Hi, 

Thanks for comments.

I expect Jenkins provides more options for build authorization as Jenkins 
now warns users for build authorizations as Rene pointed.

Trigger restrictions look just what I expected to replace 
`QueueItemAuthenticator`.
It's only a part of replacements of `QueueItemAuthenticator` (only 
Job.BUILD as pointed), and I want to know whether there are other 
permissions to support with the alternative of `QueueItemAuthenticator`.
As far as I know:

* Job.Build: replaced with Trigger restrictions.
* Job.Read: CopyArtifactPermissionProperty (applicable only to copyartifact)

Let me know if there are other permissions to support.


Impersonation-plugin and JENKINS-15063 both would be a great step to 
resolve issues relating to authentication and authorization.
But I'm afraid they might not resolve all issues. I believe following three 
issues exist:

* The configuration should not belong to a specific real user.
    * For example, both user A and B in the same division should be able to 
configure the job.
    * Impersonate-plugin would resolve this issue.
* Jenkins administrators may not be administrators of authentication server 
(LDAP, ActiveDirectory so on).
    * It means Jenkins administrators may not be able to add users and 
groups at their will.
    * JENKINS-15063 would allow administrators to add Jenkins-specific 
users and groups.
* Authentication mechanism to restrict users to configure build 
authorization.
    * Actually it's not so easy. Authorize-project costs much to implement 
this.

Regards,
Ikedam

-- 
You received this message because you are subscribed to the Google Groups 
"Jenkins Developers" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to jenkinsci-dev+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/jenkinsci-dev/308b05c7-4c3c-4c1f-b06b-0356a5012c79%40googlegroups.com.

Reply via email to