<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: How to Generate Certs to secure 3 node nifi cluster and configs in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288483#M213673</link>
    <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp; for some reason I'm unable to execute the command below,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tls-toolkit.sh standalone -B password -C 'CN=nifiadmin, OU=NIFI' -n 'ldxxx001.xx.xx.com,ldxx002.xx.x.com’ --nifiDnPrefix 'CN=' --nifiDnSuffix ',OU=NIFI' -o /tmp/certs/ -K password -P password -S password&lt;/P&gt;&lt;P&gt;seems like&amp;nbsp; uncomplete&lt;/P&gt;</description>
    <pubDate>Tue, 28 Jan 2020 20:17:59 GMT</pubDate>
    <dc:creator>DivyaKaki</dc:creator>
    <dc:date>2020-01-28T20:17:59Z</dc:date>
    <item>
      <title>How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288113#M213461</link>
      <description>&lt;P&gt;How to Generate Certs to secure 3 node nifi cluster and configs&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All, I am new to nifi and started to secure nifi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can some share how to generate certs using toolkit standalone&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do I need to generate certs on all nodes&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;node1.xyz.com&lt;/P&gt;
&lt;P&gt;node2.xyz.com&lt;/P&gt;
&lt;P&gt;node3.xyz.com&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I understand initial admin identity but what is&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Node Identity for 3 nodes i have to update in authorizers.xml file&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2020 22:35:32 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288113#M213461</guid>
      <dc:creator>DivyaKaki</dc:creator>
      <dc:date>2020-01-22T22:35:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288173#M213487</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/73471"&gt;@DivyaKaki&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once you configure NiFi to operate securely over https, TLS based authentication is required fro all NiFi node communications.&amp;nbsp; This requires that each node in your NiFi cluster has its own keystore.jks that meets the following criteria:&lt;BR /&gt;&lt;BR /&gt;1. NiFi keystore can only contain ONE PrivateKeyEntry.&lt;BR /&gt;2. The keystore password must match the PriavteKeyEntry (Key password) or have no password on the key.&lt;BR /&gt;3. The PrivateKeyEntry can not use wildcards.&lt;BR /&gt;4. The PrivateKeyEntry must support both clientAuth and serverAuth ExtendedKeyUsage (EKU).&lt;BR /&gt;5. The PrivateKeyEntry must contain at least one Subject Alternative Name (SAN) that matches the hostname of the server on which the keystore is being used.&lt;BR /&gt;&lt;BR /&gt;The NiFi truststore will contain one or more TrustedCertEntries.&amp;nbsp; These are public keys used to verify trust of any presented client certificate during a TLS handshake.&amp;nbsp; You typically build one truststore which you then install on every NiFi server.&amp;nbsp; With self signed certificates, the public cert for every one of those must exist as an TrustedCertEntry in the common truststore.&amp;nbsp; Any self-signed user certificate must exist as a trustedCertEntry in the truststore as well.&amp;nbsp; If your PrivateKeyEntry was signed (issuer) by some certificate authority, then the complete certificate trust chain for that signed certificate should exist as TrustedCertEntries in your truststore.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NiFi nodes will use mutual TLS handshake when communicating with one another.&amp;nbsp; This means a NiFi nodes will be the clients at times and as servers at other times in the TLS handshake which is why the need for clientAuth and serverAuth EKUs.&lt;BR /&gt;&lt;BR /&gt;When it comes to user authentication in to NiFi, the default method is also TLS, thus requiring that you have a user certificate which can be trusted by the NiFi servers truststores.&amp;nbsp; NiFi can also be configured to support other methods for user authentication to include things like kerberos, LDAP, and OpenID connect.&lt;BR /&gt;&lt;BR /&gt;Details on how to use the NiFi TLS toolkit can be found here:&lt;BR /&gt;&lt;A href="https://nifi.apache.org/docs/nifi-docs/html/toolkit-guide.html#tls_toolkit" target="_blank"&gt;https://nifi.apache.org/docs/nifi-docs/html/toolkit-guide.html#tls_toolkit&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Keep in mind that if you use this in standalone mode to create a keystore and trusttore for each node in your NiFi cluster, you will need to merge all the truststores created in to one truststore you will use on all hosts.&amp;nbsp; Plus you will need to import your user certificate public cert as well in to this truststore, so your user can authenticate.&lt;BR /&gt;&lt;BR /&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2020 13:51:01 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288173#M213487</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2020-01-23T13:51:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288285#M213546</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;thanks for providing details.&lt;/P&gt;&lt;P&gt;I have question on generating cert,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do I need to generate certs as localhost on each node&amp;nbsp; or&amp;nbsp; do I need to generate based on hostname .&lt;/P&gt;&lt;P&gt;I have installed nifi on cloud with primary and secondary ipaddress on 3 nodes&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2020 17:54:54 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288285#M213546</guid>
      <dc:creator>DivyaKaki</dc:creator>
      <dc:date>2020-01-24T17:54:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288353#M213590</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/73471"&gt;@DivyaKaki&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The hostname must exist as a SAN entry in your certificate.&amp;nbsp; You may also choose to add your servers IP as a SAN entry, FQDN, internal hostname (multi-homed network), etc as SAN entries.&amp;nbsp; Each SAN entry would correspond with a unique way of addressing the server.&amp;nbsp; Localhost should not be used anywhere in a certificate (good security practice).&amp;nbsp; When you access your NiFi via a web browser you should be using one of those SAN entries in the URL.&lt;BR /&gt;&lt;BR /&gt;As far as the Distinguished Name (DN) goes for your certificate, NiFi does not support wildcards.&amp;nbsp; The CN within your DN can be whatever you like.&amp;nbsp; For example:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;CN=NiFiNode1, OU=Specialists, O=MyCompany, L=Baltimore, ST=Maryland, C=US&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My cert would require following EKUs:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;#5: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
  serverAuth
  clientAuth&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;I then would have SAN entries like following for example:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;#8: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
  DNSName: nifi-node-01.com
  DNSName: nifi-node-01
  DNSName: nifi-node-internal-01&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2020 13:41:49 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288353#M213590</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2020-01-27T13:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288364#M213599</link>
      <description>&lt;P&gt;Thanks,&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;for providing details.&lt;/P&gt;&lt;P&gt;i am little confused here on how to merge trust store on all nodes since I'm trying on&amp;nbsp;&lt;SPAN&gt;standalone&amp;nbsp; mode . can you shared details, please&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2020 18:34:00 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288364#M213599</guid>
      <dc:creator>DivyaKaki</dc:creator>
      <dc:date>2020-01-27T18:34:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288386#M213613</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/73471"&gt;@DivyaKaki&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Sorry my responses were more genaralized requirements instead of the actual tls-toolkit command needed to accomplish this with the provided TLS toolkit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When using "standalone" with NiFi TLS toolkit, all that means is that you are not using an already running&amp;nbsp; NiFi CA server.&lt;BR /&gt;&lt;BR /&gt;To create certificates for all three of your nodes, your tsl-toolkit.sh standalone command would look something like the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;./tls-toolkit.sh standalone -B &amp;lt;client cert password&amp;gt; -C 'CN=nifiadmin, OU=NIFI' -n 'node1.xyz.com,node2.xyz.com,node3.xyz.com' --nifiDnPrefix 'CN=' --nifiDnSuffix ', OU=NIFI' -o /tmp/certs/ -K &amp;lt;key password&amp;gt; -P &amp;lt;truststore password&amp;gt; -S &amp;lt;keystore password&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Above will create output in /tmp/certs directory (make sure directory exists before running above command).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What you end up with is the following:&lt;/P&gt;&lt;P&gt;1. A user certificate for nifiadmin which you can use in your browser by importing the p12 file to access your NiFi as the nifi-admin user (provided "CN=nifiadmin, OU=NIFI" was configured as your initial admin user).&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Three folders (one for each of your nodes) containing the keystore and truststore you need to use on each of those nodes.&lt;BR /&gt;&lt;BR /&gt;Note: each node directory will contain a default nifi.properties file.&amp;nbsp; You should simply update your existing nifi.properties file on each node instead with the keystore and truststore required property values.&lt;BR /&gt;&lt;BR /&gt;You Initial Admin Identity&amp;nbsp; gets configured with the authorizers.xml file.&lt;BR /&gt;&lt;BR /&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2020 22:10:42 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288386#M213613</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2020-01-27T22:10:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288392#M213617</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;thanks for your help, really appreciate it. I'm kind of doing POC and thanks for helping me out&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here is where I stand currently: POC only&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-&amp;gt; generated certs standalone, will reuse the syntax shared by you for standardaition&amp;nbsp;&lt;/P&gt;&lt;P&gt;sh tls-toolkit.sh standalone -n 'localhost(3)' -C 'CN=NifiAdmin, OU=ApacheNIfi' -o /opt/nifi-toolkit-1.9.2/certs/ssl&lt;/P&gt;&lt;P&gt;-&amp;gt; copied keystore, truststore to corresponding hosts&lt;/P&gt;&lt;P&gt;-&amp;gt; updated nifi.proprties on all hosts&lt;/P&gt;&lt;P&gt;-&amp;gt; updated authorizers on all hosts&lt;/P&gt;&lt;P&gt;&amp;lt;!-- &amp;lt;authorizer&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;file-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAuthorizer&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Users File"&amp;gt;./conf/users.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Initial Admin Identity"&amp;gt;CN=NifiAdmin, OU=ApacheNIfi&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;property name="Node Identity 1"&amp;gt;CN=localhost, OU=NIFI&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/authorizer&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;issue: while trying to access URL through cert, I'm getting an error&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="message-pane-title"&gt;Insufficient Permissions&lt;/DIV&gt;&lt;DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN class="link"&gt;home&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;DIV class="message-pane-content"&gt;No applicable policies could be found. Contact the system administrator.&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-&amp;gt; users.xml or authorizations.xml is empty&lt;/P&gt;&lt;P&gt;-&amp;gt; i haven't merged the trust store as it generated by localhost&amp;nbsp;&lt;/P&gt;&lt;P&gt;Owner: CN=localhost, OU=NIFI&lt;BR /&gt;Issuer: CN=localhost, OU=NIFI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;please help me what is missing here, why I'm seeing&amp;nbsp;Insufficient Permissions,&amp;nbsp;No applicable policies could be found. Contact the system administrator.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2020 03:04:50 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288392#M213617</guid>
      <dc:creator>DivyaKaki</dc:creator>
      <dc:date>2020-01-28T03:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288483#M213673</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp; for some reason I'm unable to execute the command below,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tls-toolkit.sh standalone -B password -C 'CN=nifiadmin, OU=NIFI' -n 'ldxxx001.xx.xx.com,ldxx002.xx.x.com’ --nifiDnPrefix 'CN=' --nifiDnSuffix ',OU=NIFI' -o /tmp/certs/ -K password -P password -S password&lt;/P&gt;&lt;P&gt;seems like&amp;nbsp; uncomplete&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2020 20:17:59 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288483#M213673</guid>
      <dc:creator>DivyaKaki</dc:creator>
      <dc:date>2020-01-28T20:17:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288485#M213674</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/73471"&gt;@DivyaKaki&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not really sure what to tell you about the command not working for you (maybe a copy paste issue with the single quotes?).&amp;nbsp; &amp;nbsp;I ran the command locally just fine.&lt;BR /&gt;&lt;BR /&gt;Never the less, you would not need to merge your truststore.jks files because every of your truststores already contains the same CA (localhost).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The response you are seeing in the UI indicates that your user authentication was successful; however, your authenticated user is not authorized to the requested resource (specifically /flow is needed to even see the NiFi UI canvas).&lt;BR /&gt;&lt;BR /&gt;You will want to be looking at the output written to the nifi-user.log when you attempt to access the NiFi UI for details about user authentication and authorization.&lt;BR /&gt;&lt;BR /&gt;Your users.xml and authorizations.xml files should not be empty.&lt;BR /&gt;&lt;BR /&gt;NiFi's file-provider from the authorizers.xml file will only generate the users.xml and authorizations.xml files if they do NOT already exist at time of NiFi startup.&amp;nbsp; Try stopping your NiFi, removing these files from all three nodes, and then starting NiFi again.&amp;nbsp; Then inspect the new files to see if they are populated.&lt;BR /&gt;&lt;BR /&gt;Hope this helps,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2020 20:57:05 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288485#M213674</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2020-01-28T20:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288494#M213677</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for the response&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have stopped nifi on all nodes, removed user.xml &amp;amp; authorizations.xml on all nodes&lt;/P&gt;&lt;P&gt;started nifi back still the same message&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;though I have configured below CN user as initial admin not sure why I am seeing this message, it should allow login using the cert right&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;do I need to add any polices for the admin user initial admin&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;property name="Initial Admin Identity"&amp;gt;CN=NifiAdmin, OU=ApacheNIfi&amp;lt;/property&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2020-01-28 22:41:02,927 INFO [NiFi Web Server-38] o.a.n.w.s.NiFiAuthenticationFilter Attempting request for (CN=NifiAdmin, OU=ApacheNIfi) GET https://localhost:9696/nifi-api/flow/current-user (source ip: 10.175.124.142)&lt;/P&gt;&lt;P&gt;2020-01-28 22:41:02,927 INFO [NiFi Web Server-38] o.a.n.w.s.NiFiAuthenticationFilter Authentication success for CN=NifiAdmin, OU=ApacheNIfi&lt;/P&gt;&lt;P&gt;2020-01-28 22:41:02,929 INFO [NiFi Web Server-38] o.a.n.w.a.c.AccessDeniedExceptionMapper identity[CN=NifiAdmin, OU=ApacheNIfi, groups[] does not have permission to access the requested resource. No applicable policies could be found. Returning Forbidden response.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2020 22:53:06 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288494#M213677</guid>
      <dc:creator>DivyaKaki</dc:creator>
      <dc:date>2020-01-28T22:53:06Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288495#M213678</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;i also noticed users.xml and authorizations.xml empty&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;cat users.xml&lt;BR /&gt;&amp;lt;?xml version="1.0" encoding="UTF-8" standalone="yes"?&amp;gt;&lt;BR /&gt;&amp;lt;tenants&amp;gt;&lt;BR /&gt;&amp;lt;groups/&amp;gt;&lt;BR /&gt;&amp;lt;users/&amp;gt;&lt;BR /&gt;&amp;lt;/tenants&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;cat authorizations.xml&lt;BR /&gt;&amp;lt;?xml version="1.0" encoding="UTF-8" standalone="yes"?&amp;gt;&lt;BR /&gt;&amp;lt;authorizations&amp;gt;&lt;BR /&gt;&amp;lt;policies/&amp;gt;&lt;BR /&gt;&amp;lt;/authorizations&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2020 23:06:35 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288495#M213678</guid>
      <dc:creator>DivyaKaki</dc:creator>
      <dc:date>2020-01-28T23:06:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288553#M213721</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/73471"&gt;@DivyaKaki&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lets take a step back for a moment here....&lt;BR /&gt;&lt;BR /&gt;What is the full version of NiFi you are running currently?&lt;BR /&gt;&lt;BR /&gt;What is set value for following properties in your nifi.properties configuration file:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nifi.security.user.authorizer=file-provider&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you share the contents of your authorizers.xml file?&lt;/P&gt;&lt;P&gt;Looking at what you shared earlier indicates your file-provider is commented out:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;!-- &amp;lt;authorizer&amp;gt;
&amp;lt;identifier&amp;gt;file-provider&amp;lt;/identifier&amp;gt;
&amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAuthorizer&amp;lt;/class&amp;gt;
&amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;
&amp;lt;property name="Users File"&amp;gt;./conf/users.xml&amp;lt;/property&amp;gt;
&amp;lt;property name="Initial Admin Identity"&amp;gt;CN=NifiAdmin, OU=ApacheNIfi&amp;lt;/property&amp;gt;
&amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;

&amp;lt;property name="Node Identity 1"&amp;gt;CN=localhost, OU=NIFI&amp;lt;/property&amp;gt;
&amp;lt;/authorizer&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;Note that "&amp;lt;!--" indicates the start of a comment block.&amp;nbsp; The comment vlock continues until "--&amp;gt;" is found in the XML.&lt;BR /&gt;&lt;BR /&gt;The file-provider should look like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;authorizers&amp;gt;
     &amp;lt;authorizer&amp;gt;
         &amp;lt;identifier&amp;gt;file-provider&amp;lt;/identifier&amp;gt;
         &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAuthorizer&amp;lt;/class&amp;gt;
         &amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;
         &amp;lt;property name="Users File"&amp;gt;./conf/users.xml&amp;lt;/property&amp;gt;
         &amp;lt;property name="Initial Admin Identity"&amp;gt;CN=NifiAdmin, OU=ApacheNIfi&amp;lt;/property&amp;gt;
         &amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;

         &amp;lt;property name="Node Identity 1"&amp;gt;CN=localhost, OU=NIFI&amp;lt;/property&amp;gt;
     &amp;lt;/authorizer&amp;gt;
&amp;lt;/authorizers&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;If your provider is in fact still commented out, that will explain why your users.xml and authorizations.xml files are not being correctly built on startup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2020 14:08:55 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288553#M213721</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2020-01-29T14:08:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288591#M213741</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;you are correct, I have uncommented the authorizers file-provider part now, this time generated users.xml and authorizers.xml with content but still same authorization issue&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;from cert prompt :&lt;/P&gt;&lt;P class="p1"&gt;Issued to: CN=NifiAdmin,OU=ApacheNIfi&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;authorizers config :&lt;/P&gt;&lt;P class="p1"&gt;&amp;lt;property name="Initial Admin Identity"&amp;gt;CN=NifiAdmin, OU=ApacheNIfi&amp;lt;/property&amp;gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;seems I have added space in config file , let me correct it&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2020 00:54:36 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288591#M213741</guid>
      <dc:creator>DivyaKaki</dc:creator>
      <dc:date>2020-01-30T00:54:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288592#M213742</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;still got the authorization issue [&lt;/P&gt;&lt;DIV class="message-pane-content"&gt;No applicable policies could be found. Contact the system administrator.&lt;/DIV&gt;&lt;P&gt;]here is the cert prompt from browser&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Issued to: CN=NifiAdmin,OU=ApacheNIfi&lt;BR /&gt;Serial number: 01:6F:E9:2D:9F:5C:00:00:00:00&lt;BR /&gt;Valid from January 27, 2020, 4:44:38 PM GMT-6 to January 26, 2023, 4:44:38 PM GMT-6&lt;BR /&gt;Key Usages: Signing,Non-repudiation,Key Encipherment,Data Encipherment,Key Agreement&lt;BR /&gt;Issued by: CN=localhost,OU=NIFI&lt;BR /&gt;Stored on: Software Security Devic&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tried from all nodes from the cluster, same error from all the nodes&amp;nbsp;&lt;/P&gt;&lt;P&gt;but i have generated client cert&amp;nbsp;'CN=NifiAdmin, OU=ApacheNIfi_UCSD'&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;sh tls-toolkit.sh standalone -n 'localhost(3)' -C 'CN=NifiAdmin, OU=ApacheNIfi' -o /opt/nifi-toolkit-1.9.2/certs/&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;authorizer&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;file-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAuthorizer&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Users File"&amp;gt;./conf/users.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Initial Admin Identity"&amp;gt;CN=NifiAdmin, OU=ApacheNIfi&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;property name="Node Identity 1"&amp;gt;CN=localhost, OU=NIFI&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/authorizer&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;users.log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2020-01-30 01:11:56,526 INFO [NiFi Web Server-36] o.a.n.w.a.c.IllegalStateExceptionMapper java.lang.IllegalStateException: OpenId Connect is not configured.. Returning Conflict response.&lt;BR /&gt;2020-01-30 01:11:56,633 INFO [NiFi Web Server-28] o.a.n.w.s.NiFiAuthenticationFilter Attempting request for (CN=NifiAdmin, OU=ApacheNIfi) GET https://localhost:9696/nifi-api/flow/current-user (source ip: 10.175.124.142)&lt;BR /&gt;2020-01-30 01:11:56,633 INFO [NiFi Web Server-28] o.a.n.w.s.NiFiAuthenticationFilter Authentication success for CN=NifiAdmin, OU=ApacheNIfi&lt;BR /&gt;2020-01-30 01:11:56,635 INFO [NiFi Web Server-28] o.a.n.w.a.c.AccessDeniedExceptionMapper identity[CN=NifiAdmin, OU=ApacheNIfi], groups[] does not have permission to access the requested resource. No applicable policies could be found. Returning Forbidden response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;cat users.xml&lt;BR /&gt;&amp;lt;?xml version="1.0" encoding="UTF-8" standalone="yes"?&amp;gt;&lt;BR /&gt;&amp;lt;tenants&amp;gt;&lt;BR /&gt;&amp;lt;groups/&amp;gt;&lt;BR /&gt;&amp;lt;users&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="c22273fa-7ed3-38a9-8994-3ed5fea5d23" identity="CN=localhost, OU=NIFI"/&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="5e87a461-6268-359c-97ba-b27d32bc2b" identity="CN=NifiAdmin, OU=ApacheNIfi"/&amp;gt;&lt;BR /&gt;&amp;lt;/users&amp;gt;&lt;BR /&gt;&amp;lt;/tenants&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i see client cert generated is updated correctly in authorzers.xml but still when I'm trying to log in, getting an authorization error&amp;nbsp;&lt;/P&gt;&lt;DIV class="message-pane-content"&gt;No applicable policies could be found. Contact the system administrator.&lt;/DIV&gt;</description>
      <pubDate>Thu, 30 Jan 2020 01:52:22 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288592#M213742</guid>
      <dc:creator>DivyaKaki</dc:creator>
      <dc:date>2020-01-30T01:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288596#M213743</link>
      <description>&lt;P&gt;users.xml and authorizations.xml&lt;/P&gt;&lt;P&gt;I even see&amp;nbsp;&amp;lt;user identifier="5e87a461-6268-359c-97ba-b27d32bc2b86" identity="CN=NifiAdmin, OU=ApacheNIfi"/&amp;nbsp; is having polices in authorizations.xml file&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;cat authorizations.xml&lt;BR /&gt;&amp;lt;?xml version="1.0" encoding="UTF-8" standalone="yes"?&amp;gt;&lt;BR /&gt;&amp;lt;authorizations&amp;gt;&lt;BR /&gt;&amp;lt;policies&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="f99bccd1-a30e-3e4a-98a2-dbc708edc67f" resource="/flow" action="R"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="5e87a461-6268-359c-97ba-b27d32bc2b86"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="0c88c9dc-6b8c-3146-841a-491a43f4bb5e" resource="/data/process-groups/e5866460-016f-1000-642a-23196f1563d1" action="R"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="5e87a461-6268-359c-97ba-b27d32bc2b86"/&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="c22273fa-7ed3-38a9-8994-3ed5fea5d234"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="b47dc88e-58b2-34c3-a232-4def8d5cfac9" resource="/data/process-groups/e5866460-016f-1000-642a-23196f1563d1" action="W"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="5e87a461-6268-359c-97ba-b27d32bc2b86"/&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="c22273fa-7ed3-38a9-8994-3ed5fea5d234"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="6e975e1b-0e66-304e-b749-2d0d83b2b2b7" resource="/process-groups/e5866460-016f-1000-642a-23196f1563d1" action="R"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="5e87a461-6268-359c-97ba-b27d32bc2b86"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="ed129295-2501-3536-9280-616f7bbf8a5b" resource="/process-groups/e5866460-016f-1000-642a-23196f1563d1" action="W"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="5e87a461-6268-359c-97ba-b27d32bc2b86"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="b8775bd4-704a-34c6-987b-84f2daf7a515" resource="/restricted-components" action="W"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="5e87a461-6268-359c-97ba-b27d32bc2b86"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="627410be-1717-35b4-a06f-e9362b89e0b7" resource="/tenants" action="R"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="5e87a461-6268-359c-97ba-b27d32bc2b86"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="15e4e0bd-cb28-34fd-8587-f8d15162cba5" resource="/tenants" action="W"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="5e87a461-6268-359c-97ba-b27d32bc2b86"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="ff96062a-fa99-36dc-9942-0f6442ae7212" resource="/policies" action="R"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="5e87a461-6268-359c-97ba-b27d32bc2b86"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="ad99ea98-3af6-3561-ae27-5bf09e1d969d" resource="/policies" action="W"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="5e87a461-6268-359c-97ba-b27d32bc2b86"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="2e1015cb-0fed-3005-8e0d-722311f21a03" resource="/controller" action="R"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="5e87a461-6268-359c-97ba-b27d32bc2b86"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="c6322e6c-4cc1-3bcc-91b3-2ed2111674cf" resource="/controller" action="W"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="5e87a461-6268-359c-97ba-b27d32bc2b86"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="287edf48-da72-359b-8f61-da5d4c45a270" resource="/proxy" action="W"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="c22273fa-7ed3-38a9-8994-3ed5fea5d234"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;/policies&amp;gt;&lt;BR /&gt;&amp;lt;/authorizations&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;cat users.xml&lt;BR /&gt;&amp;lt;?xml version="1.0" encoding="UTF-8" standalone="yes"?&amp;gt;&lt;BR /&gt;&amp;lt;tenants&amp;gt;&lt;BR /&gt;&amp;lt;groups/&amp;gt;&lt;BR /&gt;&amp;lt;users&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="c22273fa-7ed3-38a9-8994-3ed5fea5d234" identity="CN=localhost, OU=NIFI"/&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="5e87a461-6268-359c-97ba-b27d32bc2b86" identity="CN=NifiAdmin, OU=ApacheNIfi"/&amp;gt;&lt;BR /&gt;&amp;lt;/users&amp;gt;&lt;BR /&gt;&amp;lt;/tenants&amp;gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2020 03:56:00 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288596#M213743</guid>
      <dc:creator>DivyaKaki</dc:creator>
      <dc:date>2020-01-30T03:56:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288597#M213744</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;i am on nifi 1.9.2 and nifi.property file updated&amp;nbsp;nifi.security.user.authorizer=file-provider&lt;/P&gt;&lt;P&gt;# security properties #&lt;BR /&gt;nifi.sensitive.props.key=&lt;BR /&gt;nifi.sensitive.props.key.protected=&lt;BR /&gt;nifi.sensitive.props.algorithm=PBEWITHMD5AND256BITAES-CBC-OPENSSL&lt;BR /&gt;nifi.sensitive.props.provider=BC&lt;BR /&gt;nifi.sensitive.props.additional.keys=&lt;/P&gt;&lt;P&gt;nifi.security.keystore=./conf/keystore.jks&lt;BR /&gt;nifi.security.keystoreType=jks&lt;BR /&gt;nifi.security.keystorePasswd=xxxx&lt;BR /&gt;nifi.security.keyPasswd=xxxx&lt;BR /&gt;nifi.security.truststore=./conf/truststore.jks&lt;BR /&gt;nifi.security.truststoreType=jks&lt;BR /&gt;nifi.security.truststorePasswd=xxxx&lt;BR /&gt;nifi.security.needClientAuth=true&lt;BR /&gt;#nifi.security.user.authorizer=managed-authorizer&lt;/P&gt;&lt;P&gt;nifi.security.user.authorizer=file-provider&lt;BR /&gt;#nifi.security.user.login.identity.provider=ldap-provider&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the latest error is&lt;/P&gt;&lt;DIV class="message-pane-title"&gt;An unexpected error has occurred .&amp;nbsp; HOME&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="message-pane-content"&gt;javax.net.ssl.SSLPeerUnverifiedException: Hostname ip-10-175-xxx-xxx.abc.com not verified: certificate: sha256/sYgF90RpxFPzPnZJD0jMl0jB/dwS/OgHWxTZ1Ba9TPs= DN: CN=localhost, OU=NIFI subjectAltNames: [localhost]&lt;/DIV&gt;&lt;DIV class="message-pane-content"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="message-pane-content"&gt;2020-01-30 05:35:03,465 INFO [NiFi Web Server-422441] o.a.n.w.a.c.IllegalStateExceptionMapper java.lang.IllegalStateException: Kerberos ticket login not supported by this NiFi.. Returning Conflict response.&lt;BR /&gt;2020-01-30 05:35:03,662 INFO [NiFi Web Server-377545] o.a.n.w.a.c.IllegalStateExceptionMapper java.lang.IllegalStateException: OpenId Connect is not configured.. Returning Conflict response.&lt;BR /&gt;2020-01-30 05:35:03,766 INFO [NiFi Web Server-422441] o.a.n.w.s.NiFiAuthenticationFilter Attempting request for (CN=NifiAdmin, OU=ApacheNIfi) GET https://localhost:9696/nifi-api/flow/current-user (source ip: 10.175.xxx.xxx)&lt;BR /&gt;2020-01-30 05:35:03,768 INFO [NiFi Web Server-422441] o.a.n.w.s.NiFiAuthenticationFilter Authentication success for CN=NifiAdmin, OU=ApacheNIfi&lt;/DIV&gt;&lt;DIV class="message-pane-content"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="message-pane hidden"&gt;&lt;DIV class="message-pane-message-box"&gt;&lt;DIV class="message-pane-title"&gt;An unexpected error has occurred&lt;/DIV&gt;&lt;DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN class="link"&gt;home&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;DIV class="message-pane-content"&gt;javax.net.ssl.SSLPeerUnverifiedException: Hostname ip-10-175-124-250.ucsd.edu not verified: certificate: sha256/sYgF90RpxFPzPnZJD0jMl0jB/dwS/OgHWxTZ1Ba9TPs= DN: CN=localhost, OU=NIFI subjectAltNames: [localhost]&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="message-pane hidden"&gt;&lt;DIV class="message-pane-message-box"&gt;&lt;DIV class="message-pane-title"&gt;An unexpected error has occurred&lt;/DIV&gt;&lt;DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN class="link"&gt;home&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;DIV class="message-pane-content"&gt;javax.net.ssl.SSLPeerUnverifiedException: Hostname ip-10-175-124-250.ucsd.edu not verified: certificate: sha256/sYgF90RpxFPzPnZJD0jMl0jB/dwS/OgHWxTZ1Ba9TPs= DN: CN=localhost, OU=NIFI subjectAltNames: [localhost]&lt;/DIV&gt;&lt;DIV class="message-pane-content"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="message-pane-content"&gt;&lt;DIV class="message-pane hidden"&gt;&lt;DIV class="message-pane-message-box"&gt;&lt;DIV class="message-pane-title"&gt;An unexpected error has occurred&lt;/DIV&gt;&lt;DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN class="link"&gt;home&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;DIV class="message-pane-content"&gt;javax.net.ssl.SSLPeerUnverifiedException: Hostname ip-10-175-124-250.ucsd.edu not verified: certificate: sha256/sYgF90RpxFPzPnZJD0jMl0jB/dwS/OgHWxTZ1Ba9TPs= DN: CN=localhost, OU=NIFI subjectAltNames: [localhost]&lt;DIV class="message-pane hidden"&gt;&lt;DIV class="message-pane-message-box"&gt;&lt;DIV class="message-pane-title"&gt;An unexpected error has occurred&lt;/DIV&gt;&lt;DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN class="link"&gt;home&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;DIV class="message-pane-content"&gt;javax.net.ssl.SSLPeerUnverifiedException: Hostname ip-10-175-124-250.ucsd.edu not verified: certificate: sha256/sYgF90RpxFPzPnZJD0jMl0jB/dwS/OgHWxTZ1Ba9TPs= DN: CN=localhost, OU=NIFI subjectAltNames: [localhost]&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 30 Jan 2020 05:41:35 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288597#M213744</guid>
      <dc:creator>DivyaKaki</dc:creator>
      <dc:date>2020-01-30T05:41:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288678#M213796</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;just want to let you know, i have generated certs using below, belive in this case no need to merge truststore, as it wll be same for all localhost[1-3]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;sh tls-toolkit.sh standalone -n 'localhost(3)' -C 'CN=NifiAdmin, OU=ApacheNIfi' -o /opt/nifi-toolkit-1.9.2/certs/ssl&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;im still not sure why it is complaining about TLS ssl handshake&lt;/P&gt;&lt;P class="p1"&gt;An unexpected error has occurred&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;home&lt;/LI&gt;&lt;/UL&gt;&lt;P class="p1"&gt;javax.net.ssl.SSLPeerUnverifiedException: Hostname ip-10-175-124-250.xxx.com not verified: certificate: sha256/paSWoCMWrMfMuhIjqgLJlyF5clz1RGvEHTDuwhHKeZo= DN: CN=localhost, OU=NIFI subjectAltNames: [localhost]&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;authorizers.xml , same for all 3 nodes&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;authorizer&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;file-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAuthorizer&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Users File"&amp;gt;./conf/users.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Initial Admin Identity"&amp;gt;CN=NifiAdmin, OU=ApacheNIfi&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;property name="Node Identity 1"&amp;gt;CN=localhost, OU=NIFI&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/authorizer&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;users.xml&lt;BR /&gt;&amp;lt;?xml version="1.0" encoding="UTF-8" standalone="yes"?&amp;gt;&lt;BR /&gt;&amp;lt;tenants&amp;gt;&lt;BR /&gt;&amp;lt;groups/&amp;gt;&lt;BR /&gt;&amp;lt;users&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="c22273fa-7ed3-38a9-8994-3ed5fea5d234" identity="CN=localhost, OU=NIFI"/&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="5e87a461-6268-359c-97ba-b27d32bc2b86" identity="CN=NifiAdmin, OU=ApacheNIfi"/&amp;gt;&lt;BR /&gt;&amp;lt;/users&amp;gt;&lt;BR /&gt;&amp;lt;/tenants&amp;gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;Appreciate if you can help&lt;/P&gt;&lt;DIV class="message-pane hidden"&gt;&lt;DIV class="message-pane-message-box"&gt;&lt;DIV class="message-pane-title"&gt;An unexpected error has occurred&lt;/DIV&gt;&lt;DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN class="link"&gt;home&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;DIV class="message-pane-content"&gt;javax.net.ssl.SSLPeerUnverifiedException: Hostname ip-10-175-124-250.ucsd.edu not verified: certificate: sha256/paSWoCMWrMfMuhIjqgLJlyF5clz1RGvEHTDuwhHKeZo= DN: CN=localhost, OU=NIFI subjectAltNames: [localhost]&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="message-pane hidden"&gt;&lt;DIV class="message-pane-message-box"&gt;&lt;DIV class="message-pane-title"&gt;An unexpected error has occurred&lt;/DIV&gt;&lt;DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN class="link"&gt;home&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;DIV class="message-pane-content"&gt;javax.net.ssl.SSLPeerUnverifiedException: Hostname ip-10-175-124-250.ucsd.edu not verified: certificate: sha256/paSWoCMWrMfMuhIjqgLJlyF5clz1RGvEHTDuwhHKeZo= DN: CN=localhost, OU=NIFI subjectAltNames: [localhost]&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="message-pane hidden"&gt;&lt;DIV class="message-pane-message-box"&gt;&lt;DIV class="message-pane-title"&gt;An unexpected error has occurred&lt;/DIV&gt;&lt;DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN class="link"&gt;home&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;DIV class="message-pane-content"&gt;javax.net.ssl.SSLPeerUnverifiedException: Hostname ip-10-175-124-250.ucsd.edu not verified: certificate: sha256/paSWoCMWrMfMuhIjqgLJlyF5clz1RGvEHTDuwhHKeZo= DN: CN=localhost, OU=NIFI subjectAltNames: [localhost]&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2020 14:04:05 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288678#M213796</guid>
      <dc:creator>DivyaKaki</dc:creator>
