Mapping rules
Mapping rules are only available for Camunda 8 Self-Managed with OIDC-based authentication. They do not work with any other authentication methods, such as basic authentication.
A mapping rule has the following properties:
- Claim name: Either the name of a (nested) claim or a JSONPath expression.
- Claim value: The expected value of the claim. The mapping rule takes effect only if this value is matched in a JWT.
Using a mapping rule is a two-step process:
- Create the mapping rule – This tells the Orchestration Cluster how to identify a match.
- Assign the mapping rule – Apply it to a group, role, tenant, or authorization.
To use mapping rules, you must be familiar with the structure of the JWT access tokens that your OIDC provider issues to the Orchestration Cluster clients.
Assume the following payload of an access token issued by your Identity Provider (IdP):
{
"sub": "1234567890",
"name": "John Doe",
"isAdmin": true,
"orggroups": ["acct", "finance"],
"iat": 1516239022
}
To make any user a member of the admin
role when they have the isAdmin
claim set to true
, first define a mapping rule as follows:
- Claim name:
isAdmin
- Claim value:
true
Then, assign the mapping rule to the admin
role.
To make any member of the organizational group acct
a member of the Orchestration Cluster group accounting
, define a mapping rule as follows:
- Claim name:
orggroups
- Claim value:
acct
Then, assign the mapping rule to the accounting
group.
Note that in this case, the mapping rule is matching against an array of objects. Based on the JWT structure, a mapping rule claim value is matched using equals
or in
semantics.
To learn more about how to configure mapping rules via the UI, see the Identity guide on managing mapping rules.
To learn how to create mapping rules via API, see the mapping rules API reference.