A. Contains entries used for the security matrix or project security matrix.
B. Defines aliases for credentials that have been created In the external security realm.
C. Each user who is allowed access to Jenkins must have an entry in this Jenkins user database.
D. Defines user groups used for role-based strategy authorization.
E. Populates the Jenkins user database that can be used if you are not using an external security realm such as LDAP, Active Directory, or Unix user/groups.