cagdasoezguer / camunda-sso

Example for Camunda Process Application OAuth2 configuration

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Spring Security Configuration for Camunda Process Application (e.g. Camunda with Keycloak)

Tested on versions

  • Camunda BPM: 7.14, 7.15
  • Spring Boot: 2.3.5.RELEASE, 2.3.8.RELEASE, 2.4.2, 2.4.3, 2.4.4

Goal

Use default Spring security with OAuth2 and provide authenticated access to Camunda WebApps and Camunda REST.

Principle

Uses ContainerBasedAuthenticationProvider and default Spring Security OAuth2 configuration.

Features

Uses standard OAuth2 Authentication Token for extracting the entire Spring- and Camunda-related user information including the OAuthIdentityServiceProvider.

Required configuration

You need to set some environment variables to make this work, pointing to your SSO. I used Keycloak for testing.

KEYCLOAK_BASE_URL=https://<hostname-of-keycloak-installation>/auth
KEYCLOAK_REALM=<realm>
KEYCLOAK_CLIENT_ID=<client-id-of-your-app>
KEYCLOAK_CLIENT_SECRET=<client-secret-of-your-app>
WEBAPP_REQUIRED_ROLE=<client-role-to-access-the-webapp> # not a realm role, check application.yml

Paths and expected responses.

About

Example for Camunda Process Application OAuth2 configuration


Languages

Language:Java 99.3%Language:HTML 0.7%