Uploaded image for project: 'jBPM'
  1. jBPM
  2. JBPM-9973

[RHSSO] User with process-admin role cannot see tasks

    XMLWordPrintable

Details

    • Bug
    • Resolution: Done
    • Blocker
    • 7.64.0.Final
    • None
    • None
    • None
    • False
    • False
    • NEW
    • NEW
    • Hide
      1. Login as a user with the admin role.
      2. Open projects perspective.
      3. Import the Evaluation sample project. (Add project -> Try samples)
      4. Deploy the project.
      5. Start process instance.
      6. Task is visible.
      7. Log in as a user with the process-admin role.
      8. Open Tasks perspective.
      9. Task is not visible - (Task should be visible.)
      Show
      Login as a user with the admin role. Open projects perspective. Import the Evaluation sample project. (Add project -> Try samples) Deploy the project. Start process instance. Task is visible. Log in as a user with the process-admin role. Open Tasks perspective. Task is not visible - (Task should be visible.)

    Description

      User with process-admin role cannot see created tasks.

      Standalone cofiguration changes:

      /subsystem=undertow/application-security-domain=other:remove()
      /subsystem=undertow/application-security-domain=other:add(http-authentication-factory="keycloak-http-authentication")
      /subsystem=ejb3/application-security-domain=other:write-attribute(name=security-domain, value=KeycloakDomain)
      
      # Keycloak configuration for Kie server
      /subsystem=keycloak/secure-deployment=${keycloak.deployment.name.kie.server}:add(realm=${keycloak.realm},realm-public-key=${keycloak.public.key},auth-server-url=${keycloak.auth.server.url},ssl-required=external,resource=${keycloak.deployment.resource.kie.server},enable-basic-auth=true,principal-attribute=preferred_username)
      /subsystem=keycloak/secure-deployment=${keycloak.deployment.name.kie.server}/credential=secret:add(value=${keycloak.client.password})
      
      # Keycloak configuration for Business central
      /subsystem=keycloak/secure-deployment=${keycloak.deployment.name.business.central}:add(realm=${keycloak.realm},realm-public-key=${keycloak.public.key},auth-server-url=${keycloak.auth.server.url},ssl-required=external,resource=${keycloak.deployment.resource.business.central},enable-basic-auth=true,principal-attribute=preferred_username)
      /subsystem=keycloak/secure-deployment=${keycloak.deployment.name.business.central}/credential=secret:add(value=${keycloak.client.password})
      
      # Keycloak system properties
      /system-property=org.uberfire.ext.security.management.api.userManagementServices:add(value=KCAdapterUserManagementService)
      /system-property=org.uberfire.ext.security.management.keycloak.authServer:add(value=${keycloak.auth.server.url})
      /system-property=org.uberfire.ext.security.keycloak.keycloak-config-file:add(value=${cargo.resources.dir}/cargo/keycloak/kie_git_config.json)
      

      Attachments

        Activity

          People

            rh-ee-pefernan Pere Fernandez Perez
            rh-ee-pefernan Pere Fernandez Perez
            Tomas David Tomas David
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: