<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: [RESOLVED] : NIFI : LISTENHTTP SSL in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146989#M109542</link>
    <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/10607/nlam.html" nodeid="10607" target="_blank"&gt;@Nik Lam&lt;/A&gt; : Oh sorry, i don't speak about connecting to web ui &lt;/P&gt;&lt;P&gt;I would use listenhttp with SSL, so in ListenHTTP (Properties ==&amp;gt; use : SSL Context Service)&lt;/P&gt;&lt;P&gt;On the Processor Group Configuration, I need use SSL so how keystore/truststore need to use?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="8810-listenthttp-properties.jpg" style="width: 794px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/21389i3E702D9B4A4F0EC5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="8810-listenthttp-properties.jpg" alt="8810-listenthttp-properties.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="8841-controller-service-pgc.jpg" style="width: 1225px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/21390i57CDEBAD7FE13B99/image-size/medium?v=v2&amp;amp;px=400" role="button" title="8841-controller-service-pgc.jpg" alt="8841-controller-service-pgc.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 18 Aug 2019 13:20:54 GMT</pubDate>
    <dc:creator>maykiwogno</dc:creator>
    <dc:date>2019-08-18T13:20:54Z</dc:date>
    <item>
      <title>[RESOLVED] : NIFI : LISTENHTTP SSL</title>
      <link>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146985#M109538</link>
      <description>&lt;P&gt;
	Hi all, &lt;/P&gt;&lt;P&gt;
	I'm trying use listenhttp with ssl.&lt;/P&gt;&lt;P&gt;
	I've read this post : &lt;A href="http://www.simonellistonball.com/technology/nifi-ssl-listenhttp/" target="_blank"&gt;http://www.simonellistonball.com/technology/nifi-ssl-listenhttp/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;But i don't know how use keystore from client. It is the same keystore than keystore used in nifi.properties ?&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 24 Oct 2016 16:36:35 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146985#M109538</guid>
      <dc:creator>maykiwogno</dc:creator>
      <dc:date>2016-10-24T16:36:35Z</dc:date>
    </item>
    <item>
      <title>Re: [RESOLVED] : NIFI : LISTENHTTP SSL</title>
      <link>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146986#M109539</link>
      <description>&lt;P&gt;Hi &lt;A rel="user" href="https://community.cloudera.com/users/10363/maykiwogno.html" nodeid="10363"&gt;@mayki wogno&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;If you're talking about a situation where you've got &lt;/P&gt;&lt;PRE&gt;nifi.security.needClientAuth=True&lt;/PRE&gt;&lt;P&gt;in your nifi.properties, then for the client, you probably want to generate a separate cert that has been signed by the same CA that your NiFi node(s) trust. I.e. either use the same self-managed CA (such as the one that Ambari installs for you) or use official (mostly paid) CA-signed certificates.&lt;/P&gt;&lt;P&gt;As a proof of concept though, it's certainly fine to re-use the same certs. &lt;/P&gt;&lt;P&gt;Your private key could well be in pkcs12 with a passphrase protecting it, but you should be able to convert it to an unprotected pem file using something like this.&lt;/P&gt;&lt;PRE&gt;[root@test-nifti conf] # openssl pkcs12 -in keystore.pkcs12 -out keystore.pem -nodes&lt;/PRE&gt;&lt;P&gt;
Then you can test connecting to itself using curl like so.&lt;/P&gt;&lt;PRE&gt;[root@test-nifti conf]# curl -v --cacert ./keys_test-nifti/nifi-cert.pem --cert ./keystore.pem &lt;A href="https://test-nifti.example.com:9443/nifi" target="_blank"&gt;https://test-nifti.example.com:9443/nifi&lt;/A&gt;
* About to connect() to test-nifti.example.com port 9443 (#0)
*   Trying 192.26.217.14...
