Skip to main content
Version: 8.8 (unreleased)

What's new in Camunda 8.8

Learn about important changes in Camunda 8.8 to consider when planning your upgrade from Camunda 8.7.

warning

This documentation is a work in progress and may contain incomplete, placeholder, or evolving content. While the core concepts introduced in Camunda 8.8 are stable, specific details are actively being refined.

Introducing Camunda 8.8

Camunda 8.8 introduces important architectural changes and enhancements to simplify deployment, improve maintainability, and empower both operations teams and developers.

The simplest Self-Managed deployment now involves running a single Java application or docker container of the Orchestration Cluster Application.

What's new/changedSummary
Orchestration ClusterThe Orchestration Cluster (previously automation cluster) is now the core Camunda 8 component.
Identity, authentication, and authorization

Identity management is now split into two scopes for improved access management, performance, and flexible integration with any OIDC-compatible Identity Provider:

  • Identity: Manages authentication and fine-grained authorizations for the Orchestration Cluster and its APIs.

  • Management Identity: Controls access for Web Modeler, Console and Optimize.

APIs and toolsNew and changed APIs and tools are introduced in Camunda 8.8.
info

Orchestration Cluster

The primary architectural change is the consolidation of the core Zeebe, Operate, Tasklist, and Identity components into the Orchestration Cluster (a single unified deployable package). This impacts how Camunda 8 is deployed, managed, and scaled.

The Orchestration Cluster (previously automation cluster) is now the core component of Camunda 8.

Diagram showing the Orchestration Cluster

Zeebe, Operate, Tasklist, and Identity

In Camunda 8.8, Zeebe, Operate, Tasklist, and Identity are consolidated into the Orchestration Cluster application as a single deployable artifact, distributed as a JAR file or Docker container.

  • Zeebe is the workflow engine.
  • Operate is used for monitoring and troubleshooting process instances running in Zeebe.
  • Tasklist is used for interacting with user tasks (assigning, completing, and so on).
  • Identity is used for managing the integrated Orchestration Cluster authentication and authorization.

In Camunda 8.7 and earlier, each component (Zeebe, Operate, Tasklist, and Identity) was deployed independently.

Unified Orchestration Cluster REST API

Camunda 8.8 introduces a single unified Orchestration Cluster REST API you can use to interact programmatically with the Orchestration Cluster.

  • This replaces component APIs (Operate API, Tasklist API, Zeebe API, and much of Identity API) with a single set of endpoints.
  • This unified API supports both organizational (SaaS) and Self-Managed deployments.
  • This is now the default and recommended integration point for developers, operators, and automation solutions.

Unified Exporter

Camunda 8.8 introduces a new unified exporter architecture to improve cluster management and data migration. The new exporter architecture provides two dedicated Helm jobs for Identity migration and process application migration.

In Camunda 8.7 and earlier, dedicated importers/exporters were used for data flows between components (such as Elasticsearch import/export).

Unified component configuration

Camunda 8.8 introduces a unified configuration for Orchestration Cluster components where you can define all essential cluster and component behavior through a single, centralized configuration system.

In Camunda 8.7 and earlier, managing and configuring core components (Zeebe, Operate, Tasklist, Identity) was done separately.

Identity, authentication, and authorization

The Orchestration Cluster Identity component UI handles authentication and authorization for the Orchestration Cluster components and its resources.

note

With this 8.8 change, the source of truth for Identity and Access Management for the Orchestration Cluster (including Zeebe, Operate, Tasklist, and its APIs) is now the Orchestration Cluster itself. This removes the reliance on the separate Management Identity (formerly "Identity") component.

Identity and Management Identity

In Camunda 8.8, Orchestration Cluster Identity and Management Identity are two separate components used for Identity management, each with distinct areas of responsibility.

IdentityManagement Identity

Access and permission management for all Orchestration Cluster components: Zeebe, Operate, Tasklist, and the Orchestration Cluster REST and gRPC API.

  • Unified access management: Authentication and authorizations are handled directly by the Orchestration Cluster across all components and APIs, eliminating any orchestration dependency on Management Identity.

  • Authentication: Supports three authentication modes:

    • No Authentication: No authentication required for API access. Form-based authentication in the UI. Users and groups are managed in Identity.

    • Basic Authentication: Basic authentication for API access. Form-based authentication in the UI. Users and groups are managed in Identity.

