Skip to content

Commit c0f3b7b

Browse files
jvzdaniel-beck
andauthored
Apply suggestions from code review
Co-authored-by: Daniel Beck <1831569+daniel-beck@users.noreply.github.com>
1 parent e28329b commit c0f3b7b

2 files changed

Lines changed: 2 additions & 2 deletions

File tree

docs/faq.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
== FAQs
1+
== FAQ
22

33
This document provides a quick reference for frequently questioned concepts and features in Credentials.
44

docs/fflags.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ Like any system properties, they should be considered experimental and subject t
77
- Setting this property to `true` enables the _Credentials/UseOwn_ permission.
88
Primarily useful when using project-based security authorization strategies or authenticated builds, this permission allows an immediate action to access user-scoped credentials from the user's private credentials store.
99
Immediate actions include invoking a build with parameters, tagging a build in SCM, providing credentials to a pipeline input step, and other user interaction.
10-
Using this permission can help limit which users are allowed to provide their own credentials as input to an action which can be particularly handy when combined with the Authorize Project plugin where builds may be run as the user who triggered the build.
10+
Using this permission can help limit which users are allowed to provide their own credentials as input to an action which can be particularly handy when combined with the https://plugins.jenkins.io/authorize-project/[Authorize Project] plugin where builds may be run as the user who triggered the build.
1111
This allows separation of the permission to build a job from the permission to provide user-scoped credentials.
1212
When this flag is `false` or unspecified, then _Job/Build_ is used instead for the same purpose.
1313

0 commit comments

Comments
 (0)