Skip to main content

Mapping rules

info

Mapping rules are only available for Camunda 8 Self-Managed with OIDC-based authentication. They do not work with any other authentication methods, such as basic authentication.

A mapping rule has the following properties:

  • Claim name: Either the name of a (nested) claim or a JSONPath expression.
  • Claim value: The expected value of the claim. The mapping rule takes effect only if this value is matched in a JWT.

Using a mapping rule is a two-step process:

  1. Create the mapping rule – This tells the Orchestration Cluster how to identify a match.
  2. Assign the mapping rule – Apply it to a group, role, tenant, or authorization.
note

To use mapping rules, you must be familiar with the structure of the JWT access tokens that your OIDC provider issues to the Orchestration Cluster clients.

Assume the following payload of an access token issued by your Identity Provider (IdP):

{
"sub": "1234567890",
"name": "John Doe",
"isAdmin": true,
"orggroups": ["acct", "finance"],
"iat": 1516239022
}

To make any user a member of the admin role when they have the isAdmin claim set to true, first define a mapping rule as follows:

  • Claim name: isAdmin
  • Claim value: true

Then, assign the mapping rule to the admin role.

To make any member of the organizational group acct a member of the Orchestration Cluster group accounting, define a mapping rule as follows:

  • Claim name: orggroups
  • Claim value: acct

Then, assign the mapping rule to the accounting group.
Note that in this case, the mapping rule is matching against an array of objects. Based on the JWT structure, a mapping rule claim value is matched using equals or in semantics.

To learn more about how to configure mapping rules via the UI, see the Identity guide on managing mapping rules.
To learn how to create mapping rules via API, see the mapping rules API reference.