    • OIDC: OpenID Connect with any compatible Identity Provider (for example, Keycloak, Microsoft EntraID, Okta).

  • Authorizations per resource: Authorizations provide fine-grained access control to Orchestration Cluster resources such as process instances, tasks, and decisions, applied consistently across components and APIs

  • Decoupling from Keycloak: Keycloak is treated as a standard external Identity Provider integrated via OIDC, making it easier to use other providers without special integration.

  • Tenant-Management: Tenants are directly managed within the Orchestration Cluster, allowing for Tenants per Cluster.

Continues to manage access for platform components such as Web Modeler, Console, and Optimize.

  • Remains responsible for managing access to platform components such as Web Modeler, Console, and Optimize.

  • Authentication: Supports two authentication modes:

    • Direct Keycloak integration: (default).

    • OIDC: OpenID Connect with any compatible Identity Provider (for example, Keycloak, Microsoft EntraID, Okta).

  • Tenant-Management: No longer manages Tenants for the Orchestration Cluster components. Tenants only apply to Optimize.

Who is affected by 8.8 Identity changes?

The 8.8 changes to Identity could affect different user roles in your Organization. For example:

RoleResponsibilities
AdministratorsNeed to understand the new Identity setup and migration steps from Camunda 8.7.
DevelopersShould learn the new authorization concepts and required permissions for API access.
Information SecurityMust review and adapt to the new Identity architecture.

Benefits

Orchestration Cluster Identity provides several advantages:

BenefitDescription
Simplified identity managementThe split between Orchestration Cluster Identity and Management Identity provides a clearer separation of concerns, making it easier to manage access for Orchestration Cluster components versus Web Modeler and Console.
Unified access managementAll identity and authorization features for the Orchestration Cluster components are now contained within the Orchestration Cluster, eliminating any dependency on Management Identity when orchestrating processes.
Simplified deployment and improved availabilityRemoving the dependency on Management Identity streamlines deployment and increases availability by reducing potential points of failure.
Consistent authorization modelThe new model offers a unified approach to managing permissions across all Orchestration Cluster resources.
Enhanced securityGranular access controls improve the overall security posture for cluster resources.
Improved performanceAuthorization checks are handled internally, reducing latency and improving performance.
Flexible Identity Provider integrationKeycloak is now treated as a standard OIDC provider, making it easier to integrate with other Identity Provider and increasing flexibility for users.

Impact of Identity changes on your 8.7 deployment

The impact of these changes and what action you need to take depends on your deployment type. For example:

AreaImpact
AuthorizationThe new authorization model introduces fine-grained access control for Orchestration Cluster resources, replacing the previous model.
Roles, tenants, and mapping rulesNow managed within Orchestration Cluster Identity, replacing the previous Management Identity setup.
User Task authorizationsUser Task access restrictions only apply to the Tasklist v1 API. After switching to the v2 API with Tasklist, user task access restrictions do not apply.

Each deployment type has a clear upgrade path and migration guidance to help administrators transition from Camunda 8.7 to Camunda 8.8.

Camunda 8 SaaS

Resource authorizations, groups, and roles formerly managed via Console are replaced by authorizations, groups, and roles managed within the cluster-specific Identity.

  • These are automatically migrated during the Camunda 8.8 upgrade to preserve your existing Access Management configuration at the time of the update.
  • After upgrading a cluster to 8.8, changes to resource authorizations and roles made in Console no longer affect the 8.8 cluster.
  • Users and clients are created and managed in Console, with their authorizations managed via the Orchestration Cluster.

The following table summarizes where Identity entities are managed in Camunda 8.8 SaaS:

Entity typeManaged via
UsersConsole
ClientsConsole
RolesOrchestration Cluster Identity
GroupsOrchestration Cluster Identity
AuthorizationsOrchestration Cluster Identity
Tenantsn/a (planned for future)
Mapping rulesn/a (managed by Camunda)

Camunda 8 Self-Managed

After you deploy all Camunda 8 components in a Self-Managed environment, you will continue to use Management Identity for Web Modeler, Console, and Optimize, but use Orchestration Cluster Identity for Zeebe, Operate, Tasklist, and the Orchestration Cluster REST API.

  • Roles and permissions for Orchestration Cluster components (previously managed in Management Identity), are now replaced by the new authorizations and roles defined within Orchestration Cluster Identity.

