Hi @Nikos_M,
Great questions about Tasklist V2 API and user task access restrictions! Let me address both of your points:
1. Future Support for Candidate Groups/Users in Tasklist V2 API
You’re correct that Tasklist V2 API currently does not enforce candidate groups and users restrictions. This is by design - as documented in the user task access restrictions guide:
“This configuration does not affect API users. When retrieving tasks using the APIs, all tasks are returned.”
Current Behavior:
- Tasklist UI: Automatically enforces candidate users/groups restrictions
- Tasklist V2 API: Returns all tasks regardless of candidate assignments
Future Intentions: Based on the available documentation, there’s no clear roadmap information about native candidate groups/users support being added to the V2 API. The current design appears intentional to provide flexibility for custom task applications with business-specific authorization rules.
Recommendation: For now, you should implement your own authorization logic when using the V2 API, filtering tasks based on the user’s identity and group memberships extracted from authentication tokens.
2. Authorization-Based Access Control Configuration
Regarding the authorization-based access control workaround, here are the key details:
Finding the Authorizations Tab
Important: The Authorizations tab is only available in the Orchestration Cluster Identity UI, not the Management Identity UI. This is a critical distinction in Camunda 8.8:
- Management Identity (usually at
/identity path): For platform components - NO Authorization tab
- Orchestration Cluster Identity (usually at root
/ path): For runtime components - HAS Authorization tab
Configuration Requirements
To use resource authorizations, you need to:
-
Enable the feature using environment variables in Identity, Operate, and Tasklist
-
Configure a database for Identity (required for resource authorizations)
-
Use Keycloak as IdP (resource authorizations only work with Keycloak)
Managing Authorizations
Once configured, you can create authorizations through:
For Groups: Groups tab → Select group → Authorizations tab → Create resource authorization
For Users: Users tab → Select user → Authorizations tab → Create resource authorization
Current Limitations
Resource authorizations currently support:
- Process permissions: Read, Delete, Update process instance, Delete process instance, Start process instance
- Decision permissions: Read, Delete
Note: This doesn’t directly solve the candidate groups/users issue for V2 API, as these authorizations work at the process/decision level, not individual task level.
Bottom Line
For Tasklist V2 API with candidate groups/users functionality, you’ll still need to implement custom authorization logic in your application code, as the current authorization system doesn’t provide task-level candidate filtering through the API.
Would you like me to elaborate on any of these points or help you think through the custom authorization implementation approach?
References: