<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Apache NiFi using non self-signed certificates in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Apache-NiFi-using-non-self-signed-certificates/m-p/238558#M200369</link>
    <description>&lt;P&gt;Awesome, that worked! Thanks for the help, I appreciate it!&lt;/P&gt;</description>
    <pubDate>Thu, 25 Apr 2019 01:04:59 GMT</pubDate>
    <dc:creator>davis_tran</dc:creator>
    <dc:date>2019-04-25T01:04:59Z</dc:date>
    <item>
      <title>Apache NiFi using non self-signed certificates</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Apache-NiFi-using-non-self-signed-certificates/m-p/238555#M200366</link>
      <description>&lt;P&gt;Please keep in mind I am in no way savvy in "this stuff" at all, so please bare with me.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue&lt;/STRONG&gt;: I am still receiving &lt;STRONG&gt;"Your connection is not private"&lt;/STRONG&gt; / &lt;STRONG&gt;"NET::ERR_CERT_AUTHORITY_INVALID"&lt;/STRONG&gt; when accessing the NiFi web UI that I have installed on a Linux server even though I set it up with a certificate provided by my company (I believe did something wrong here).&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Goal&lt;/STRONG&gt;: Anyone who tries to access the web UI will be met with the NiFi Login screen (this part is already setup with LDAP) without having to import a certificate instead of the warning/secure ("Your connection is not private") page. I think it's important to know that I have it working fine with self-signed certificate and importing the certificate into my browser.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Summary (Please read this knowing that my understanding of the subject is very minimal)&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;1. I generated a CSR and keystore.jks (from what I understand contains the private key) with the following command:&lt;/P&gt;&lt;PRE&gt;keytool -genkey -alias server -keyalg RSA -keysize 2048 -keystore keystore.jks -dname "CN={&lt;!-- --&gt;{domain data here}}" &amp;amp;&amp;amp; keytool -certreq -alias server -file nifi.csr -keystore keystore.jks &amp;amp;&amp;amp; echo Your certificate signing request is in nifi.csr. &amp;nbsp;Your keystore file is keystore.jks. &amp;nbsp;Thanks for using the DigiCert keytool CSR helper.&lt;/PRE&gt;&lt;P&gt;2. Forwarded the generated CSR to our company CA and they sent back 4 following files:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;nifi.cer&lt;/LI&gt;&lt;LI&gt;nifi.p7b&lt;/LI&gt;&lt;LI&gt;root-CA.cer&lt;/LI&gt;&lt;LI&gt;issuing-CA.cer&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;3. Generated a truststore.jks (with a temp alias and removed it) and imported the nifi.cer into it&lt;/P&gt;&lt;PRE&gt;keytool -import -alias server -file "nifi.cer" -keystore -truststore.jks&lt;/PRE&gt;&lt;P&gt;4. Placed the truststore and keystore files into the &lt;STRONG&gt;conf directory &lt;/STRONG&gt;of NiFi on the server and updated the &lt;EM&gt;# security properties #&lt;/EM&gt; in &lt;STRONG&gt;nifi.properties &lt;/STRONG&gt;to reflect the keystore and truststore files.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Please let me know if I did something wrong or I misunderstood something.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 14:19:13 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Apache-NiFi-using-non-self-signed-certificates/m-p/238555#M200366</guid>
      <dc:creator>davis_tran</dc:creator>
      <dc:date>2022-09-16T14:19:13Z</dc:date>
    </item>
    <item>
      <title>Re: Apache NiFi using non self-signed certificates</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Apache-NiFi-using-non-self-signed-certificates/m-p/238556#M200367</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/595/alopresto.html" nodeid="595"&gt;@Andy LoPresto&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Sorry to bother you, but I see that you have answered other posts that have similar issues to mine and I was hoping you could help out. Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 19 Apr 2019 03:03:38 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Apache-NiFi-using-non-self-signed-certificates/m-p/238556#M200367</guid>
      <dc:creator>davis_tran</dc:creator>
      <dc:date>2019-04-19T03:03:38Z</dc:date>
    </item>
    <item>
      <title>Re: Apache NiFi using non self-signed certificates</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Apache-NiFi-using-non-self-signed-certificates/m-p/238557#M200368</link>
      <description>&lt;P&gt;Hi Davis, &lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I imagine the issue is that the server certificate that was signed by your organizational CA doesn't include the (intermediate or root) CA public certificates. It appears they (the signing team) sent those to you in addition as separate files. My expectation is that if you run the command &lt;CODE&gt;more issuing-CA.cer&lt;/CODE&gt; or &lt;CODE&gt;more root-CA.cer&lt;/CODE&gt;, you will get an output like this:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;/P&gt;&lt;PRE&gt;-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;If you then run this command &lt;CODE&gt;openssl x509 -in issuing-CA.cer -text -noout&lt;/CODE&gt; (verifies the certificate is parsable), you should get output like this:&lt;/P&gt;&lt;PRE&gt;Certificate:
&amp;nbsp; &amp;nbsp; Data:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Version: 3 (0x2)
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Serial Number: 1 (0x1)
&amp;nbsp; &amp;nbsp; Signature Algorithm: sha256WithRSAEncryption
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Issuer: C=US, ST=California, L=Santa Monica, O=Apache, OU=NiFi, CN=Example NiFi CA/emailAddress=example@nifi.apache.org
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Validity
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Not Before: Oct 27 00:10:07 2016 GMT
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Not After : Jul 24 00:10:07 2019 GMT
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Subject: C=US, ST=CA, L=Santa Monica, O=Apache, OU=NiFi, CN=nifi.apache.org
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Subject Public Key Info:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Public Key Algorithm: rsaEncryption
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Public-Key: (2048 bit)
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Modulus:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 00:99:80:ee:79:34:f7:34:83:57:48:74:f2:9a:09:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; c0:2f:68:a5:b1:bc:d9:da:75:28:7f:70:d0:ed:3a:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 1f:65:7f:59:9f:9a:f5:70:47:32:25:cd:14:f5:bc:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 09:0e:43:c4:5d:7c:2f:37:9e:f8:5a:22:f9:b7:15:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 4a:57:e2:d9:2f:e9:ea:25:25:a5:35:2b:6f:06:23:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 1b:67:87:8c:ed:4b:b0:1f:d2:0f:9b:fd:fa:ca:87:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; e1:91:ea:82:a0:50:4e:47:81:38:3b:22:6d:02:c4:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; d1:b3:bc:a3:a7:bd:98:c3:8e:04:1e:95:75:c6:35:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 71:5c:19:c0:70:2b:9c:90:ac:14:93:5f:bd:43:f8:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 23:fe:95:66:b0:c7:e8:af:d6:f2:b6:8a:a9:ed:f8:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; a2:62:5a:90:da:aa:51:57:1d:7a:fb:ea:60:d8:94:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; c8:30:29:4c:f3:ef:84:23:af:32:2b:0a:1f:30:32:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; de:24:6d:0f:73:1c:4d:d2:5b:c5:f9:cf:3a:52:80:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 33:5c:22:87:0f:b7:09:c9:3c:d3:47:a3:e9:74:16:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 2e:39:76:6b:10:13:a3:f6:84:2f:08:26:8d:f6:79:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 10:fb:b6:70:4c:dd:be:ef:c5:0a:c4:f7:cb:d8:1b:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 58:b0:1c:ff:6e:18:c2:95:59:8e:57:30:12:9d:c2:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 93:4b
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Exponent: 65537 (0x10001)
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; X509v3 extensions:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; X509v3 Subject Key Identifier:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 96:02:F9:1D:BE:53:F0:D9:10:C9:B8:53:41:46:92:6E:7D:E4:63:B3
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; X509v3 Authority Key Identifier:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; keyid:44:D8:A0:AA:3F:8D:24:1D:66:A0:EE:A0:2E:04:9F:DB:C5:EB:43:CA

&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; X509v3 Basic Constraints:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; CA:FALSE
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; X509v3 Key Usage:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Digital Signature, Key Encipherment
&amp;nbsp; &amp;nbsp; Signature Algorithm: sha256WithRSAEncryption
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;85:90:6f:02:a3:48:1a:6c:89:d2:35:ff:85:e6:6d:8e:ec:5f:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;d8:6a:95:21:b6:63:fa:59:41:37:22:f5:b5:a2:64:d7:6e:9a:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;bc:e2:12:cb:d6:9b:0f:64:aa:7d:64:2c:d2:79:52:cb:bc:39:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;dc:29:08:9e:85:42:0b:7b:73:77:13:e3:02:a1:25:12:ed:37:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;79:88:ec:13:62:2e:dd:dd:55:d3:42:98:55:c4:c3:a4:e3:6f:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;68:83:66:24:cd:70:31:e3:2a:df:4d:ed:f5:38:54:78:f9:ea:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;f4:96:50:11:c0:02:52:7f:17:30:6d:88:87:f6:0f:3b:ef:cb:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;de:05:d1:ed:ee:52:51:16:cd:6d:2a:e6:0f:d1:0a:d2:48:45:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;d4:30:91:d5:f1:2c:0f:20:dc:95:1d:0c:e5:06:a6:a6:65:d9:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;90:5a:9e:ee:77:29:88:f6:ef:7d:77:59:2c:78:35:52:3b:e0:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;52:8c:53:71:3f:83:d6:e6:41:c0:1d:fd:a7:8f:b2:7d:aa:3f:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;b6:67:34:c2:9a:74:24:54:3a:5a:30:2c:cc:9f:b3:1c:55:e1:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;13:69:43:d9:87:4c:ad:51:2c:0d:46:a2:d1:e8:55:25:c5:78:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;83:9e:4a:8d:64:9f:0f:4f:0b:5d:1d:70:db:99:62:b9:18:d5:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;a3:a1:c6:38:bf:3d:8c:45:5e:fd:1e:29:e3:ba:ed:94:6c:1e:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;01:ef:05:70:49:d7:56:cf:89:45:0a:69:32:d5:5e:9f:55:7f:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;ae:e2:7a:32:44:5d:52:53:68:85:07:e9:f1:8a:f5:85:8d:a8:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;17:ec:dd:d1:1b:17:c4:15:51:08:01:9e:c4:95:32:d1:53:75:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;e0:98:af:66:d1:f6:9d:c5:01:eb:43:a4:c3:b6:b7:cf:3d:08:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;a4:ab:eb:69:86:f6:d7:c5:b9:4e:a7:85:e6:5d:31:e7:c8:1a:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;82:be:4f:72:ea:98:3e:77:b1:b6:f1:6b:8a:79:ff:e3:7a:af:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;a1:ae:1a:67:0b:19:9e:59:a9:88:3e:c8:1c:cf:d3:c3:bf:e5:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;1c:ad:7a:21:fa:86:fb:ec:85:9d:66:17:63:3a:c5:2f:3f:7c:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;45:5a:0e:64:8f:89:80:78:36:77:1b:82:ce:68:dd:cf:f3:96:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0e:b3:3d:91:9e:69:61:eb:ee:f5:57:22:6d:ca:19:cd:3e:d8:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;d6:20:4f:c0:c7:1d:0f:ba:23:90:8c:51:11:c3:4c:2f:96:11:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;d5:fd:54:45:24:b7:af:08:a1:4b:39:f2:2d:f6:c7:3a:8f:62:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;42:04:d5:66:89:89:74:c9:72:e3:56:58:03:7c:95:32:f4:cb:
