You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
What Operating System are you using (both controller, and any agents involved in the problem)?
Controller and agents both deployed on AKS via Jenkins helm chart.
Reproduction steps
Follow documentation to install and configure plugin. Ensuring the Microsoft Entra Graph API permissions have been set and approved
Under Manage Jenkins > Security > Authorization select "Role-Based Strategy" from the list and save
Under Manage Jenkins > Manage and Assign Roles > Assign Roles try to add a group from Microsoft Entra using it's display name
Observe the "Group not found" error
Expected Results
The group should be resolved using it's display name. When searching for the group based on it's object ID, the group is resolved successfully. But not when using other group properties (e.g. email or display name).
Actual Results
When using the display name of the group, the group isn't resolved.
Using the group display name works when the authorization mode is set to "Azure Active Directory Matrix-based Security". This suggests it's not a permissions issue with the Graph API.
The documentation implies it should also work when using other authorization strategies.
Anything else?
No response
Are you interested in contributing a fix?
No response
The text was updated successfully, but these errors were encountered:
I can add some updates. Latest versions of the role-based strategy plugin relies only on ObjectId for users and groups if you are using EntraID (azure-ad) security realm (tested plugin version azure-ad:471.vdfa_2441c67a_f). Mention about display name in documentation is true only for Matrix based strategies (as far as I understand). There is inconvenience with role-based strategy plugin is unavailability to show added groups by display name as it does with users added by object-id (tested plugin version role-strategy:689.v731678c3e0eb_).
Conclusion: If you want to use Role-based Authorization Strategy always use ObjectIds of users/groups. Otherwise use Matrix Authorization Strategy
Jenkins and plugins versions report
Environment
What Operating System are you using (both controller, and any agents involved in the problem)?
Controller and agents both deployed on AKS via Jenkins helm chart.
Reproduction steps
Expected Results
The group should be resolved using it's display name. When searching for the group based on it's object ID, the group is resolved successfully. But not when using other group properties (e.g. email or display name).
Actual Results
When using the display name of the group, the group isn't resolved.
Using the group display name works when the authorization mode is set to "Azure Active Directory Matrix-based Security". This suggests it's not a permissions issue with the Graph API.
The documentation implies it should also work when using other authorization strategies.
Anything else?
No response
Are you interested in contributing a fix?
No response
The text was updated successfully, but these errors were encountered: