-
Notifications
You must be signed in to change notification settings - Fork 21
Issues: jenkinsci/azure-keyvault-plugin
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
Azure ServicePrinciple secret type / continue support for individual credentials for withAzureKeyVault
enhancement
New feature or request
#266
opened Sep 26, 2024 by
admalledd
ManagedIdentityCredential authentication unavailable. Connection to IMDS endpoint cannot be established.
bug
Something isn't working
#257
opened Jul 5, 2024 by
kostyaplis
Ability to define Jenkins scope for Key Vault credentials
enhancement
New feature or request
#199
opened Jul 3, 2023 by
bsloan-icl
Time taken to obtain secrets too long
bug
Something isn't working
#184
opened May 9, 2023 by
jorgegb95
Use base64 files as secret file
enhancement
New feature or request
#181
opened May 5, 2023 by
elena-kozyreva
Extension point for credentials types
enhancement
New feature or request
#144
opened Dec 8, 2022 by
timja
[azure china] Not Able to user Azure Key vault Plugin to retrieve data in Azure Key vault present in China Azure
bug
Something isn't working
#117
opened Jul 21, 2022 by
tucha1992
Support '/' characters in credential IDs
enhancement
New feature or request
#115
opened Jun 22, 2022 by
chriskilding
Azure Key Vault using JCaSC configuration fails to initialize unset variables using :- method
bug
Something isn't working
#100
opened Nov 4, 2021 by
bnfbiz
Using multiple key vaults
enhancement
New feature or request
#70
opened Mar 1, 2021 by
MikalaiHryniuk
3 tasks done
Support for authenticating service principal with certificate
bug
Something isn't working
#60
opened May 18, 2020 by
aalim-nisum-com
ProTip!
Add no:assignee to see everything that’s not assigned.