The credentials database is encrypted using Jenkins' secret key
infrastructure. Obviously Jenkins can decrypt them as Jenkins has the
secret key... and the secret keys are stored on disk in $JENKINS_HOME, but
I assure you the passwords themselves are not stored in plain text or a
simple obfuscated form... they are stored using a reversible encryption
technique


On 8 November 2013 11:50, Robert Krüger <krue...@lesspain.de> wrote:

> Hi,
>
> I am setting up a Jenkins Job which accesses a Git (Stash) repo over
> HTTPS using global credentials. Since I was not asked for a password
> for encrypting the credentials database, I guess they are not strongly
> encrypted in the XML file where they are stored. Is there a more
> secure way of setting this up? In another thread Nicolas de Loof
> recommended SSH over HTTPS for such a setup. Is this one of the
> reasons?
>
> Thanks,
>
> Robert
>
> --
> You received this message because you are subscribed to the Google Groups
> "Jenkins Users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to jenkinsci-users+unsubscr...@googlegroups.com.
> For more options, visit https://groups.google.com/groups/opt_out.
>

-- 
You received this message because you are subscribed to the Google Groups 
"Jenkins Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to jenkinsci-users+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to