In Jenkins, the Matrix-based security allows you to assign permissions to users or groups in a grid format. Which of the following best describes how permissions are assigned in this strategy?
Think about how a grid or table might be used to assign permissions.
Matrix-based security uses a grid where you check boxes to assign specific permissions to users or groups. This allows fine-grained control.
After configuring the Role-based Authorization Strategy plugin in Jenkins, you run a command to list all roles. What is the expected output format when you run jenkins-cli list-roles?
Think about what a role listing command should show.
The list-roles command outputs the roles defined in Jenkins along with their permissions in a readable plain text format.
You want to create a new role called 'dev-team' in Jenkins with permissions to build and read jobs but not to configure system settings. Which sequence of steps correctly achieves this using the Role-based Authorization Strategy plugin?
Think about first creating the role, then assigning it.
You first create the role with desired permissions, then assign it to users. Managing roles and assigning roles are separate steps.
A user reports they cannot configure a job even though they are listed in the Matrix-based security with 'Job Configure' permission checked. What is the most likely cause?
Check if the user is actually included in the permission assignment.
Even if the permission is checked for a group, the user must belong to that group to have the permission. If not, they will be denied access.
In a Jenkins environment with multiple teams and complex permission needs, what is the best practice for combining Matrix-based and Role-based Authorization strategies?
Think about how roles and detailed permissions complement each other.
Role-based Authorization is good for grouping users with common permissions, while Matrix-based allows detailed control. Combining them carefully provides flexibility and security.