Which statement correctly describes how Jenkins uses LDAP for authentication?
Think about what LDAP servers do in a network environment.
LDAP servers hold user credentials centrally. Jenkins connects to LDAP to check if the username and password are correct and to get user info.
After configuring Jenkins with SAML authentication, you run the command jenkins-cli get-configuration. Which output indicates that SAML is correctly enabled?
Look for the plugin class name related to SAML.
The SAML plugin uses the class org.jenkinsci.plugins.saml.SamlSecurityRealm. The presence of this in the configuration means SAML is enabled.
Jenkins users report login failures after LDAP configuration. Which of the following is the most likely cause?
Think about network connectivity and server reachability.
If Jenkins cannot reach the LDAP server, it cannot verify user credentials, causing login failures.
What is the correct order of steps when a user logs into Jenkins using SAML authentication?
Remember the redirect and response flow between user, Jenkins, and IdP.
The user first tries to access Jenkins, which redirects to the IdP. The IdP authenticates and sends a response. Jenkins validates it and then grants access.
Which practice is best to securely integrate Jenkins with both LDAP and SAML authentication methods?
Think about security and separation of user types.
Using LDAP for internal users and SAML for external users with encryption and certificate management ensures secure and manageable authentication.