This seems like an obvious question, but I looked high and low and can't find the answer. Here's the situation:
- I am running a continuous Jenkins integration server on the public Internet with volunteers (trusted) running on subordinate servers on Windows and Linux.
- We use doodad JNLP (Web start) to start slaves to avoid problems with the firewall and configure / debug ssh
- The server is configured based on Matrix-based security
The problem is that I can find exactly zero information on how security works with JNLP. If any anonymous read permissions are granted, then anyone in the world can download slave.jar and access the jnlp file on the (easy to guess) URL on my server and connect as a subordinate.
I found that if I revoke all anonymous access, the jnlp file is blocked, but slave.jar is still available.
There is nothing particularly secure in the jnlp file except for one long hexadecimal number. Is this setting safe or is there something else I should do?
It would be nice if visitors could see the latest builds without logging in, but then again, if I grant anonymity permissions, everyone can access the jnlp file.
security jenkins
Andrew Collette
source share