Background
I’ve installed Jenkins Community Edition on Windows Server 2022 Datacenter and am evaluating its security features before potentially upgrading to a paid edition. My environment uses Active Directory for user authentication via the AD/LDAP plugin,
and I tried to run Jenkins either under a dedicated AD service account or the Local System account.
I managed to configure AD/LDAP and all AD users authenticate successfully as expected.
For security compliance, the bind account’s password must be rotated on a regular schedule. I plan to leverage a security solution that can:
Change the AD service account password automatically.
Push the new password into Jenkins (via its web interface).
When I manually reset the bind account’s password in AD without updating Jenkins, users continue to log in even after a Jenkins service restart.
Only after some time (cache/Ticket renewal) does authentication begin to fail.
Why does Jenkins continue to authenticate AD users even when the bind password is no longer valid?
Has anyone successfully implemented a fully automated password rotation for the Jenkins bind account—updating both AD and the Jenkins configuration—while maintaining uninterrupted user authentication?
Any help appreciated!
Thanks,
Raphael