Authentication
All Operate REST API requests require authentication. To authenticate, generate a JSON Web Token (JWT) and include it in each request.
Generate a token
- SaaS
- Self-Managed
- Create client credentials in the Clusters > Cluster name > API tab of Camunda Console.
- Add permissions to this client for Operate.
- Once you have created the client, capture the following values required to generate a token:
Name Environment variable name Default value Client ID ZEEBE_CLIENT_ID
- Client Secret ZEEBE_CLIENT_SECRET
- Authorization Server URL ZEEBE_AUTHORIZATION_SERVER_URL
https://login.cloud.camunda.io/oauth/token
Audience operate.camunda.io
Operate REST Address CAMUNDA_OPERATE_BASE_URL
- cautionWhen client credentials are created, the
Client Secret
is only shown once. Save thisClient Secret
somewhere safe. - Execute an authentication request to the token issuer:A successful authentication response looks like the following:
curl --request POST ${ZEEBE_AUTHORIZATION_SERVER_URL} \
--header 'Content-Type: application/x-www-form-urlencoded' \
--data-urlencode 'grant_type=client_credentials' \
--data-urlencode 'audience=operate.camunda.io' \
--data-urlencode "client_id=${ZEEBE_CLIENT_ID}" \
--data-urlencode "client_secret=${ZEEBE_CLIENT_SECRET}"{
"access_token": "<TOKEN>",
"expires_in": 300,
"refresh_expires_in": 0,
"token_type": "Bearer",
"not-before-policy": 0
} - Capture the value of the
access_token
property and store it as your token.
- Add an M2M application in Identity.
- Add permissions to this application for Operate API.
- Capture the
Client ID
andClient Secret
from the application in Identity. - Generate a token to access the REST API. Provide the
client_id
andclient_secret
from the values you previously captured in Identity.A successful authentication response looks like the following:curl --location --request POST 'http://localhost:18080/auth/realms/camunda-platform/protocol/openid-connect/token' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--data-urlencode "client_id=${CLIENT_ID}" \
--data-urlencode "client_secret=${CLIENT_SECRET}" \
--data-urlencode 'grant_type=client_credentials'{
"access_token": "<TOKEN>",
"expires_in": 300,
"refresh_expires_in": 0,
"token_type": "Bearer",
"not-before-policy": 0
} - Capture the value of the
access_token
property and store it as your token.
See the Operate Configuration - Authentication documentation for more information about this authentication method.
Use a token
Include the previously captured token as an authorization header in each request: Authorization: Bearer <TOKEN>
.
For example, to send a request to the Operate REST API's "Search process instances" endpoint:
- SaaS
- Self-Managed
The ${CAMUNDA_OPERATE_BASE_URL}
variable below represents the URL of the Operate REST API. You can capture this URL when creating an API client. You can also construct it as https://${REGION}.operate.camunda.io/${CLUSTER_ID}
.
The ${CAMUNDA_OPERATE_BASE_URL}
variable below represents the URL of the Operate REST API. You can configure this value in your Self-Managed installation. The default value is http://localhost:8081
.
curl --request POST ${CAMUNDA_OPERATE_BASE_URL}/v1/process-instances/search \
--header "Authorization: Bearer ${TOKEN}" \
--header 'Content-Type: application/json' \
--data-raw '{}'
A successful response includes matching process instances. For example:
{
"items": [],
"sortValues": [123456],
"total": 0
}
Token expiration
Access tokens expire according to the expires_in
property of a successful authentication response. After this duration, in seconds, you must request a new access token.
Authentication via cookie (Self-Managed only)
You can also access the Operate API in a Self-Managed cluster by sending cookie headers in each request. You can obtain a cookie using the /api/login API endpoint. For example:
Example:
- Log in as user 'demo' and store the cookie in the file
cookie.txt
.
curl --request POST 'http://localhost:8080/api/login?username=demo&password=demo' \
--cookie-jar cookie.txt
- Send the cookie as a header in each API request. In this case, request all process definitions.
curl --request POST 'http://localhost:8080/v1/process-definitions/search' \
--cookie cookie.txt \
--header 'Content-Type: application/json' -d '{}'