Skip to main content
Version: 8.8

Set up the Helm chart with basic authentication

By default, Camunda 8 Self-Managed uses basic authentication for all components deployed through the Helm chart. This method requires no additional configuration and is ideal for local or development environments.

note

Because basic authentication is enabled by default, components that depend on Management Identity (which implements OIDC/OAuth authentication) are disabled by default. These components include:

  • Management Identity
  • Console
  • Web Modeler
  • Keycloak
  • Optimize

Enable Orchestration Cluster and Connectors

The Orchestration Cluster and Connectors are enabled by default with basic authentication. No additional configuration is required—simply deploy the Helm chart and these components will be available.

Default users

Two users are created by default:

UsernamePasswordRoleDescription
demodemoadminInitial administrative user
connectorconnectorconnectorsUsed by the Connectors component to authenticate with the Orchestration Cluster API

For details on configuring initial users and their roles, see
Orchestration Cluster Identity initialization.

Helm arrays

In Helm, arrays must be overwritten in full. If you change these configuration settings, keep in mind that the default array must be configured in your custom values.yaml if you want to keep those users and role assignments. For example, when adding the user foo or assigning roles to foo, keep also the values for the demo and connectors user.

Connect to the cluster

To access the Orchestration Cluster and Connectors from your local machine using kubectl port-forward, see Accessing components without Ingress.

Log in with the default credentials: username demo, password demo.

Enable additional components

The following components do not support basic authentication and require Management Identity with an OIDC provider:

  • Console
  • Web Modeler
  • Optimize

You can still enable these components alongside a basic auth Orchestration Cluster by using a hybrid authentication setup:

  • Orchestration Cluster and Connectors use basic authentication
  • Console, Web Modeler, Optimize, and Management Identity use OIDC

This guide shows how to configure hybrid authentication with internal Keycloak. You can also apply this approach with other OIDC setups, such as external Keycloak or an external OIDC provider

When deploying process models from Web Modeler to a basic auth Orchestration Cluster, you will be prompted to enter credentials in the deployment dialog.

Configuration steps

Follow the internal Keycloak guide with these modifications:

  1. Simplify the secret: Omit the identity-connectors-client-token and identity-orchestration-client-token keys—they are not needed when using basic auth. See Create a secret.

  2. Set basic auth for the Orchestration Cluster and Connectors:

orchestration:
security:
authentication:
method: basic

connectors:
security:
authentication:
method: basic
  1. Skip the OIDC sections for the Orchestration Cluster and Connectors in the internal Keycloak guide.

Full configuration example

The following example shows the complete configuration for hybrid authentication with internal Keycloak:

global:
identity:
auth:
enabled: true
optimize:
secret:
existingSecret: "camunda-credentials"
existingSecretKey: "identity-optimize-client-token"

identity:
enabled: true
firstUser:
secret:
existingSecret: "camunda-credentials"
existingSecretKey: "identity-firstuser-password"

identityKeycloak:
enabled: true
auth:
existingSecret: "camunda-credentials"
passwordSecretKey: "identity-keycloak-admin-password"
postgresql:
auth:
existingSecret: "camunda-credentials"
secretKeys:
adminPasswordKey: "identity-keycloak-postgresql-admin-password"
userPasswordKey: "identity-keycloak-postgresql-user-password"

optimize:
enabled: true

connectors:
security:
authentication:
method: basic

webModeler:
enabled: true
restapi:
mail:
fromAddress: noreply@example.com

webModelerPostgresql:
enabled: true
auth:
existingSecret: "camunda-credentials"
secretKeys:
adminPasswordKey: "webmodeler-postgresql-admin-password"
userPasswordKey: "webmodeler-postgresql-user-password"

orchestration:
security:
authentication:
method: basic

console:
enabled: true

Connect to the cluster

To access the additional components, see Connect to the cluster in the internal Keycloak guide.

Next steps