Credentials Guardian Documentation

Complete guide to installing, configuring, and using Credentials Guardian for credential health monitoring and secret leak detection in Jenkins.

Installation

Credentials Guardian can be installed in two ways:

Option 1: Upload HPI File

  1. Download the latest creds-guardian.hpi file from your dashboard
  2. Navigate to Manage Jenkins → Plugins → Advanced Settings
  3. Under "Deploy Plugin", click "Choose File" and select the HPI file
  4. Click "Deploy" to install the plugin

Option 2: Manual Installation

  1. Copy the creds-guardian.hpi file to your Jenkins plugins directory:
    cp creds-guardian.hpi $JENKINS_HOME/plugins/
  2. Restart Jenkins to load the plugin

Quick Start

Get credential monitoring running in minutes:

1. Activate Your License

Navigate to Manage Jenkins → System → Credentials Guardian. Enter your license key and click "Activate".

2. Enable the Plugin

Check "Enable Credentials Guardian" to start monitoring.

3. Configure Alert Thresholds

Set when you want to be notified about expiring credentials (default: 30, 7, and 1 day before expiration).

4. Configure Notifications

Add notification channels (Slack, Email) to receive alerts about expiring credentials and detected leaks.

5. Save Configuration

Click "Save". Credentials Guardian immediately begins scanning credentials and monitoring build logs.

Requirements

  • Jenkins Version: 2.426.x LTS or later
  • Java Version: Java 17 or later
  • Network: HTTPS connectivity for license validation and external notifications

Global Settings

Configure Credentials Guardian in Manage Jenkins → System → Credentials Guardian.

Enable Credentials Guardian

Master toggle to enable or disable all monitoring features.

Scan Interval

How often to scan credentials for expiration status. Default: every 6 hours.

Expiration Tracking

Monitor credential expiration dates and get notified before they expire.

Alert Thresholds

Configure multiple alert thresholds to get early warnings:

  • 30 days: First warning — time to plan credential rotation
  • 7 days: Urgent warning — schedule rotation soon
  • 1 day: Critical warning — credential expires tomorrow

Supported Credential Types

  • Username/Password credentials
  • SSH private keys
  • Secret text / tokens
  • Certificate credentials
  • Any credential type with an expiration date

Leak Detection

Scan build logs for accidentally exposed secrets.

Built-in Patterns

20+ pre-configured patterns detect common secret formats:

  • AWS Access Keys and Secret Keys
  • GitHub / GitLab tokens
  • Slack webhooks and tokens
  • Private keys (RSA, DSA, EC)
  • Database connection strings
  • Generic API keys and passwords
  • JWT tokens
  • And more...

Custom Patterns

Add your own regex patterns to detect organization-specific secrets:

Pattern Name: Internal API Key
Regex: MYORG-[A-Za-z0-9]{32}
Severity: HIGH

Important

Leak detection scans build logs as they are written. It does not scan historical build logs. Enable leak detection early to catch secrets before they accumulate in logs.

Notifications

Get alerted about credential issues through multiple channels.

Supported Channels

  • Slack: Webhook-based notifications with customizable messages
  • Email: SMTP-based alerts using Jenkins mailer or custom SMTP

Notification Types

  • Credential expiration warnings (at each threshold)
  • Credential expired alerts
  • Secret leak detected in build log
  • Unused credential detected

Usage Auditing

Track which credentials are used by which jobs.

Usage Tracking

  • Which jobs reference each credential
  • Last time each credential was used
  • Unused credentials that may be candidates for removal

Unused Credential Detection

Credentials that haven't been used in a configurable period (default: 90 days) are flagged as potentially unused. This helps clean up stale credentials and reduce your attack surface.

Health Dashboard

Access the dashboard from the Jenkins sidebar at Credentials Guardian.

Dashboard Sections

  • Overview: Total credentials, healthy/warning/expired counts
  • Expiring Soon: Credentials expiring within each threshold
  • Recent Leaks: Recently detected secret leaks in build logs
  • Unused Credentials: Credentials with no recent usage
  • Audit Trail: Complete history of credential events

Licensing

Activating Your License

  1. Purchase a subscription from the product page
  2. Copy your license key from the dashboard
  3. In Jenkins, navigate to Manage Jenkins → System → Credentials Guardian
  4. Enter your license key and click "Activate"

License Validation

Credentials Guardian validates your license periodically (every 24 hours). If the license server is unreachable, a 72-hour grace period allows continued operation.

Unlicensed Behavior

Without a valid license:

  • All monitoring is disabled
  • No notifications are sent
  • A warning banner is shown to admins

FAQ

Does Credentials Guardian access credential values?

No. Credentials Guardian only reads credential metadata (name, type, expiration date, usage references). It never accesses or stores actual credential values like passwords or private keys.

How does leak detection work without accessing secrets?

Leak detection uses regex pattern matching on build log output. It looks for known secret formats (AWS keys, tokens, etc.) in the log text, not by comparing against stored credential values.

Can I exclude certain credentials from monitoring?

Yes. You can exclude credentials by ID or by pattern in the global configuration. This is useful for test credentials or credentials managed by external systems.

What data does Credentials Guardian collect?

Only license validation data (license key, controller ID, plugin version) is sent externally. All credential monitoring data stays on your Jenkins instance.

Changelog

Version 1.0.0

Initial Release

  • Credential expiration tracking with configurable thresholds
  • 20+ built-in secret leak detection patterns
  • Custom regex pattern support
  • Credential usage auditing across jobs
  • Unused credential detection
  • Multi-channel notifications (Slack, Email)
  • Health dashboard with overview and drill-down
  • Complete audit trail