Add Azure KeyVault to secrets doc (#1321)
This commit is contained in:
parent
4b9cc7e2ab
commit
7f6bab4ebb
|
|
@ -20,6 +20,7 @@ Examples of available plugins:
|
|||
|
||||
* link:https://plugins.jenkins.io/kubernetes-credentials-provider[Kubernetes Credentials Provider]
|
||||
* link:https://plugins.jenkins.io/aws-secrets-manager-credentials-provider[AWS Secrets Manager Credentials Provider]
|
||||
* link:https://plugins.jenkins.io/azure-keyvault[Azure KeyVault]
|
||||
* link:https://go.cloudbees.com/docs/cloudbees-core/cloud-secure-guide/cyberark/#cyberark-credentials-provider[CyberARK Credential Provider] (proprietary plugin offered by CloudBees)
|
||||
|
||||
When an external Credentials provider is configured in Jenkins through JCasC, there is no need to define credentials inside.
|
||||
|
|
@ -78,6 +79,7 @@ We can provide these initial secrets in the following ways:
|
|||
- Using Docker Secrets
|
||||
- Using Kubernetes secrets
|
||||
- Using HashiCorp Vault
|
||||
- link:https://github.com/jenkinsci/azure-keyvault-plugin#secretsource[Using Azure KeyVault]
|
||||
- Using environment variables
|
||||
|
||||
==== Docker secrets
|
||||
|
|
|
|||
Loading…
Reference in New Issue