You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/self-managed/deployment/helm/configure/authentication-and-authorization/external-idp-via-internal-keycloak.md
+11-12Lines changed: 11 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ For details on Keycloak identity provider mappers, see the [Keycloak documentati
41
41
42
42
#### Create attribute mappers
43
43
44
-
In Keycloak Admin Console, navigate to **Identity Providers**→ select your IdP →**Mappers** tab.
44
+
In Keycloak Admin Console, navigate to **Identity Providers**> select your IdP >**Mappers** tab.
45
45
46
46
Create attribute mappers to import user profile information:
47
47
@@ -60,7 +60,7 @@ Create a username mapper:
60
60
61
61
#### Create group for external IdP users
62
62
63
-
Navigate to **Groups**→**Create group** and create a group:
63
+
Navigate to **Groups**>**Create group** and create a group:
64
64
65
65
-**Name**: `external-idp-users`
66
66
@@ -82,7 +82,7 @@ Log in to **Orchestration Cluster Identity** as an administrator.
82
82
83
83
Create a mapping rule to identify external IdP users:
84
84
85
-
1. Navigate to **Mapping Rules**→**Create a mapping rule**.
85
+
1. Navigate to **Mapping Rules**>**Create a mapping rule**.
86
86
1. Configure the mapping rule:
87
87
-**Mapping Rule ID**: `external-idp-users-rule`
88
88
-**Mapping Rule name**: `External IdP Users`
@@ -93,7 +93,7 @@ Create a mapping rule to identify external IdP users:
93
93
94
94
Grant access to Orchestration Cluster components:
95
95
96
-
1. Navigate to **Authorizations**→ select **Component**→**Create authorization**.
96
+
1. Navigate to **Authorizations**> select **Component**>**Create authorization**.
97
97
1. Configure the authorization:
98
98
-**Owner type**: `Mapping rule`
99
99
-**Owner ID**: `external-idp-users-rule`
@@ -113,7 +113,7 @@ Grant additional permissions as needed. For example, to allow users to view proc
113
113
For more details on authorizations, see [Orchestration Cluster authorization](/components/concepts/access-control/authorizations.md).
For access to Console, Web Modeler, and Optimize, external IdP users need the corresponding realm roles assigned in Keycloak. The recommended approach is to assign users to groups that have these roles.
119
119
@@ -126,14 +126,14 @@ For access to Console, Web Modeler, and Optimize, external IdP users need the co
126
126
127
127
Ensure each group has the corresponding realm role assigned:
128
128
129
-
1. Select the group →**Role Mappings** tab.
129
+
1. Select the group >**Role Mappings** tab.
130
130
1. Click **Assign role** and add the role with the same name (e.g., `Console`).
131
131
132
132
#### Create group mappers
133
133
134
134
Create mappers to assign federated users to these groups:
135
135
136
-
1. Navigate to **Identity Providers**→ select your IdP →**Mappers** tab.
136
+
1. Navigate to **Identity Providers**> select your IdP >**Mappers** tab.
137
137
1. Click **Add mapper** for each component:
138
138
139
139
| Mapper Name | Mapper Type | Group |
@@ -148,14 +148,13 @@ You can also assign roles directly to users in Keycloak, or use [mapping rules i
148
148
149
149
## Understanding the two identity systems
150
150
151
-
Camunda 8.8 uses two separate identity systems:
151
+
Camunda 8.8 uses two separate identity systems: Orchestration Cluster Identity and Management Identity. Each system manages access to different components and uses different configuration methods.
| Management Identity | Console, Web Modeler, Optimize | Keycloak groups and roles |
153
+
For a detailed explanation of the differences between these identity systems, see [Identity types in Camunda 8](/components/concepts/access-control/access-control-overview.md#identity-types-in-camunda-8).
157
154
155
+
:::note
158
156
Orchestration Cluster Identity does not automatically recognize Keycloak groups. You must create mapping rules that match JWT claims and then assign authorizations to those mapping rules.