  • The Identity Migration App that migrates these entities from Management Identity into Orchestration Cluster Identity must be run during your Camunda 8.7 to 8.8 upgrade. Instructions on enabling and configuring the Identity Migration App in the 8.7 to 8.8 migration guide are available for Helm and also docker-compose/bare Java deployments.

  • Management Identity, Keycloak and Postgres are no longer needed for an Orchestration Cluster. They are only needed when using Web Modeler, Console or Optimize.

    • For the Orchestration Cluster, you can bring your own Identity Provider (for example, Keycloak, Microsoft EntraID, Okta) or use the built-in Basic Authentication method.

    • A special setup is no longer required for Keycloak as it is now integrated like any other Identity Provider via OpenID Connect (OIDC). Management Identity relies by default on Keycloak, but you can also configure it to use any OIDC-compatible Identity Provider.

The following table summarizes where Orchestration Cluster Identity entities are managed in Camunda 8.8 Self-Managed:

Entity typeManaged via
UsersIdentity Provider
ClientsIdentity Provider
RolesOrchestration Cluster Identity
GroupsIdentity Provider
AuthorizationsOrchestration Cluster Identity
TenantsOrchestration Cluster Identity
Mapping RulesOrchestration Cluster Identity

Camunda 8 Self-Managed - Basic Authentication

If you are using built-in user management (Basic Authentication), Tasklist and Operate specific built-in user management (using ES/OS as storage) is no longer supported.

  • Administrators must migrate their users manually into the Orchestration Cluster.
  • You must ensure that usernames are identical, otherwise users will not be able to see their assigned tasks.

In a Basic Authentication setup, the Orchestration Cluster provides full functionality:

Entity typeManaged via
UsersOrchestration Cluster Identity
Clientsn/a (not applicable for Basic Authentication)
RolesOrchestration Cluster Identity
GroupsOrchestration Cluster Identity
AuthorizationsOrchestration Cluster Identity
TenantsOrchestration Cluster Identity
Mapping Rulesn/a (not applicable for Basic Authentication)

APIs and tools

The following table provides a summary of the main 8.8 API and tools changes.

What's new/changedDescription
Camunda Java ClientThe Camunda Java Client is now the official Java library for connecting to Camunda 8 clusters, automating processes, and implementing job workers. It is designed for Java developers who want to interact programmatically with Camunda 8 via REST or gRPC, and is the successor to the Zeebe Java client.
Camunda Spring SDKThe Camunda Spring Boot SDK replaces the Spring Zeebe SDK. The SDK relies on the Camunda Java client, designed to enhance the user experience and introduce new features while maintaining compatibility with existing codebases.
Camunda Process TestCamunda Process Test (CPT) is a Java library to test your BPMN processes and your process application. CPT is the successor of Zeebe Process Test. Our previous testing library is deprecated and will be removed with version 8.10.
Zeebe gRPC API endpointsWith the 8.8 release, the gRPC API continues but is being disabled by default starting with 8.10.

Summary of changes

The following table provides a summary of the main 8.8 architectural changes.

Feature/areaCamunda 8.7 and earlierCamunda 8.8
Core componentsSeparate deployments (per component)Unified Orchestration Cluster
IdentitySeparate, uses Keycloak and PostgreSQLIntegrated, uses Zeebe storage, OIDC compatible
OptimizeSeparate componentRemains separate (as before)
Exporter/ImporterSeparate Importers/ExportersUnified Exporter
Helm Chart DeploymentMultiple StatefulSetsSingle StatefulSet
Groups/Roles ManagementManaged in ConsoleManaged in Identity

Upgrade guides

Camunda 8.8 lays the foundation for future releases. Upgrading ensures compatibility and access to improved features.

The following guides provide detailed information on how you can upgrade to Camunda 8.8.

GuideDescriptionWho is this guide for?
Self-Managed upgrade guideEvaluate your infrastructure, understand operational changes, and choose the best update strategy for your environment.Operations and platform administrators of Self-Managed installations.
API and SDK upgrade guide

Plan and execute an upgrade from Camunda 8.7 to 8.8, focusing on API and SDK transitions.

  • Application developers maintaining Camunda-based solutions in Self-Managed Kubernetes or VM environments.
  • Developers using Camunda APIs and SDKs.