fbpx
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Using Credentials In Code In CloudBees SDA

windchill features best plm software
Written by Joshua Kling
Published on February 7, 2022

Credentials Are Tough By Design

Credentials in Cloudbees SDA are admittedly a little tricky to get to. This is by design.  If it were any easier, it could be a potential security risk. There is really just one way to use credentials in code, and it’s a multi-step process. Here are the steps:

  1. Set the credential.
  2. Attach it to a step.
  3. Use it.

Careful manipulation is required here, as the software requires very exact definitions to get to this information. Any single missed parameter or missing ACL will return an error code.

How To Set The Credential

It is very simple to set a credential in CloudBees SDA.  First, start at the project level, or go to the credential screen, and add a new cred. You’ll be able to add a name, description, username, password, and set it to a local or external credential. Once it’s set, hit OK and head to the location where you intend to use it.

CredentialsInCode

Attachment

Once a credential is set, it’s available in any pipeline or procedure that can access that project. However, you will need to grant explicit access permission for the pipeline or procedure that will use it.  You do this through the attaching feature. From within a pipeline, the code for this command looks like this:

ectool attachCredential "<project name>" "<credential name>" --pipelineName $[/myPipeline] 
--stageName $[/myStage] --taskName $[/myTask]

In this case, all of these flags are important. Please note that if you call it from a procedure context, you’ll need to use –stepName instead of –taskName, as these are different from pipeline tasks.

Using The Credential

Once the credential is attached to a task or step, using it is a simple matter. Use these two lines of code to pull the username or password into any script or bash command:

ectool getFullCredential "/projects/<project name>/credentials/<credential name>" --value password
ectool getFullCredential "/projects/<project name>/credentials/<credential name>" --value userName

They can be set to variables or used inline, depending on the context, such as an API call to a third party tool. Credentials are a powerful tool in CloudBees SDA — they can be used for more than just basic authentication. You can save any kind of secret in the password field, including tokens, making them a convenient way to hide secure information with confidence.

If you have any questions about credentials in SDA, or need help getting started, reach out to us and we’d be happy to help.

Latest White Papers

4 Questions Leaders Need to Answer to Accelerate AI Adoption

4 Questions Leaders Need to Answer to Accelerate AI Adoption

The rise of Artificial Intelligence has led many businesses to reevaluate their operations. Can AI create better workflows or more efficient results? Dive into this eBook to explore the questions business leaders are asking about AI adoption. [et_bloom_inline...

Related Resources

Five Major Downsides of Changing Software Tools

Five Major Downsides of Changing Software Tools

Switching to new software tools can often seem like an exciting opportunity to streamline processes, increase efficiency, and modernize operations. Some executives seem to think that simply buying a new software tool will solve many problems at once. However, with...

The Pitfalls of Outdated Tools in Managing Global Teams

The Pitfalls of Outdated Tools in Managing Global Teams

The dynamics of product development have shifted dramatically in the past 5 years.  Teams are no longer confined to a single location or even a single time zone.  Instead, they span continents, collaborating across borders to bring products to market faster than ever...

5 Steps to Standardize Security in DevOps

5 Steps to Standardize Security in DevOps

Although security has always been a priority for developers, new technologies have made it one of the most prominent aspects of DevOps.  This has resulted in the coined term “DevSecOps”, with many companies offering new “DevSecOps platforms.”  With hackers developing...