring the authorization rules. It will also include the display name in the authorization rule.
To use this feature:
- click
Azure Active Directory Matrix-based security - search for user in 'Azure User/group to add' and click Add
- select the permission(s) in the table
- click 'Apply'
You can still use other authorization strategies such as:
Just keep in mind that the Jenkins ID format will be used and not the DisplayName (Object ID) format of this plugin.
The following can normally be used:
- Object ID of group
- Display name of group (Only if Graph API permissions granted)
preferred_usernameclaim which is normally the 'User principal name', but not always.- User principal name (Rest API authentication only)
A: You can disable the security from the config file (see https://www.jenkins.io/doc/book/security/access-control/disable/)
Q: Why am I getting an error "insufficient privileges to complete the operation" even after having granted the permission?
A: It can take a long time for the privileges to take effect, which could be 10-20 minutes. Just wait for a while and try again.