* Connected to test-nifti.example.com (192.26.217.14) port 9443 (#0)
* Initializing NSS with certpath: sql:/etc/pki/nssdb
*   CAfile: ./keys_test-nifti/nifi-cert.pem
  CApath: none
* NSS: client certificate from file
*       subject: CN=test-nifti.example.com,OU=EXAMPLE.COM
*       start date: Oct 17 23:14:07 2016 GMT
*       expire date: Oct 17 23:14:07 2019 GMT
*       common name: test-nifti.example.com
*       issuer: CN=nifti-ca.example.com,OU=EXAMPLE.COM
* SSL connection using TLS_RSA_WITH_AES_256_CBC_SHA256
* Server certificate:
*       subject: CN=test-nifti.example.com,OU=EXAMPLE.COM
*       start date: Oct 17 23:14:07 2016 GMT
*       expire date: Oct 17 23:14:07 2019 GMT
*       common name: test-nifti.example.com
*       issuer: CN=nifti-ca.example.com,OU=EXAMPLE.COM
&amp;gt; GET /nifi HTTP/1.1
&amp;gt; User-Agent: curl/7.29.0
&amp;gt; Host: test-nifti.example.com:9443
&amp;gt; Accept: */*
&amp;gt; 
&amp;lt; HTTP/1.1 302 Found
&amp;lt; Date: Wed, 19 Oct 2016 12:33:50 GMT
&amp;lt; Location: &lt;A href="https://test-nifti.example.com:9443/nifi/" target="_blank"&gt;https://test-nifti.example.com:9443/nifi/&lt;/A&gt;
&amp;lt; Content-Length: 0
&amp;lt; Server: Jetty(9.3.9.v20160517)
&amp;lt; 
* Connection #0 to host test-nifti.example.com left intact
[root@test-nifti conf]#&lt;/PRE&gt;&lt;P&gt;You can also import that keystore into your browser, so that the NiFi node can authenticate you.&lt;/P&gt;&lt;P&gt;The point of using a separate certificate though, is that you are not sharing the NiFi node(s) “secret” to your clients but instead using the mutual trust of the CA. So make sure you’re using dedicated client certs if you’re doing anything more than basic testing.&lt;/P&gt;&lt;P&gt;Please upvote and accept if this answered your question :).&lt;/P&gt;</description>
      <pubDate>Mon, 24 Oct 2016 17:02:13 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146986#M109539</guid>
      <dc:creator>nlam</dc:creator>
      <dc:date>2016-10-24T17:02:13Z</dc:date>
    </item>
    <item>
      <title>Re: [RESOLVED] : NIFI : LISTENHTTP SSL</title>
      <link>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146987#M109540</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/10607/nlam.html" nodeid="10607"&gt;@Nik Lam&lt;/A&gt; : Need some details&lt;/P&gt;&lt;P&gt;In my cluster with 4 nodes, I've used nifi-toolkit for generating keystore/truststore + kerberos for accessing WEB UI. It is OK&lt;/P&gt;&lt;P&gt;In your example, where is come your file keystore?&lt;/P&gt;&lt;PRE&gt;keystore.pkcs12 &lt;/PRE&gt;</description>
      <pubDate>Mon, 24 Oct 2016 17:44:12 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146987#M109540</guid>
      <dc:creator>maykiwogno</dc:creator>
      <dc:date>2016-10-24T17:44:12Z</dc:date>
    </item>
    <item>
      <title>Re: [RESOLVED] : NIFI : LISTENHTTP SSL</title>
      <link>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146988#M109541</link>
      <description>&lt;P&gt;It was generated using nifi-toolkit as well with "-T pkcs12".&lt;/P&gt;</description>
      <pubDate>Mon, 24 Oct 2016 18:45:10 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146988#M109541</guid>
      <dc:creator>nlam</dc:creator>
      <dc:date>2016-10-24T18:45:10Z</dc:date>
    </item>
    <item>
      <title>Re: [RESOLVED] : NIFI : LISTENHTTP SSL</title>
      <link>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146989#M109542</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/10607/nlam.html" nodeid="10607" target="_blank"&gt;@Nik Lam&lt;/A&gt; : Oh sorry, i don't speak about connecting to web ui &lt;/P&gt;&lt;P&gt;I would use listenhttp with SSL, so in ListenHTTP (Properties ==&amp;gt; use : SSL Context Service)&lt;/P&gt;&lt;P&gt;On the Processor Group Configuration, I need use SSL so how keystore/truststore need to use?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="8810-listenthttp-properties.jpg" style="width: 794px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/21389i3E702D9B4A4F0EC5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="8810-listenthttp-properties.jpg" alt="8810-listenthttp-properties.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="8841-controller-service-pgc.jpg" style="width: 1225px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/21390i57CDEBAD7FE13B99/image-size/medium?v=v2&amp;amp;px=400" role="button" title="8841-controller-service-pgc.jpg" alt="8841-controller-service-pgc.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Aug 2019 13:20:54 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146989#M109542</guid>
      <dc:creator>maykiwogno</dc:creator>
      <dc:date>2019-08-18T13:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: [RESOLVED] : NIFI : LISTENHTTP SSL</title>
      <link>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146990#M109543</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/10363/maykiwogno.html" nodeid="10363"&gt;@mayki wogno&lt;/A&gt;&lt;/P&gt;&lt;P&gt;SSL Certificates are generally issued per server.  It would be extremely unusual to have multiple certificates issued for the same server or to issue certificates per piece of software.  I am not saying you can't, but unnecessary.&lt;/P&gt;&lt;P&gt;Having said that, when you installed NiFi via Ambari, The NIfI CA that was installed likely generated the certificates needed for all your servers where NiFi is running its nodes.  A quick look in the nifi.properties file for these jks files will reveal where to find them and the passwords for them as well (Default nifi.properties location on each node --&amp;gt; /etc/nifi/2.0.0.0-579/0/nifi.properties)&lt;/P&gt;&lt;P&gt;Now here is the hitch....  When the NiFi CA generates these keystores for your NiFi nodes, the keystore and truststore on every node end up with its own  unique password.  This will not work for the ssl context service you need to configure to make your ListenHTTP processor operate using SSL.  This is because the same identical ssl context service will be used by the listenHTTP processor on each node.&lt;/P&gt;&lt;P&gt;There is a little work that needs to be done on each node to get you setup here, I suggest you make a copy of the keystore.jks and truststore.jks files on every node in to some new directory. Then capture the following lines from the nifi.properties file on each node:&lt;/P&gt;&lt;PRE&gt;nifi.security.keyPasswd=&amp;lt;keypass&amp;gt; 
nifi.security.keystore=/&amp;lt;path&amp;gt;/keystore.jks 
nifi.security.keystorePasswd=&amp;lt;keystore-password&amp;gt; 
nifi.security.keystoreType=jks 
nifi.security.truststore=/&amp;lt;path&amp;gt;/truststore.jks 
nifi.security.truststorePasswd=&amp;lt;truststore-password&amp;gt;
nifi.security.truststoreType=jks&lt;/PRE&gt;&lt;P&gt;Lets assume you create a /opt/nifi-certs/ directory n every node and placed them there.  &lt;/P&gt;&lt;P&gt;Next you will want to use the keytool command to change the password on the copies so that nifi.security.keyPasswd= uses the same password on every node, nifi.security.keystorePasswd= uses the same password on every node, and  nifi.security.truststorePasswd= uses the same password on every node.  While the contents of each certificate is unique to the server, the passwords used to access that key and keystore will then all be the same.  This will allow you to configure your ssl-context service to use common passwords to access these server keystores on each node.&lt;/P&gt;&lt;P&gt;Below are the command you can use to change the keystore/trustore passwords and the key passwords within the keystore files.&lt;/P&gt;&lt;P&gt;For each keystore do the following:&lt;/P&gt;&lt;PRE&gt;keytool -storepasswd -new &amp;lt;new_storepass&amp;gt; -keystore keystore.jks  &lt;/PRE&gt;&lt;P&gt;(Make sure you use the same &amp;lt;new_storepass&amp;gt; on every node in your nifi cluster.&lt;/P&gt;&lt;PRE&gt;keytool -keypasswd  -alias [Alias name for private key]  -keystore [path to key store]&lt;/PRE&gt;&lt;P&gt;(If you don't know your private key &amp;lt;alias&amp;gt;, you can get it by running the following command against your keystore.jks file. You will be prompted for yoru &amp;lt;new_storepassword&amp;gt; and the original &amp;lt;key-password&amp;gt;, and then allowed to set a &amp;gt;new-key-password&amp;gt;)&lt;/P&gt;&lt;PRE&gt;keytool -v --list -keystore keystore.jks&lt;/PRE&gt;&lt;P&gt;For each Truststore do the following:&lt;/P&gt;&lt;PRE&gt;keytool -storepasswd -new &amp;lt;new_trustpass&amp;gt; -keystore truststore.jks  &lt;/PRE&gt;&lt;P&gt;(Make sure you use the same &amp;lt;new_trustpass&amp;gt; on every node in your nifi cluster.&lt;/P&gt;&lt;P&gt;After you have completed the above on every node you are ready to configure and start using the ssl-context service.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Mon, 24 Oct 2016 19:45:47 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146990#M109543</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2016-10-24T19:45:47Z</dc:date>
    </item>
    <item>
      <title>Re: [RESOLVED] : NIFI : LISTENHTTP SSL</title>
      <link>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146991#M109544</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/525/mclark.html" nodeid="525"&gt;@mclark&lt;/A&gt; : Oh thanks, I appreciate it.&lt;/P&gt;&lt;P&gt;Just for clear, for each node, I'll copy theirs own keystore/truststore in specific directory and change their passwd with same passwd for all nodes&lt;/P&gt;&lt;P&gt;Need I change something in the client with curl command?&lt;/P&gt;&lt;PRE&gt;curl -X POST -H 'Content-Type: application/json' -H 'filename: gstat-flume-a1.log.10' -F file=@/var/opt/hosting/log/flume/flume-a1.log.10 &lt;A href="http://nifi011:10001/contentListener" target="_blank"&gt;http://nifi011:10001/contentListener&lt;/A&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 24 Oct 2016 20:37:55 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146991#M109544</guid>
      <dc:creator>maykiwogno</dc:creator>
      <dc:date>2016-10-24T20:37:55Z</dc:date>
    </item>
    <item>
      <title>Re: [RESOLVED] : NIFI : LISTENHTTP SSL</title>
      <link>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146992#M109545</link>
      <description>&lt;P&gt;So you created .pkcs12 keystores instead of JKS keystores.&lt;/P&gt;&lt;P&gt;That is fine....
try using the below command to change passwords:
&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;keytool -importkeystore -srckeystore keystore.pkcs12 -srcstoretype PKCS12 -srcstorepass 123456 -destkeystore keystore-new.pkcs12 -deststoretype PKCS12 -deststorepass 11223344 &lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;or the following to change it to jks with new password:&lt;/P&gt;&lt;PRE&gt;keytool -importkeystore -srckeystore &amp;lt;keystore.pkcs12&amp;gt; -srcstoretype pkcs12
 -srcalias &amp;lt;alias&amp;gt; -destkeystore &amp;lt;keystore.jks&amp;gt;
 -deststoretype jks -deststorepass &amp;lt;new-password&amp;gt; -destalias &amp;lt;alias&amp;gt;&lt;/PRE&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Mon, 24 Oct 2016 21:40:56 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146992#M109545</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2016-10-24T21:40:56Z</dc:date>
    </item>
    <item>
      <title>Re: [RESOLVED] : NIFI : LISTENHTTP SSL</title>
      <link>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146993#M109546</link>
      <description>&lt;P&gt;Your client curl command would not be pointing at a secure &lt;A href="https://"&gt;https://&lt;/A&gt;nifi011:10001/contentListener end-point and will need its own certificate to present in this connection.  You can use the toolkit to generate another pkcs12 keystore that your connecting client can use. That way it gets signed by the same CA.&lt;/P&gt;&lt;P&gt;here is some useful information on this topic:&lt;/P&gt;&lt;P&gt;&lt;A href="http://callistaenterprise.se/blogg/teknik/2011/04/04/curl-mutual-authentication-and-web-services/" target="_blank"&gt;http://callistaenterprise.se/blogg/teknik/2011/04/04/curl-mutual-authentication-and-web-services/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Oct 2016 21:50:28 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146993#M109546</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2016-10-24T21:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: [RESOLVED] : NIFI : LISTENHTTP SSL</title>
      <link>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146994#M109547</link>
      <description>&lt;P&gt; &lt;A rel="user" href="https://community.cloudera.com/users/525/mclark.html" nodeid="525" target="_blank"&gt;@mclark&lt;/A&gt;&lt;/P&gt;&lt;P&gt;
 
 I've changed my configuration Controller Service but I'm running an issue&lt;/P&gt;&lt;P&gt;
 
 I've checked all truststore/keystore on all the cluster, their use same passwd&lt;/P&gt;&lt;P&gt;
 &lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="8953-controller-service-ssl.jpg" style="width: 584px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/21387iDAF9A7FF95124C97/image-size/medium?v=v2&amp;amp;px=400" role="button" title="8953-controller-service-ssl.jpg" alt="8953-controller-service-ssl.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;
 &lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="8954-ssl-error-01.jpg" style="width: 708px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/21388i1DF559FD1F85959A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="8954-ssl-error-01.jpg" alt="8954-ssl-error-01.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Aug 2019 13:20:41 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146994#M109547</guid>
      <dc:creator>maykiwogno</dc:creator>
      <dc:date>2019-08-18T13:20:41Z</dc:date>
    </item>
    <item>
      <title>Re: [RESOLVED] : NIFI : LISTENHTTP SSL</title>
      <link>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146995#M109548</link>
      <description>&lt;P&gt;It does not look like you provided you key password.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2016 18:14:59 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146995#M109548</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2016-10-28T18:14:59Z</dc:date>
    </item>
    <item>
      <title>Re: [RESOLVED] : NIFI : LISTENHTTP SSL</title>
      <link>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146996#M109549</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/525/mclark.html" nodeid="525"&gt;@mclark&lt;/A&gt; &lt;/P&gt;&lt;P&gt;Now that ContextServiceSSL was enabled. I need to generate keystore for my client/user ?&lt;/P&gt;</description>
      <pubDate>Mon, 31 Oct 2016 15:34:33 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146996#M109549</guid>