Copy file name to clipboardExpand all lines: versioned_docs/version-8.8/self-managed/deployment/helm/configure/authentication-and-authorization/external-idp-via-internal-keycloak.md
+11-12Lines changed: 11 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ For details on Keycloak identity provider mappers, see the [Keycloak documentati
41
41
42
42
#### Create attribute mappers
43
43
44
-
In Keycloak Admin Console, navigate to **Identity Providers**→ select your IdP →**Mappers** tab.
44
+
In Keycloak Admin Console, navigate to **Identity Providers**> select your IdP >**Mappers** tab.
45
45
46
46
Create attribute mappers to import user profile information:
47
47
@@ -60,7 +60,7 @@ Create a username mapper:
60
60
61
61
#### Create group for external IdP users
62
62
63
-
Navigate to **Groups**→**Create group** and create a group:
63
+
Navigate to **Groups**>**Create group** and create a group:
64
64
65
65
-**Name**: `external-idp-users`
66
66
@@ -82,7 +82,7 @@ Log in to **Orchestration Cluster Identity** as an administrator.
82
82
83
83
Create a mapping rule to identify external IdP users:
84
84
85
-
1. Navigate to **Mapping Rules**→**Create a mapping rule**.
85
+
1. Navigate to **Mapping Rules**>**Create a mapping rule**.
86
86
1. Configure the mapping rule:
87
87
-**Mapping Rule ID**: `external-idp-users-rule`
88
88
-**Mapping Rule name**: `External IdP Users`
@@ -93,7 +93,7 @@ Create a mapping rule to identify external IdP users:
93
93
94
94
Grant access to Orchestration Cluster components:
95
95
96
-
1. Navigate to **Authorizations**→ select **Component**→**Create authorization**.
96
+
1. Navigate to **Authorizations**> select **Component**>**Create authorization**.
97
97
1. Configure the authorization:
98
98
-**Owner type**: `Mapping rule`
99
99
-**Owner ID**: `external-idp-users-rule`
@@ -113,7 +113,7 @@ Grant additional permissions as needed. For example, to allow users to view proc
113
113
For more details on authorizations, see [Orchestration Cluster authorization](/components/concepts/access-control/authorizations.md).
For access to Console, Web Modeler, and Optimize, external IdP users need the corresponding realm roles assigned in Keycloak. The recommended approach is to assign users to groups that have these roles.
119
119
@@ -126,14 +126,14 @@ For access to Console, Web Modeler, and Optimize, external IdP users need the co
126
126
127
127
Ensure each group has the corresponding realm role assigned:
128
128
129
-
1. Select the group →**Role Mappings** tab.
129
+
1. Select the group >**Role Mappings** tab.
130
130
1. Click **Assign role** and add the role with the same name (e.g., `Console`).
131
131
132
132
#### Create group mappers
133
133
134
134
Create mappers to assign federated users to these groups:
135
135
136
-
1. Navigate to **Identity Providers**→ select your IdP →**Mappers** tab.
136
+
1. Navigate to **Identity Providers**> select your IdP >**Mappers** tab.
137
137
1. Click **Add mapper** for each component:
138
138
139
139
| Mapper Name | Mapper Type | Group |
@@ -148,14 +148,13 @@ You can also assign roles directly to users in Keycloak, or use [mapping rules i
148
148
149
149
## Understanding the two identity systems
150
150
151
-
Camunda 8.8 uses two separate identity systems:
151
+
Camunda 8.8 uses two separate identity systems: Orchestration Cluster Identity and Management Identity. Each system manages access to different components and uses different configuration methods.
| Management Identity | Console, Web Modeler, Optimize | Keycloak groups and roles |
153
+
For a detailed explanation of the differences between these identity systems, see [Identity types in Camunda 8](/components/concepts/access-control/access-control-overview.md#identity-types-in-camunda-8).
157
154
155
+
:::note
158
156
Orchestration Cluster Identity does not automatically recognize Keycloak groups. You must create mapping rules that match JWT claims and then assign authorizations to those mapping rules.
0 commit comments