Forrester’s Total Economic Impact™ Study reveals Camunda customers see a 389% ROI


camunda BPM camunda BPM 7.0.0-alpha8 released

Here comes the latest camunda BPM alpha release with the following highlights:

New features in cockpit webapplication:

  • Greatly improved layout
  • Editing process variables
  • Cancelling a process instance
  • Increment retries for failed jobs
  • Login based on Process Engine Identity Service
We added a new application called camunda Admin which provides support for
  • Managing users & groups based on the process engine engine identity service
  • Creating an initial user for a process engine
The REST API was enhanced 
The Process Engine got smarter
  • Started work on authorization service
Braking change: the URL for cockpit is now https://localhost:8080/camunda/.
All in all, 33 issues were closed, including 8 bugfixes. Read the full release notes in JIRA.

Additions to the Webapps

Nico Rehwaldt & Roman Smirnov have given cockpit a complete layout overhaul and added a lot of features:
New Cockpit layout:<

Editing process variables:

Cancelling Process Instances:

Increment Job retries

Selecting a process engine

Switching to a different application

The camunda Admin application allows managing Users and Groups

Started Work on Authorizations:

We started work on a resource-based authorization system in the process engine:

The authorization service allows managing Authorizations.
Authorizations manage permissions of a given user/group to interact with a given

Creating an authorization
An authorization is created between a user/group and a resource. It describes
the user/group’s permissions to access that resource. An authorization
may express different permissions, such as the permission to READ, WRITE, DELTE
the resource.

Granting / revoking permissions
In order to grant the permission to access a certain resource, an
authorization object is created:

 Authorization auth = authorizationService.createNewAuthorization();
 //... configure auth
The authorization object can be configured either for a user or a group:
and a resource:
finally the permissions to access that resource can be assigned:
and the authorization object is saved:
As a result, the given user or group will have permission to READ the
referenced process definition.

Checking a permission
Permissions can be checked using a query:

Selects all Authorization objects which provide READ,WRITE,DELETE
Permissions for the user “john”. 
In the 7.0 final release, authorizations will work on the Resources USER, GROUP, APPLICATION, AUTHORIZATION. In 7.1 we will extend authorization support to process definitions. 
(All plans are subject to change 🙂 )

What’s coming up next?

– Authorizations
– Many awesome features in cockpit 🙂