You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Now, you need to obtain both Zeebe and Connectors' Operate OAuth clients. You can do it with `kubectl get secret dev-zeebe-identity-secret -o jsonpath="{.data.*}" | base64 --decode`
@@ -117,12 +119,14 @@ docker run --rm --name=CustomConnectorInSMWithHelm \
When running against a self-managed environment you might also need to configure the Keycloak endpoint to not use Operate username/password authentication:
68
+
When running against a self-managed environment you might also need to configure Identity properties instead of username and password:
Copy file name to clipboardexpand all lines: docs/self-managed/platform-deployment/helm-kubernetes/guides/connect-to-an-oidc-provider.md
+4-10
Original file line number
Diff line number
Diff line change
@@ -99,12 +99,6 @@ global:
99
99
100
100
For authentication, the Camunda components use the scopes `email`, `openid`, `offline_access`, and `profile`.
101
101
102
-
:::note
103
-
The Connectors do not yet support authentication with a generic OIDC provider.
104
-
105
-
When using OIDC, set `connectors.inbound.mode: disabled`[in your Connectors Helm values](https://artifacthub.io/packages/helm/camunda/camunda-platform#connectors-parameters).
106
-
:::
107
-
108
102
</TabItem>
109
103
<TabItemvalue="microsoftEntraId">
110
104
@@ -169,6 +163,9 @@ global:
169
163
clientId: <Client ID from step 1>
170
164
clientApiAudience: <Audience for your application>
171
165
publicApiAudience: <Audience for using Web Modeler's API. For security reasons, use a different value than for clientApiAudience>
166
+
connectors:
167
+
clientId: <Client ID from step 2>
168
+
existingSecret: <Client secret from step 3>
172
169
```
173
170
174
171
</TabItem>
@@ -187,10 +184,6 @@ process.
187
184
To successfully authenticate wth Entra ID, you should use the `v2.0` API. This means that
188
185
the `CAMUNDA_IDENTITY_ISSUER_BACKEND_URL` value should end with `/v2.0`.
189
186
190
-
:::note
191
-
Connectors do not yet support authentication with Microsoft Entra ID as the OIDC provider. When using OIDC, set `connectors.inbound.mode: disabled`[in your Connectors Helm values](https://artifacthub.io/packages/helm/camunda/camunda-platform#connectors-parameters).
192
-
:::
193
-
194
187
</TabItem>
195
188
</Tabs>
196
189
@@ -202,3 +195,4 @@ Connectors do not yet support authentication with Microsoft Entra ID as the OIDC
202
195
| Optimize | https://<OPTIMIZE_URL>/api/authentication/callback | There is a fallback if you use the existing ENV vars to configure your authentication provider, if you use a custom `yaml`, you need to update your properties to match the new values in this guide.<br/><br/>When using an OIDC provider, the following features are not currently available: User permissions tab in collections, digests, `Alerts` tab in collections. |
| Web Modeler | https://<WEB_MODELER_URL>/login-callback | Using a different OIDC provider than Keycloak currently disables all checks of the permissions claim both for using Web Modeler via the UI and via the public API.<br/><br/> Required configuration variables for webapp:<br/>`OAUTH2_CLIENT_ID=[client-id]`<br/>`OAUTH2_JWKS_URL=[provider-jwks-url]`<br/>`OAUTH2_TOKEN_AUDIENCE=[client-audience]`<br/>`OAUTH2_TOKEN_ISSUER=[provider-issuer]`<br/>`OAUTH2_TYPE=[provider-type]`<br/><br/> Required configuration variables for restapi:<br/>`CAMUNDA_IDENTITY_BASEURL=[identity-base-url]`<br/>`CAMUNDA_IDENTITY_TYPE=[provider-type]`<br/>`CAMUNDA_MODELER_SECURITY_JWT_AUDIENCE_INTERNAL_API=[client-audience]`<br/>`CAMUNDA_MODELER_SECURITY_JWT_AUDIENCE_PUBLIC_API=[publicapi-audience]` (for security reasons, <strong>use a different value here than for `CAMUNDA_MODELER_SECURITY_JWT_AUDIENCE_INTERNAL_API`</strong>)<br/>`SPRING_SECURITY_OAUTH2_RESOURCESERVER_JWT_ISSUER_URI=[provider-issuer]`|
198
+
| Connectors || Connectors act as a client in the OIDC flow. <br/><br/> For outbound-only mode (when `CAMUNDA_CONNECTOR_POLLING_ENABLED` is `false`), only Zeebe client properties are required: <br/> `ZEEBE_CLIENT_ID=[client-id]`<br/>`ZEEBE_CLIENT_SECRET=[client-secret]`<br/>`ZEEBE_AUTHORIZATION_SERVER_URL=[provider-issuer]`<br/>`ZEEBE_TOKEN_AUDIENCE=[Zeebe audience]`<br/>`ZEEBE_TOKEN_SCOPE=[Zeebe scope]` (optional)<br/><br/> For inbound mode, Operate client properties are required:<br/>`CAMUNDA_IDENTITY_TYPE=[provider-type]`<br/>`CAMUNDA_IDENTITY_AUDIENCE=[Operate audience]`<br/>`CAMUNDA_IDENTITY_CLIENT_ID=[client-id]`<br/>`CAMUNDA_IDENTITY_CLIENT_SECRET=[client-secret]`<br/>`CAMUNDA_IDENTITY_ISSUER_BACKEND_URL=[provider-issuer]`|
Now, you need to obtain both Zeebe and Connectors' Operate OAuth clients. You can do it with `kubectl get secret dev-zeebe-identity-secret -o jsonpath="{.data.*}" | base64 --decode`
@@ -117,12 +119,14 @@ docker run --rm --name=CustomConnectorInSMWithHelm \
When running against a self-managed environment you might also need to configure the Keycloak endpoint to not use Operate username/password authentication:
68
+
When running against a self-managed environment you might also need to configure Identity properties instead of username and password:
Copy file name to clipboardexpand all lines: versioned_docs/version-8.4/self-managed/platform-deployment/helm-kubernetes/guides/connect-to-an-oidc-provider.md
+4-10
Original file line number
Diff line number
Diff line change
@@ -99,12 +99,6 @@ global:
99
99
100
100
For authentication, the Camunda components use the scopes `email`, `openid`, `offline_access`, and `profile`.
101
101
102
-
:::note
103
-
The Connectors do not yet support authentication with a generic OIDC provider.
104
-
105
-
When using OIDC, set `connectors.inbound.mode: disabled`[in your Connectors Helm values](https://artifacthub.io/packages/helm/camunda/camunda-platform#connectors-parameters).
106
-
:::
107
-
108
102
</TabItem>
109
103
<TabItemvalue="microsoftEntraId">
110
104
@@ -169,6 +163,9 @@ global:
169
163
clientId: <Client ID from step 1>
170
164
clientApiAudience: <Audience for your application>
171
165
publicApiAudience: <Audience for using Web Modeler's API. For security reasons, use a different value than for clientApiAudience>
166
+
connectors:
167
+
clientId: <Client ID from step 2>
168
+
existingSecret: <Client secret from step 3>
172
169
```
173
170
174
171
</TabItem>
@@ -187,10 +184,6 @@ process.
187
184
To successfully authenticate wth Entra ID, you should use the `v2.0` API. This means that
188
185
the `CAMUNDA_IDENTITY_ISSUER_BACKEND_URL` value should end with `/v2.0`.
189
186
190
-
:::note
191
-
Connectors do not yet support authentication with Microsoft Entra ID as the OIDC provider. When using OIDC, set `connectors.inbound.mode: disabled`[in your Connectors Helm values](https://artifacthub.io/packages/helm/camunda/camunda-platform#connectors-parameters).
192
-
:::
193
-
194
187
</TabItem>
195
188
</Tabs>
196
189
@@ -202,3 +195,4 @@ Connectors do not yet support authentication with Microsoft Entra ID as the OIDC
202
195
| Optimize | https://<OPTIMIZE_URL>/api/authentication/callback | There is a fallback if you use the existing ENV vars to configure your authentication provider, if you use a custom `yaml`, you need to update your properties to match the new values in this guide.<br/><br/>When using an OIDC provider, the following features are not currently available: User permissions tab in collections, digests, `Alerts` tab in collections. |
| Web Modeler | https://<WEB_MODELER_URL>/login-callback | Using a different OIDC provider than Keycloak currently disables all checks of the permissions claim both for using Web Modeler via the UI and via the public API.<br/><br/> Required configuration variables for webapp:<br/>`OAUTH2_CLIENT_ID=[client-id]`<br/>`OAUTH2_JWKS_URL=[provider-jwks-url]`<br/>`OAUTH2_TOKEN_AUDIENCE=[client-audience]`<br/>`OAUTH2_TOKEN_ISSUER=[provider-issuer]`<br/>`OAUTH2_TYPE=[provider-type]`<br/><br/> Required configuration variables for restapi:<br/>`CAMUNDA_IDENTITY_BASEURL=[identity-base-url]`<br/>`CAMUNDA_IDENTITY_TYPE=[provider-type]`<br/>`CAMUNDA_MODELER_SECURITY_JWT_AUDIENCE_INTERNAL_API=[client-audience]`<br/>`CAMUNDA_MODELER_SECURITY_JWT_AUDIENCE_PUBLIC_API=[publicapi-audience]` (for security reasons, <strong>use a different value here than for `CAMUNDA_MODELER_SECURITY_JWT_AUDIENCE_INTERNAL_API`</strong>)<br/>`SPRING_SECURITY_OAUTH2_RESOURCESERVER_JWT_ISSUER_URI=[provider-issuer]`|
198
+
| Connectors || Connectors act as a client in the OIDC flow. <br/><br/> For outbound-only mode (when `CAMUNDA_CONNECTOR_POLLING_ENABLED` is `false`), only Zeebe client properties are required: <br/> `ZEEBE_CLIENT_ID=[client-id]`<br/>`ZEEBE_CLIENT_SECRET=[client-secret]`<br/>`ZEEBE_AUTHORIZATION_SERVER_URL=[provider-issuer]`<br/>`ZEEBE_TOKEN_AUDIENCE=[Zeebe audience]`<br/>`ZEEBE_TOKEN_SCOPE=[Zeebe scope]` (optional)<br/><br/> For inbound mode, Operate client properties are required:<br/>`CAMUNDA_IDENTITY_TYPE=[provider-type]`<br/>`CAMUNDA_IDENTITY_AUDIENCE=[Operate audience]`<br/>`CAMUNDA_IDENTITY_CLIENT_ID=[client-id]`<br/>`CAMUNDA_IDENTITY_CLIENT_SECRET=[client-secret]`<br/>`CAMUNDA_IDENTITY_ISSUER_BACKEND_URL=[provider-issuer]`|
0 commit comments