SSL
By default, communication between Web Modeler and Identity and the Web Modeler components is not encrypted, as it usually happens backend-to-backend within the same Docker network or Kubernetes cluster. However, you can enable TLS-encrypted communication by following the steps below (for example, if backend-to-backend communication is not possible in a custom Camunda 8 installation setup).
Configuring secure connections to Identity
Configure the Identity base URL
For the modeler-restapi container, provide a URL that starts with https:// (for example https://identity.example.com) as the base URL of the Identity instance.
- Environment variables
- application.yml
CAMUNDA_IDENTITY_BASEURL=https://identity.example.com
camunda.identity.base-url: https://identity.example.com
Configuring secure connections for Web Modeler components
Configure restapi SSL certificate
SSL can be configured declaratively by setting the respective properties offered by Spring Boot (make sure that the provided certificate path is accessible from the container, for example via a mounted volume):
- Environment variables
- application.yml
RESTAPI_SERVER_URL=https://web-modeler.example.com
SERVER_SSL_ENABLED=true
SERVER_SSL_CERTIFICATE=file:/full/path/to/certificate.pem
SERVER_SSL_CERTIFICATE_PRIVATE_KEY=file:/full/path/to/key.pem
Additionally, you can configure SSL separately for the management routes of the restapi component:
MANAGEMENT_SERVER_SSL_ENABLED=true
MANAGEMENT_SERVER_SSL_CERTIFICATE=file:/full/path/to/certificate.pem
MANAGEMENT_SERVER_SSL_CERTIFICATE_PRIVATE_KEY=file:/full/path/to/key.pem
camunda.modeler.server.url: https://web-modeler.example.com
server:
ssl:
enabled: true
certificate: file:/full/path/to/certificate.pem
certificate-private-key: file:/full/path/to/key.pem
Additionally, you can configure SSL separately for the management routes of the restapi component:
management:
server:
ssl:
enabled: true
certificate: file:/full/path/to/certificate.pem
certificate-private-key: file:/full/path/to/key.pem
Refer to the Spring Boot documentation for more information on configuration options.
Use secure connections between the restapi and websocket components
To use secure connections between the restapi and websocket components:
- Environment variables
- application.yml
RESTAPI_PUSHER_SSL_ENABLED=true
camunda.modeler.pusher.ssl-enabled: true
Configure websocket SSL certificate
SSL can be configured by setting the following environment variables (make sure that the provided certificate path is accessible from the container, e.g. via a mounted volume):
PUSHER_SSL_CERT=/full/path/to/certificate.pem
PUSHER_SSL_KEY=/full/path/to/key.pem
PUSHER_SSL_PASSPHRASE=your-passphrase
Currently, there is no option to configure SSL for the websocket management routes separately from the application routes.
(Optional) Provide a custom certificate
If you are using a custom (self-signed) TLS certificate for either the restapi or Identity, you need to make Web Modeler accept the certificate.
For the modeler-restapi container:
- Add the certificate to a custom Java trust store (using the
keytoolutility). - Configure the trust store as described in the Zeebe connection troubleshooting guide.