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;8b:b5:24:e1:94:1c:3a:53&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;The next step is to concatenate all the public certificates into a single file so it can be imported into the keystore.jks. That way when the application (NiFi) presents its public certificate to the browser, it also presents the "certificate chain" that shows NiFi cert (signed by) Issuing CA (signed by) Root CA, and (hopefully) Root CA is already present in the client truststores (i.e. the browser/OS), or is signed by a global CA certificate (a commercial entity like Verisign, Comodo, etc.) that is already in those truststores. &lt;/P&gt;&lt;P&gt;Basically the steps you need to take are:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Copy the contents of all three "&lt;CODE&gt;*.cer&lt;/CODE&gt;" files you received into a single text file (include the "&lt;CODE&gt;-----BEGIN CERTIFICATE-----&lt;/CODE&gt;" and "&lt;CODE&gt;-----END CERTIFICATE-----&lt;/CODE&gt;" lines for each) called "&lt;CODE&gt;chain.pem&lt;/CODE&gt;". It should look like:&lt;OL&gt;&lt;LI&gt;&lt;CODE&gt;-----BEGIN CERTIFICATE-----&lt;BR /&gt;Abcd...&lt;BR /&gt;-----END CERTIFICATE-----&lt;BR /&gt;-----BEGIN CERTIFICATE-----&lt;BR /&gt;1234...&lt;BR /&gt;-----END CERTIFICATE-----&lt;BR /&gt;-----BEGIN CERTIFICATE-----&lt;BR /&gt;Wxyz...&lt;BR /&gt;-----END CERTIFICATE-----&lt;/CODE&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;Import this signed certificate chain into the keystore using the same alias as the private key that already exists (appears to be &lt;CODE&gt;server&lt;/CODE&gt; based on your question above)&lt;OL&gt;&lt;LI&gt;&lt;CODE&gt;keytool -import -trustcacerts -alias server -file chain.pem -keystore keystore.jks&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Fri, 19 Apr 2019 03:27:31 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Apache-NiFi-using-non-self-signed-certificates/m-p/238557#M200368</guid>
      <dc:creator>alopresto</dc:creator>
      <dc:date>2019-04-19T03:27:31Z</dc:date>
    </item>
    <item>
      <title>Re: Apache NiFi using non self-signed certificates</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Apache-NiFi-using-non-self-signed-certificates/m-p/238558#M200369</link>
      <description>&lt;P&gt;Awesome, that worked! Thanks for the help, I appreciate it!&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2019 01:04:59 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Apache-NiFi-using-non-self-signed-certificates/m-p/238558#M200369</guid>
      <dc:creator>davis_tran</dc:creator>
      <dc:date>2019-04-25T01:04:59Z</dc:date>
    </item>
    <item>
      <title>Re: Apache NiFi using non self-signed certificates</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Apache-NiFi-using-non-self-signed-certificates/m-p/238559#M200370</link>
      <description>&lt;P&gt;Hey &lt;A rel="user" href="https://community.cloudera.com/users/595/alopresto.html" nodeid="595"&gt;@Andy LoPresto&lt;/A&gt;, now that I have this secure instance setup how would I go about Site-to-Site communication with another secure NiFi instance?&lt;BR /&gt;&lt;BR /&gt;These are the list of certificates I have:&lt;BR /&gt;&lt;BR /&gt;NiFi Instance A:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;nifi.cer&lt;/LI&gt;&lt;LI&gt;nifi.p7b&lt;/LI&gt;&lt;LI&gt;root-CA.cer&lt;/LI&gt;&lt;LI&gt;issuing-CA.cer&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Nifi Instance B:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;nifi.cer&lt;/LI&gt;&lt;LI&gt;nifi.p7b&lt;/LI&gt;&lt;LI&gt;root-CA.cer&lt;/LI&gt;&lt;LI&gt;issuing-CA.cer&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Do you know of any resources that would help me with the subject of matter at hand and what you would call it (SSL? TLS? Installing Certificates?)? I am having trouble understanding what my issue is to know what to research to learn enough so that I can avoid asking questions that have already been answered.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Sat, 27 Apr 2019 22:53:22 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Apache-NiFi-using-non-self-signed-certificates/m-p/238559#M200370</guid>
      <dc:creator>davis_tran</dc:creator>
      <dc:date>2019-04-27T22:53:22Z</dc:date>
    </item>
    <item>
      <title>Re: Apache NiFi using non self-signed certificates</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Apache-NiFi-using-non-self-signed-certificates/m-p/330531#M230703</link>
      <description>&lt;P&gt;How to download the tool, is there a free one?&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 05:54:28 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Apache-NiFi-using-non-self-signed-certificates/m-p/330531#M230703</guid>
      <dc:creator>gnat</dc:creator>
      <dc:date>2021-11-19T05:54:28Z</dc:date>
    </item>
  </channel>
</rss>