      <dc:creator>maykiwogno</dc:creator>
      <dc:date>2016-10-31T15:34:33Z</dc:date>
    </item>
    <item>
      <title>Re: [RESOLVED] : NIFI : LISTENHTTP SSL</title>
      <link>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146997#M109550</link>
      <description>&lt;P style="margin-left: 20px;"&gt;&lt;A rel="user" href="https://community.cloudera.com/users/525/mclark.html" nodeid="525"&gt;@mclark&lt;/A&gt;&lt;/P&gt;&lt;P style="margin-left: 20px;"&gt;I've found that was wrong in my config. Before changing storepass for keystore.jks. I need to change keypasswd for private key first &lt;/P&gt;&lt;P style="margin-left: 20px;"&gt;So Step 1 :&lt;/P&gt;&lt;PRE&gt;keytool -keypasswd  -alias [Alias name for private key]  -keystore [path to key store]&lt;/PRE&gt;&lt;P&gt;Step 2 :&lt;/P&gt;&lt;PRE&gt;keytool -storepasswd -new &amp;lt;new_storepass&amp;gt; -keystore keystore.jks
&lt;/PRE&gt;&lt;P&gt;Now It works&lt;/P&gt;&lt;P&gt;Thanks &lt;A rel="user" href="https://community.cloudera.com/users/525/mclark.html" nodeid="525"&gt;@mclark&lt;/A&gt; &lt;/P&gt;</description>
      <pubDate>Mon, 31 Oct 2016 16:26:34 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146997#M109550</guid>
      <dc:creator>maykiwogno</dc:creator>
      <dc:date>2016-10-31T16:26:34Z</dc:date>
    </item>
    <item>
      <title>Re: [RESOLVED] : NIFI : LISTENHTTP SSL</title>
      <link>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146998#M109551</link>
      <description>&lt;P&gt;ListenHTTP requires 2-way SSL when enabled.  So the client will also need a keystore and truststore.  The Truststore on both your client and server will need to contain the trusted cert entry for each others client cert.  If you used the same CA for both then you should be good.  If not you will need to add the CA or trusted key entry (Public key from each private key entry.) to each others Truststores.&lt;/P&gt;</description>
      <pubDate>Mon, 31 Oct 2016 20:03:03 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/146998#M109551</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2016-10-31T20:03:03Z</dc:date>
    </item>
    <item>
      <title>Re: [RESOLVED] : NIFI : LISTENHTTP SSL</title>
      <link>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/277486#M207574</link>
      <description>&lt;P&gt;Hi Mat,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry to post my question here not getting the way out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have configured SSL with CA signed certs on the Server.By CA signed i mean actual CA and not NIFI CA.&lt;/P&gt;&lt;P&gt;I am using Nifi on a single machine without Ambari.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now i want a client to authenticate and use nifi , how to create the client cert so that it authenticates to the CA signed cert on server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2019 09:42:28 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/277486#M207574</guid>
      <dc:creator>shariquealam786</dc:creator>
      <dc:date>2019-09-17T09:42:28Z</dc:date>
    </item>
    <item>
      <title>Re: [RESOLVED] : NIFI : LISTENHTTP SSL</title>
      <link>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/289200#M214108</link>
      <description>&lt;P&gt;Want to add some clarity to this last comment:&lt;BR /&gt;&lt;BR /&gt;ListenHTTP requires 2-way TLS when enabled if a SSLContextService has been configured with a truststore.&amp;nbsp; The truststore is used to trust the client certificate presented by the client, for the purpose of authentication, connecting to this secured ListenHTTP processor.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If only a keystore and no truststore is configured in the SSLContext service, the ListenHTTP will &lt;U&gt;not&lt;/U&gt; require that clients present a client certificate.&lt;BR /&gt;&lt;BR /&gt;The server certificate from the keystore will be presented to the client so the client can verify that it trusts the server (NiFI listenHTTP jetty server) that it is connecting with.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 16:00:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/RESOLVED-NIFI-LISTENHTTP-SSL/m-p/289200#M214108</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2020-02-05T16:00:39Z</dc:date>
    </item>
  </channel>
</rss>

