![]() ![]() It inherently could be a target for Remote Code Execution (RCE) attacks. The ADO pipelines agent is a software product designed to execute code it downloads from external sources. ![]() The folders controlled by the agent should be restricted to as few users as possible and they contain secrets that could be decrypted or exfiltrated. The user configuring the agent needs pool admin permissions, but the user running the agent does not. Information security for self-hosted agents ![]() You should run agent setup manually the first time.Īfter you get a feel for how agents work, or if you want to automate setting up many agents, consider using unattended config. If you're building from a Subversion repo, you must install the Subversion client on the machine. (The Oracle JRE and OpenJDK are not sufficient for this purpose.) Prepare permissions If you'll be using TFVC, you will also need the Oracle Java JDK 1.6 or higher.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |