<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Cannot got  login page when i enable ssl &amp;amp; ldap in nifi  registry with cloudera flow manager 1.0.1 in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Cannot-got-login-page-when-i-enable-ssl-amp-ldap-in-nifi/m-p/281904#M209648</link>
    <description>&lt;P&gt;Update:&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the below is the log:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;2019-11-03 20:06:10,531 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.IdentityFilter Attempting to extract user credentials using X509IdentityProvider
2019-11-03 20:06:10,531 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.IdentityFilter Adding credentials claim to SecurityContext to be authenticated. Credentials extracted by X509IdentityProvider: AuthenticationRequest{username='CN=arch-fndtf04.beta1.fn, OU=NIFI', credentials=[PROTECTED], details=null}
2019-11-03 20:06:10,531 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.IdentityFilter Credentials already extracted for [org.apache.nifi.registry.web.security.authentication.AuthenticationRequestToken$1@39a29a41], skipping credentials extraction filter using JwtIdentityProvider
2019-11-03 20:06:10,532 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.ResourceAuthorizationFilter Request filter authorization check is not required for this HTTP Method on this resource. Allowing request to proceed. An additional authorization check might be performed downstream of this filter.
2019-11-03 20:06:10,688 INFO [NiFi Registry Web Server-12] o.a.n.r.w.m.IllegalStateExceptionMapper java.lang.IllegalStateException: Kerberos service ticket login not supported by this NiFi Registry. Returning Conflict response.
2019-11-03 20:06:10,691 DEBUG [NiFi Registry Web Server-12] o.a.n.r.w.m.IllegalStateExceptionMapper 
java.lang.IllegalStateException: Kerberos service ticket login not supported by this NiFi Registry
	at org.apache.nifi.registry.web.api.AccessResource.createAccessTokenUsingKerberosTicket(AccessResource.java:285) ~[classes/:na]
......

2019-11-03 20:06:10,721 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.IdentityFilter Attempting to extract user credentials using X509IdentityProvider
2019-11-03 20:06:10,722 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.IdentityFilter Adding credentials claim to SecurityContext to be authenticated. Credentials extracted by X509IdentityProvider: AuthenticationRequest{username='CN=arch-fndtf04.beta1.fn, OU=NIFI', credentials=[PROTECTED], details=null}
2019-11-03 20:06:10,722 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.IdentityFilter Credentials already extracted for [org.apache.nifi.registry.web.security.authentication.AuthenticationRequestToken$1@2929ad59], skipping credentials extraction filter using JwtIdentityProvider
2019-11-03 20:06:10,723 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.ResourceAuthorizationFilter Request filter authorization check is not required for this HTTP Method on this resource. Allowing request to proceed. An additional authorization check might be performed downstream of this filter.
2019-11-03 20:06:10,784 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.IdentityFilter Attempting to extract user credentials using X509IdentityProvider
2019-11-03 20:06:10,784 DEBUG [NiFi Registry Web Server-17] o.a.n.r.w.s.a.IdentityFilter Attempting to extract user credentials using X509IdentityProvider
2019-11-03 20:06:10,784 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.IdentityFilter Adding credentials claim to SecurityContext to be authenticated. Credentials extracted by X509IdentityProvider: AuthenticationRequest{username='CN=arch-fndtf04.beta1.fn, OU=NIFI', credentials=[PROTECTED], details=null}
2019-11-03 20:06:10,784 DEBUG [NiFi Registry Web Server-17] o.a.n.r.w.s.a.IdentityFilter Adding credentials claim to SecurityContext to be authenticated. Credentials extracted by X509IdentityProvider: AuthenticationRequest{username='CN=arch-fndtf04.beta1.fn, OU=NIFI', credentials=[PROTECTED], details=null}
2019-11-03 20:06:10,784 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.IdentityFilter Credentials already extracted for [org.apache.nifi.registry.web.security.authentication.AuthenticationRequestToken$1@7bf82c3a], skipping credentials extraction filter using JwtIdentityProvider
2019-11-03 20:06:10,784 DEBUG [NiFi Registry Web Server-17] o.a.n.r.w.s.a.IdentityFilter Credentials already extracted for [org.apache.nifi.registry.web.security.authentication.AuthenticationRequestToken$1@69275fb3], skipping credentials extraction filter using JwtIdentityProvider
2019-11-03 20:06:10,785 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.ResourceAuthorizationFilter Request filter authorization check is not required for this HTTP Method on this resource. Allowing request to proceed. An additional authorization check might be performed downstream of this filter.
2019-11-03 20:06:10,785 DEBUG [NiFi Registry Web Server-17] o.a.n.r.w.s.a.ResourceAuthorizationFilter Request filter authorization check is not required for this HTTP Method on this resource. Allowing request to proceed. An additional authorization check might be performed downstream of this filter.&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The below is my configurations:&lt;/P&gt;&lt;P&gt;nifi-registry.properties&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nifi.registry.db.directory=
nifi.registry.db.driver.class=org.h2.Driver
nifi.registry.db.driver.directory=
nifi.registry.db.maxConnections=5
nifi.registry.db.password=UqZCvEAQeGvUUIGH||82ibCgtpV4JUhkFCnxQkW7kXxkmkHrc
nifi.registry.db.password.protected=aes/gcm/256
nifi.registry.db.sql.debug=false
nifi.registry.db.url=jdbc:h2:/var/lib/nifiregistry/database/nifi-registry-primary;AUTOCOMMIT=OFF;DB_CLOSE_ON_EXIT=FALSE;LOCK_MODE=3;LOCK_TIMEOUT=25000;WRITE_DELAY=0;AUTO_SERVER=FALSE
nifi.registry.db.url.append=
nifi.registry.db.username=nifireg
nifi.registry.initial.admin.identity=*******
nifi.registry.kerberos.krb5.file=/etc/krb5.conf
nifi.registry.kerberos.service.keytab.location=/var/run/cloudera-scm-agent/process/238-nifiregistry-NIFI_REGISTRY_SERVER/nifiregistry.keytab
nifi.registry.kerberos.spnego.authentication.expiration=12 hours
nifi.registry.kerberos.spnego.keytab.location=/var/run/cloudera-scm-agent/process/238-nifiregistry-NIFI_REGISTRY_SERVER/nifiregistry.keytab
nifi.registry.providers.configuration.file=/var/run/cloudera-scm-agent/process/238-nifiregistry-NIFI_REGISTRY_SERVER/providers.xml
nifi.registry.security.authorizer=managed-authorizer
nifi.registry.security.authorizers.configuration.file=/var/run/cloudera-scm-agent/process/238-nifiregistry-NIFI_REGISTRY_SERVER/authorizers.xml
nifi.registry.security.identity.provider=ldap-provider
nifi.registry.security.identity.providers.configuration.file=/var/run/cloudera-scm-agent/process/238-nifiregistry-NIFI_REGISTRY_SERVER/identity-providers.xml
nifi.registry.security.keyPasswd=cpDNEjgeOtHgUKBg||/TtGPhbQyltKWVvH9Cj7rj3ZVYZO
nifi.registry.security.keyPasswd.protected=aes/gcm/256
nifi.registry.security.keystore=/var/lib/nifiregistry/cert/keystore.jks
nifi.registry.security.keystorePasswd=QgccvlFai9XXLFUB||Pgu0W6X+BYYSPCiu1drPcqtWIru7
nifi.registry.security.keystorePasswd.protected=aes/gcm/256
nifi.registry.security.keystoreType=jks
nifi.registry.security.needClientAuth=true
nifi.registry.security.truststore=/var/lib/nifiregistry/cert/truststore.jks
nifi.registry.security.truststorePasswd=TKpFfRmNkxQD5xqg||IY8IZookjPjKpGiKiTplZpvmkMRB
nifi.registry.security.truststorePasswd.protected=aes/gcm/256
nifi.registry.security.truststoreType=jks
nifi.registry.sensitive.props.additional.keys=nifi.registry.db.password
nifi.registry.web.http.host=
nifi.registry.web.http.port=
nifi.registry.web.https.host=arch-fndtf03.beta1.fn
nifi.registry.web.https.port=18433
nifi.registry.web.jetty.threads=200
nifi.registry.web.jetty.working.directory=/var/lib/nifiregistry/work/jetty
nifi.registry.web.war.directory=/opt/cloudera/parcels/CFM-1.0.1.0/REGISTRY/lib&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;identity-providers.xml:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;identityProviders&amp;gt;

    &amp;lt;provider&amp;gt;
        &amp;lt;identifier&amp;gt;kerberos-identity-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.registry.web.security.authentication.kerberos.KerberosIdentityProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Authentication Expiration"&amp;gt;12 hours&amp;lt;/property&amp;gt;
        &amp;lt;property name="Default Realm"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Enable Debug"&amp;gt;false&amp;lt;/property&amp;gt;
        
    &amp;lt;/provider&amp;gt;

    &amp;lt;provider&amp;gt;
        &amp;lt;identifier&amp;gt;ldap-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.registry.security.ldap.LdapIdentityProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="User Search Base"&amp;gt;***&amp;lt;/property&amp;gt;
        &amp;lt;property name="Connect Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;
        &amp;lt;property encryption="aes/gcm/256" name="Manager Password"&amp;gt;**&amp;lt;/property&amp;gt;
        &amp;lt;property name="Authentication Strategy"&amp;gt;SIMPLE&amp;lt;/property&amp;gt;
        &amp;lt;property name="Manager DN"&amp;gt;**&amp;lt;/property&amp;gt;
        &amp;lt;property name="Referral Strategy"&amp;gt;FOLLOW&amp;lt;/property&amp;gt;
        &amp;lt;property name="Identity Strategy"&amp;gt;USE_USERNAME&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Search Filter"&amp;gt;cn={0}&amp;lt;/property&amp;gt;
        &amp;lt;property name="Authentication Expiration"&amp;gt;12 hours&amp;lt;/property&amp;gt;
        &amp;lt;property name="Read Timeout"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Url"&amp;gt;**&amp;lt;/property&amp;gt;
        
    &amp;lt;/provider&amp;gt;

&amp;lt;/identityProviders&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;authorizations.xml&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;?xml version="1.0" encoding="UTF-8" standalone="yes"?&amp;gt;
&amp;lt;authorizations&amp;gt;
    &amp;lt;policies&amp;gt;
        &amp;lt;policy identifier="627410be-1717-35b4-a06f-e9362b89e0b7" resource="/tenants" action="R"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="15e4e0bd-cb28-34fd-8587-f8d15162cba5" resource="/tenants" action="W"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="2dbc92a2-b091-3616-8e88-5078b9103b04" resource="/tenants" action="D"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="ff96062a-fa99-36dc-9942-0f6442ae7212" resource="/policies" action="R"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="ad99ea98-3af6-3561-ae27-5bf09e1d969d" resource="/policies" action="W"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="01b87cb5-c0b6-342d-b108-d8bc03ab5cde" resource="/policies" action="D"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="9d182b11-ebe3-3a7a-8731-98ce6d6e44fd" resource="/buckets" action="R"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="dfbf3c51-fdec-3328-b169-3b54eb033147" resource="/buckets" action="W"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="05b96464-9ec8-312a-8459-67812a8b48c1" resource="/buckets" action="D"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="2fd3fcf5-b10f-33fa-8d8e-b262fa34815e" resource="/actuator" action="R"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="2f470357-e82c-38ee-8062-ab6388d6ec75" resource="/actuator" action="W"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="3ee4703f-94ca-33c2-8060-17f5d313f560" resource="/actuator" action="D"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="0eaa47b9-e409-304e-8682-30d1b0d86d05" resource="/swagger" action="R"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="cf4d8390-5ac7-3ff0-82ce-a274b5f88b21" resource="/swagger" action="W"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="ac587f43-6e1c-3890-81fd-83b4df2e678e" resource="/swagger" action="D"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="287edf48-da72-359b-8f61-da5d4c45a270" resource="/proxy" action="W"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
    &amp;lt;/policies&amp;gt;
&amp;lt;/authorizations&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;users.xml&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;cat users.xml 
&amp;lt;?xml version="1.0" encoding="UTF-8" standalone="yes"?&amp;gt;
&amp;lt;tenants&amp;gt;
    &amp;lt;groups/&amp;gt;
    &amp;lt;users&amp;gt;
        &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53" identity="****"/&amp;gt;
    &amp;lt;/users&amp;gt;
&amp;lt;/tenants&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;could you please point me what i missed?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;</description>
    <pubDate>Sun, 03 Nov 2019 12:40:31 GMT</pubDate>
    <dc:creator>Paul Yang</dc:creator>
    <dc:date>2019-11-03T12:40:31Z</dc:date>
    <item>
      <title>Cannot got  login page when i enable ssl &amp; ldap in nifi  registry with cloudera flow manager 1.0.1</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Cannot-got-login-page-when-i-enable-ssl-amp-ldap-in-nifi/m-p/281888#M209634</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am working with cloudera flow manager version 1.0.1. I cannot got login page when i enable ssl &amp;amp; ldap in nifi registry instead of this page, and there is an node identity.&amp;nbsp; I have checked the config that may be correctly. and try more time such as remove /var/lib/nifiregister/* or /var/run/cloudera-scm-agent/process/***-nifiregistry-NIFI_REGISTRY_SERVER/*&amp;nbsp;&lt;/P&gt;&lt;P&gt;the blow pic shows the login user is node id.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/25125i059AAD6D7944FAB5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the related ldap info is below, but there is not userDN config option in cloudera manager. there is same setting between nifi and nifi registry.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;2019-11-02 10:24:59,167 INFO org.springframework.ldap.core.support.AbstractContextSource: Property 'userDn' not set - anonymous context will be used for read-write operations&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The behavior is very strange.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Who could help me what i missed?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 11:35:29 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Cannot-got-login-page-when-i-enable-ssl-amp-ldap-in-nifi/m-p/281888#M209634</guid>
      <dc:creator>Paul Yang</dc:creator>
      <dc:date>2026-04-21T11:35:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot got  login page when i enable ssl &amp; ldap in nifi  registry with cloudera flow manager 1.0.1</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Cannot-got-login-page-when-i-enable-ssl-amp-ldap-in-nifi/m-p/281904#M209648</link>
      <description>&lt;P&gt;Update:&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the below is the log:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;2019-11-03 20:06:10,531 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.IdentityFilter Attempting to extract user credentials using X509IdentityProvider
2019-11-03 20:06:10,531 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.IdentityFilter Adding credentials claim to SecurityContext to be authenticated. Credentials extracted by X509IdentityProvider: AuthenticationRequest{username='CN=arch-fndtf04.beta1.fn, OU=NIFI', credentials=[PROTECTED], details=null}
2019-11-03 20:06:10,531 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.IdentityFilter Credentials already extracted for [org.apache.nifi.registry.web.security.authentication.AuthenticationRequestToken$1@39a29a41], skipping credentials extraction filter using JwtIdentityProvider
2019-11-03 20:06:10,532 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.ResourceAuthorizationFilter Request filter authorization check is not required for this HTTP Method on this resource. Allowing request to proceed. An additional authorization check might be performed downstream of this filter.
2019-11-03 20:06:10,688 INFO [NiFi Registry Web Server-12] o.a.n.r.w.m.IllegalStateExceptionMapper java.lang.IllegalStateException: Kerberos service ticket login not supported by this NiFi Registry. Returning Conflict response.
2019-11-03 20:06:10,691 DEBUG [NiFi Registry Web Server-12] o.a.n.r.w.m.IllegalStateExceptionMapper 
java.lang.IllegalStateException: Kerberos service ticket login not supported by this NiFi Registry
	at org.apache.nifi.registry.web.api.AccessResource.createAccessTokenUsingKerberosTicket(AccessResource.java:285) ~[classes/:na]
......

2019-11-03 20:06:10,721 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.IdentityFilter Attempting to extract user credentials using X509IdentityProvider
2019-11-03 20:06:10,722 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.IdentityFilter Adding credentials claim to SecurityContext to be authenticated. Credentials extracted by X509IdentityProvider: AuthenticationRequest{username='CN=arch-fndtf04.beta1.fn, OU=NIFI', credentials=[PROTECTED], details=null}
2019-11-03 20:06:10,722 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.IdentityFilter Credentials already extracted for [org.apache.nifi.registry.web.security.authentication.AuthenticationRequestToken$1@2929ad59], skipping credentials extraction filter using JwtIdentityProvider
2019-11-03 20:06:10,723 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.ResourceAuthorizationFilter Request filter authorization check is not required for this HTTP Method on this resource. Allowing request to proceed. An additional authorization check might be performed downstream of this filter.
2019-11-03 20:06:10,784 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.IdentityFilter Attempting to extract user credentials using X509IdentityProvider
2019-11-03 20:06:10,784 DEBUG [NiFi Registry Web Server-17] o.a.n.r.w.s.a.IdentityFilter Attempting to extract user credentials using X509IdentityProvider
2019-11-03 20:06:10,784 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.IdentityFilter Adding credentials claim to SecurityContext to be authenticated. Credentials extracted by X509IdentityProvider: AuthenticationRequest{username='CN=arch-fndtf04.beta1.fn, OU=NIFI', credentials=[PROTECTED], details=null}
2019-11-03 20:06:10,784 DEBUG [NiFi Registry Web Server-17] o.a.n.r.w.s.a.IdentityFilter Adding credentials claim to SecurityContext to be authenticated. Credentials extracted by X509IdentityProvider: AuthenticationRequest{username='CN=arch-fndtf04.beta1.fn, OU=NIFI', credentials=[PROTECTED], details=null}
2019-11-03 20:06:10,784 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.IdentityFilter Credentials already extracted for [org.apache.nifi.registry.web.security.authentication.AuthenticationRequestToken$1@7bf82c3a], skipping credentials extraction filter using JwtIdentityProvider
2019-11-03 20:06:10,784 DEBUG [NiFi Registry Web Server-17] o.a.n.r.w.s.a.IdentityFilter Credentials already extracted for [org.apache.nifi.registry.web.security.authentication.AuthenticationRequestToken$1@69275fb3], skipping credentials extraction filter using JwtIdentityProvider
2019-11-03 20:06:10,785 DEBUG [NiFi Registry Web Server-19] o.a.n.r.w.s.a.ResourceAuthorizationFilter Request filter authorization check is not required for this HTTP Method on this resource. Allowing request to proceed. An additional authorization check might be performed downstream of this filter.
2019-11-03 20:06:10,785 DEBUG [NiFi Registry Web Server-17] o.a.n.r.w.s.a.ResourceAuthorizationFilter Request filter authorization check is not required for this HTTP Method on this resource. Allowing request to proceed. An additional authorization check might be performed downstream of this filter.&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The below is my configurations:&lt;/P&gt;&lt;P&gt;nifi-registry.properties&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nifi.registry.db.directory=
nifi.registry.db.driver.class=org.h2.Driver
nifi.registry.db.driver.directory=
nifi.registry.db.maxConnections=5
nifi.registry.db.password=UqZCvEAQeGvUUIGH||82ibCgtpV4JUhkFCnxQkW7kXxkmkHrc
nifi.registry.db.password.protected=aes/gcm/256
nifi.registry.db.sql.debug=false
nifi.registry.db.url=jdbc:h2:/var/lib/nifiregistry/database/nifi-registry-primary;AUTOCOMMIT=OFF;DB_CLOSE_ON_EXIT=FALSE;LOCK_MODE=3;LOCK_TIMEOUT=25000;WRITE_DELAY=0;AUTO_SERVER=FALSE
nifi.registry.db.url.append=
nifi.registry.db.username=nifireg
nifi.registry.initial.admin.identity=*******
nifi.registry.kerberos.krb5.file=/etc/krb5.conf
nifi.registry.kerberos.service.keytab.location=/var/run/cloudera-scm-agent/process/238-nifiregistry-NIFI_REGISTRY_SERVER/nifiregistry.keytab
nifi.registry.kerberos.spnego.authentication.expiration=12 hours
nifi.registry.kerberos.spnego.keytab.location=/var/run/cloudera-scm-agent/process/238-nifiregistry-NIFI_REGISTRY_SERVER/nifiregistry.keytab
nifi.registry.providers.configuration.file=/var/run/cloudera-scm-agent/process/238-nifiregistry-NIFI_REGISTRY_SERVER/providers.xml
nifi.registry.security.authorizer=managed-authorizer
nifi.registry.security.authorizers.configuration.file=/var/run/cloudera-scm-agent/process/238-nifiregistry-NIFI_REGISTRY_SERVER/authorizers.xml
nifi.registry.security.identity.provider=ldap-provider
nifi.registry.security.identity.providers.configuration.file=/var/run/cloudera-scm-agent/process/238-nifiregistry-NIFI_REGISTRY_SERVER/identity-providers.xml
nifi.registry.security.keyPasswd=cpDNEjgeOtHgUKBg||/TtGPhbQyltKWVvH9Cj7rj3ZVYZO
nifi.registry.security.keyPasswd.protected=aes/gcm/256
nifi.registry.security.keystore=/var/lib/nifiregistry/cert/keystore.jks
nifi.registry.security.keystorePasswd=QgccvlFai9XXLFUB||Pgu0W6X+BYYSPCiu1drPcqtWIru7
nifi.registry.security.keystorePasswd.protected=aes/gcm/256
nifi.registry.security.keystoreType=jks
nifi.registry.security.needClientAuth=true
nifi.registry.security.truststore=/var/lib/nifiregistry/cert/truststore.jks
nifi.registry.security.truststorePasswd=TKpFfRmNkxQD5xqg||IY8IZookjPjKpGiKiTplZpvmkMRB
nifi.registry.security.truststorePasswd.protected=aes/gcm/256
nifi.registry.security.truststoreType=jks
nifi.registry.sensitive.props.additional.keys=nifi.registry.db.password
nifi.registry.web.http.host=
nifi.registry.web.http.port=
nifi.registry.web.https.host=arch-fndtf03.beta1.fn
nifi.registry.web.https.port=18433
nifi.registry.web.jetty.threads=200
nifi.registry.web.jetty.working.directory=/var/lib/nifiregistry/work/jetty
nifi.registry.web.war.directory=/opt/cloudera/parcels/CFM-1.0.1.0/REGISTRY/lib&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;identity-providers.xml:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;identityProviders&amp;gt;

    &amp;lt;provider&amp;gt;
        &amp;lt;identifier&amp;gt;kerberos-identity-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.registry.web.security.authentication.kerberos.KerberosIdentityProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Authentication Expiration"&amp;gt;12 hours&amp;lt;/property&amp;gt;
        &amp;lt;property name="Default Realm"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Enable Debug"&amp;gt;false&amp;lt;/property&amp;gt;
        
    &amp;lt;/provider&amp;gt;

    &amp;lt;provider&amp;gt;
        &amp;lt;identifier&amp;gt;ldap-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.registry.security.ldap.LdapIdentityProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="User Search Base"&amp;gt;***&amp;lt;/property&amp;gt;
        &amp;lt;property name="Connect Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;
        &amp;lt;property encryption="aes/gcm/256" name="Manager Password"&amp;gt;**&amp;lt;/property&amp;gt;
        &amp;lt;property name="Authentication Strategy"&amp;gt;SIMPLE&amp;lt;/property&amp;gt;
        &amp;lt;property name="Manager DN"&amp;gt;**&amp;lt;/property&amp;gt;
        &amp;lt;property name="Referral Strategy"&amp;gt;FOLLOW&amp;lt;/property&amp;gt;
        &amp;lt;property name="Identity Strategy"&amp;gt;USE_USERNAME&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Search Filter"&amp;gt;cn={0}&amp;lt;/property&amp;gt;
        &amp;lt;property name="Authentication Expiration"&amp;gt;12 hours&amp;lt;/property&amp;gt;
        &amp;lt;property name="Read Timeout"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Url"&amp;gt;**&amp;lt;/property&amp;gt;
        
    &amp;lt;/provider&amp;gt;

&amp;lt;/identityProviders&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;authorizations.xml&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;?xml version="1.0" encoding="UTF-8" standalone="yes"?&amp;gt;
&amp;lt;authorizations&amp;gt;
    &amp;lt;policies&amp;gt;
        &amp;lt;policy identifier="627410be-1717-35b4-a06f-e9362b89e0b7" resource="/tenants" action="R"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="15e4e0bd-cb28-34fd-8587-f8d15162cba5" resource="/tenants" action="W"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="2dbc92a2-b091-3616-8e88-5078b9103b04" resource="/tenants" action="D"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="ff96062a-fa99-36dc-9942-0f6442ae7212" resource="/policies" action="R"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="ad99ea98-3af6-3561-ae27-5bf09e1d969d" resource="/policies" action="W"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="01b87cb5-c0b6-342d-b108-d8bc03ab5cde" resource="/policies" action="D"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="9d182b11-ebe3-3a7a-8731-98ce6d6e44fd" resource="/buckets" action="R"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="dfbf3c51-fdec-3328-b169-3b54eb033147" resource="/buckets" action="W"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="05b96464-9ec8-312a-8459-67812a8b48c1" resource="/buckets" action="D"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="2fd3fcf5-b10f-33fa-8d8e-b262fa34815e" resource="/actuator" action="R"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="2f470357-e82c-38ee-8062-ab6388d6ec75" resource="/actuator" action="W"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="3ee4703f-94ca-33c2-8060-17f5d313f560" resource="/actuator" action="D"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="0eaa47b9-e409-304e-8682-30d1b0d86d05" resource="/swagger" action="R"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="cf4d8390-5ac7-3ff0-82ce-a274b5f88b21" resource="/swagger" action="W"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="ac587f43-6e1c-3890-81fd-83b4df2e678e" resource="/swagger" action="D"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
        &amp;lt;policy identifier="287edf48-da72-359b-8f61-da5d4c45a270" resource="/proxy" action="W"&amp;gt;
            &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53"/&amp;gt;
        &amp;lt;/policy&amp;gt;
    &amp;lt;/policies&amp;gt;
&amp;lt;/authorizations&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;users.xml&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;cat users.xml 
&amp;lt;?xml version="1.0" encoding="UTF-8" standalone="yes"?&amp;gt;
&amp;lt;tenants&amp;gt;
    &amp;lt;groups/&amp;gt;
    &amp;lt;users&amp;gt;
        &amp;lt;user identifier="d9e3d4d3-e7d2-3c6e-9a70-2602c3265b53" identity="****"/&amp;gt;
    &amp;lt;/users&amp;gt;
&amp;lt;/tenants&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;could you please point me what i missed?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;</description>
      <pubDate>Sun, 03 Nov 2019 12:40:31 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Cannot-got-login-page-when-i-enable-ssl-amp-ldap-in-nifi/m-p/281904#M209648</guid>
      <dc:creator>Paul Yang</dc:creator>
      <dc:date>2019-11-03T12:40:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot got  login page when i enable ssl &amp; ldap in nifi  registry with cloudera flow manager 1.0.1</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Cannot-got-login-page-when-i-enable-ssl-amp-ldap-in-nifi/m-p/281971#M209691</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/11555"&gt;@Paul Yang&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A couple observation based on provided information:&lt;BR /&gt;&lt;BR /&gt;1.&amp;nbsp; You have need clientAuth enabled&lt;/P&gt;&lt;PRE&gt;nifi.registry.security.needClientAuth=true&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;With this enabled in NiFi-Registry the only authentication method supported will be 2-way TLS.&amp;nbsp; If you want to support other authentication methods lik Spnego, LDAP, and/or kerberos, this property must be false.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Your users.xml (used for user authorization and not authentication) only contains one user.&amp;nbsp; I am assuming the user is :&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;CN=arch-fndtf04.beta1.fn, OU=NIFI&lt;/PRE&gt;&lt;P&gt;And your authorizations.xml also show that this is the only user that has been authorized to a bunch of policies.&amp;nbsp; Your ldap user you want to authorize must exist in the users.xml file.&amp;nbsp; My guess here is that you did not set the "Initial admin" user in your authorizers.xml (which you did not share).&amp;nbsp; There are two possible providers in the authorizers were you can set the initial admin (file-user-group-provider - Only set here if your initial admin user is NOT coming from the ldap-user-group-provider.&amp;nbsp; file-access-provider - initial admin must be set here so initial admin policies are created for this user.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. The users.xml and authorizations.xml files are only generated if they do not already exist.&amp;nbsp; If you go back and add an initial admin to your authorizers.xml, you will need to delete/rename the existing users.xml and authorizations.xml files o new ones can be generated in startup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;4. Since need clientAuth was set to true and UI clearly shows that user string:&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;CN=arch-fndtf04.beta1.fn, OU=NIFI&lt;/PRE&gt;&lt;P&gt;successfully authenticated, your browser must have this client certificate loaded and presented to the server when you navigated to the URL for your NiFi-Registry.&amp;nbsp; I really see no reason why this certificate was loaded int to your browser.&amp;nbsp; NiFi-Registry, even when need clientAuth is false, will always try mutual TLS authentication first (becomes a WANT instead of REQUIRE when need clientAuth is false).&amp;nbsp; If no client certificate is provided in TLS handshake, next auth method tried is Spnego (if configured), and finally a configured login provider from the identity-providers.xml.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this info helps with correcting your setup issues.&lt;BR /&gt;Thanks,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2019 13:52:00 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Cannot-got-login-page-when-i-enable-ssl-amp-ldap-in-nifi/m-p/281971#M209691</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2019-11-04T13:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot got  login page when i enable ssl &amp; ldap in nifi  registry with cloudera flow manager 1.0.1</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Cannot-got-login-page-when-i-enable-ssl-amp-ldap-in-nifi/m-p/282032#M209718</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your detail answers. I almost to get win.&lt;/P&gt;&lt;P&gt;Unfortunately, I can not get sync policy between NIFI and NIFI Registry with my ldap account. I must to config my node identity as a user like CN=arch-fndtf04.beta1.fn, OU=NIFI&amp;nbsp; and grant it proxy access policy, so can import the bucket and commit the version. If i remove the user CN=arch-fndtf04.beta1.fn, OU=NIFI or i remove the proxy access policy of it in NIFI Registry. The NIFI GUI will show the "?" on top left corner of process group picture.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="6F9B4730-09F7-49c6-87F1-21D994AFB5F9.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/25164i81BAFEE6223C8942/image-size/medium?v=v2&amp;amp;px=400" role="button" title="6F9B4730-09F7-49c6-87F1-21D994AFB5F9.png" alt="6F9B4730-09F7-49c6-87F1-21D994AFB5F9.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="8EF9A1A0-345A-4b0d-86D2-DEE7C5D42570.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/25165i8279EC6C52654E41/image-size/medium?v=v2&amp;amp;px=400" role="button" title="8EF9A1A0-345A-4b0d-86D2-DEE7C5D42570.png" alt="8EF9A1A0-345A-4b0d-86D2-DEE7C5D42570.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="87C93CF5-F3A4-498f-B82B-22CA260D8005.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/25166i6B2B0DDC63D34280/image-size/medium?v=v2&amp;amp;px=400" role="button" title="87C93CF5-F3A4-498f-B82B-22CA260D8005.png" alt="87C93CF5-F3A4-498f-B82B-22CA260D8005.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="E5EFAFB9-E1D1-4b88-832F-FBFDABEFC8E5.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/25167i9B1D9B717D5145CD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="E5EFAFB9-E1D1-4b88-832F-FBFDABEFC8E5.png" alt="E5EFAFB9-E1D1-4b88-832F-FBFDABEFC8E5.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you help me how to avoid the issue?&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Nov 2019 02:35:00 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Cannot-got-login-page-when-i-enable-ssl-amp-ldap-in-nifi/m-p/282032#M209718</guid>
      <dc:creator>Paul Yang</dc:creator>
      <dc:date>2019-11-05T02:35:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot got  login page when i enable ssl &amp; ldap in nifi  registry with cloudera flow manager 1.0.1</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Cannot-got-login-page-when-i-enable-ssl-amp-ldap-in-nifi/m-p/282098#M209753</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/11555"&gt;@Paul Yang&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was in no way implying that you should have removed your NiFi nodes DN as a user identity in the NiFi-Registry.&amp;nbsp; &amp;nbsp;The DN for every NiFi node must exist in NiFi-Registry and have been granted both proxy and read on "Can Manage Buckets" policies.&lt;BR /&gt;&lt;BR /&gt;NiFi nodes will regularly read the buckets in the NiFi-Registry to see if a newer version of your Version controlled PG exists (this is why read&amp;nbsp; on "Can manage buckets" is needed.).&amp;nbsp; The "?" is displayed when the NiFi nodes can not read the bucket.&lt;BR /&gt;&lt;BR /&gt;When a user in NiFi performs a version control action, the node will proxy the request n behalf of that user to the NiFi-Registry.&amp;nbsp; This is why all NiFi nodes must exist as users in NiFi-Registry and have the proxy policy granted to them.&lt;BR /&gt;&lt;BR /&gt;Only your initial admin user should have all policies except proxy.&amp;nbsp; That user should never be proxying anything.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Tue, 05 Nov 2019 13:03:31 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Cannot-got-login-page-when-i-enable-ssl-amp-ldap-in-nifi/m-p/282098#M209753</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2019-11-05T13:03:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot got  login page when i enable ssl &amp; ldap in nifi  registry with cloudera flow manager 1.0.1</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Cannot-got-login-page-when-i-enable-ssl-amp-ldap-in-nifi/m-p/282157#M209796</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Follow your points i got win.&lt;/P&gt;&lt;P&gt;Thank you a lot.&lt;/P&gt;&lt;P&gt;Paul&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2019 02:05:23 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Cannot-got-login-page-when-i-enable-ssl-amp-ldap-in-nifi/m-p/282157#M209796</guid>
      <dc:creator>Paul Yang</dc:creator>
      <dc:date>2019-11-06T02:05:23Z</dc:date>
    </item>
  </channel>
</rss>

