Skip to main content

Security

Users

The configuration of the user-related parameters is in the file kadai.properties. Some parameters allow multiple values specified as a list. In this case, individual values are separated by a configurable separator. Use the propertiesSeparator parameter to specify it. If none is provided, the default is "|". If you specify a propertiesSeparator, no list item in the properties file can contain any character from the propertiesSeparator.

ParameterDescriptionSample Value
EXTERNAL | manual | autoMAtic | Process
kadai.user.minimalPermissionsToAssignDomainsThe list of minimal Workbasket permissions of a user needed to belong to the domain. Needed to determine the domains of a user, which are aggregated in the getUser() method of the UserService. Values have to match the Enum values of WorkbasketPermission. If this property is not defined the dynamic computation of the domain attribute will not be executed.READ | OPEN
kadai.addAdditionalUserInfoAdd attributes of the user from the USER_INFO table, for example during a Task request or Task Query, the default value is falsetrue

Roles Mapping

KADAI's Roles and their meaning can be looked up here. For each role, a list of access ids that refer to users or groups can be specified using the following keywords:

RoleKeyword
userkadai.roles.user
business_adminkadai.roles.business_admin
task_adminkadai.roles.task_admin
adminkadai.roles.admin
monitorkadai.roles.monitor
task_routerkadai.roles.task_router

The access ids are separated by a configurable separator. If none is provided, the default is "|". The assignment of roles to users or groups can look like this:

src/main/resources/kadai.properties
kadai.roles.user=cn=ksc-users,cn=groups,OU=Test,O=KADAI | teamlead-1 | teamlead-2 | user-1-1 | user-1-2 | user-2-1 | user-2-2 | user-b-1 | user-b-2
kadai.roles.admin=admin | uid=admin,cn=users,OU=Test,O=KADAI
kadai.roles.business_admin=businessadmin | cn=business-admins,cn=groups,OU=Test,O=KADAI
kadai.roles.monitor=monitor | cn=monitor-users,cn=groups,OU=Test,O=KADAI
kadai.roles.task_admin=taskadmin

REST Service Security

As described in security, kadai-core uses JAAS Subjects for authentication. However, when using the REST service of KADAI, you need to provide a mapping to the JAAS Subjects. KADAI shows how to do that in the class BootWebSecurityConfigurer in the kadai-rest-spring-example-boot module using LDAP. There, you can also look up additional configuration of KADAI on REST level. This way, KADAI provides LDAP support for its REST Service. You can read more about LDAP Configuration here.

The following additional security parameters can be configured in the application.properties:

ParameterDescriptionSample ValueOptional
devModeWhen using frontend with devMode set to true and enableCsrf to false, you will be automatically logged in as admin. The default value is false.falsetrue
enableCsrfThis property enables the support of CSRF tokens. This will not work together with devMode. You need to set it to false in order to use Basic Auth, for example in Postman.The default value is false.truetrue