The Fedora 20 Active Directory Integration Guide : Jenkins
Jenkins is a software package that is popular among programmers and is used to automate software builds. It runs on Apache Tomcat.
First, make sure you have joined the domain. Because Jenkins uses PAM for authentication, it can be setup to allow people to login with their Active Directory credentials.
#yum install java tomcat tomcat-webapps
Jenkins comes as a .war package. It needs to be moved into the webapps directory where it will be auto extracted by Tomcat on startup.
#mv jenkins.war /var/lib/tomcat/webapps
Open the firewall to allow Jenkins agents and Tomcat to communicate
#firewall-cmd --add-port 8080/tcp
#firewall-cmd --permanent --add-port 8080/tcp
#firewall-cmd --add-port 7777/tcp
#firewall-cmd --permanent --add-port 7777/tcp
#systemctl enable tomcat.service
#systemctl start tomcat.service
Access Jenkins through http://servername:8080/jenkins
Click ‘Manage Jenkins’ > ‘Configure System’ and set the following values.
Jenkins URL : http://servername:8080/jenkins/
System Admin e-mail address: email@example.com
SSHD Port : Disable
SMTP server: mail.corp.mydomain.com
Click Manage Jenkins > Configure Global Security
Check Enable security
Set ‘TCP port for JNLP slave agents’ to ‘fixed (7777)’
The next setting is not accurate. Even though it says Unix user database, it has recently been updated to use PAM, which lets use use Active Directory.
Set ‘Access Control’ > ‘Security Realm’ to ‘Unix user/group database’