      <dc:date>2020-01-30T14:04:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288721#M213830</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/73471"&gt;@DivyaKaki&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;It is complaining because the hostname is "&lt;SPAN&gt;ip-10-175-124-250.xxx.com" but that hostname does not exist as SAN in your certificate.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I would also be concerned that in the nifi.properties files on each of you nodes you are using localhost as your hostnames.&amp;nbsp; That will not work since that would already resolve to the server itself, so nodes would not be successful at heart beating to one another.&lt;BR /&gt;&lt;BR /&gt;As i mentioned much earlier, the keystore has requirements:&lt;BR /&gt;1. keystore can only contain ONE PrivateKeyEntry&lt;BR /&gt;2. PrivateKeyEntry must support clientAuth and serverAuth EKU&lt;BR /&gt;3. PrivateKeyEntry must contain at least one Subject Alternative Name (SAN) that matches the hostname of the server on which the certificate is being used.&amp;nbsp; In your case you have "localhost" as a SAN entry, but no SAN entry for "ip-10-175-124-250.xxx.com"&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This kinda loops back around to the original command i provided that produced keystores not using localhost.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;On a side note, looks like after removing the users.xml, you got an expected users.xml created.&lt;BR /&gt;&lt;BR /&gt;Now you may be able to cheat here, but I strongly recommend against it for security reasons (but using localhost is already a bad security idea).&amp;nbsp; In the nifi.properties file, you could add each of your servers hostnames to the "nifi.web.proxy.host" property (comma separated list with no spaces).&lt;BR /&gt;&lt;BR /&gt;Matt&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2020 20:03:13 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288721#M213830</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2020-01-30T20:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288886#M213933</link>
      <description>&lt;P&gt;thanks,&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp; for helping me on this, really helped for learning this stuff.&lt;/P&gt;&lt;P&gt;I am now working on using the queries you shared with Harden the security.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;sh /opt/nifi-toolkit-1.9.2/bin/tls-toolkit.sh standalone -B&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;mypasswd -C 'CN=nifiadmin, OU=NIFI' -n 'ip-10-175-12x-xx.abc.com,ip-10-175-12x-xxx.abc.com' --nifiDnPrefix 'CN=' --nifiDnSuffix ', OU=NIFI' -o /tmp/certs_divya/ -K mypasswd -P mypasswd -S mypasswd&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-rw-------. 1 root root 3437 Feb 3 04:46 CN=nifiadmin_OU=NIFI.p12&lt;BR /&gt;-rw-------. 1 root root 29 Feb 3 04:46 CN=nifiadmin_OU=NIFI.password&lt;BR /&gt;drwx------. 2 root root 71 Feb 3 04:46 ip-10-175-12x-xxx.abc.com&lt;BR /&gt;drwx------. 2 root root 71 Feb 3 04:46 ip-10-175-12x-xxx.abc.com&lt;BR /&gt;-rw-------. 1 root root 1200 Feb 3 04:46 nifi-cert.pem&lt;BR /&gt;-rw-------. 1 root root 1675 Feb 3 04:46 nifi-key.key&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;quick question&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) validate Keystore of 1 host:&lt;/P&gt;&lt;P&gt;i am seeing two certs in a Keystore as below&amp;nbsp; but the issuer is localhost whereas CN is a hostname&amp;nbsp;&lt;/P&gt;&lt;P&gt;is this correct . ?&lt;/P&gt;&lt;P&gt;2)&lt;/P&gt;&lt;P&gt;can I use one truststore from any host and copy to others or do I need to still merge the truststores&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Certificate[1]:&lt;BR /&gt;Owner: CN=ip-10-175-12x-xxx.abc.com, OU=NIFI&lt;BR /&gt;Issuer: CN=localhost, OU=NIFI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Certificate[2]:&lt;BR /&gt;Owner: CN=localhost, OU=NIFI&lt;BR /&gt;Issuer: CN=localhost, OU=NIFI&lt;/P&gt;&lt;P&gt;--------&lt;/P&gt;&lt;P&gt;keytool -list -v -keystore keystore.jks&lt;/P&gt;&lt;P&gt;Enter keystore password:&lt;BR /&gt;Keystore type: jks&lt;BR /&gt;Keystore provider: SUN&lt;/P&gt;&lt;P&gt;Your keystore contains 1 entry&lt;/P&gt;&lt;P&gt;Alias name: nifi-key&lt;BR /&gt;Creation date: Feb 3, 2020&lt;BR /&gt;Entry type: PrivateKeyEntry&lt;BR /&gt;Certificate chain length: 2&lt;BR /&gt;Certificate[1]:&lt;BR /&gt;Owner: CN=ip-10-175-12x-xxx.abc.com, OU=NIFI&lt;BR /&gt;Issuer: CN=localhost, OU=NIFI&lt;BR /&gt;Serial number: 170095f43a400000000&lt;BR /&gt;Valid from: Mon Feb 03 04:46:43 UTC 2020 until: Thu Feb 02 04:46:43 UTC 2023&lt;BR /&gt;Certificate fingerprints:&lt;BR /&gt;MD5: B0:FC:09:D3:A3:40:67:AD:38:EC:30:56:A6:CB:53:89&lt;BR /&gt;SHA1: A1:0E:F9:AC:20:B7:9A:AF:D2:C1:B2:DB:1B:80:3F:3C:01:1C:80:3F&lt;BR /&gt;SHA256: 8F:18:EC:DD:2D:DC:B9:70:32:07:6B:60:66:7E:21:E5:66:6A:79:FF:65:5E:66:DD:D0:16:F8:C0:8F:87:03:3A&lt;BR /&gt;Signature algorithm name: SHA256withRSA&lt;BR /&gt;Subject Public Key Algorithm: 2048-bit RSA key&lt;BR /&gt;Version: 3&lt;/P&gt;&lt;P&gt;Extensions:&lt;/P&gt;&lt;P&gt;#1: ObjectId: 2.5.29.35 Criticality=false&lt;BR /&gt;AuthorityKeyIdentifier [&lt;BR /&gt;KeyIdentifier [&lt;BR /&gt;0000: A4 D7 F2 A6 D0 76 CF 42 9E 78 D0 78 20 DF 63 7B .....v.B.x.x .c.&lt;BR /&gt;0010: FA E8 F2 BC ....&lt;BR /&gt;]&lt;BR /&gt;]&lt;/P&gt;&lt;P&gt;#2: ObjectId: 2.5.29.19 Criticality=false&lt;BR /&gt;BasicConstraints:[&lt;BR /&gt;CA:false&lt;BR /&gt;PathLen: undefined&lt;BR /&gt;]&lt;/P&gt;&lt;P&gt;#3: ObjectId: 2.5.29.37 Criticality=false&lt;BR /&gt;ExtendedKeyUsages [&lt;BR /&gt;clientAuth&lt;BR /&gt;serverAuth&lt;BR /&gt;]&lt;/P&gt;&lt;P&gt;#4: ObjectId: 2.5.29.15 Criticality=true&lt;BR /&gt;KeyUsage [&lt;BR /&gt;DigitalSignature&lt;BR /&gt;Non_repudiation&lt;BR /&gt;Key_Encipherment&lt;BR /&gt;Data_Encipherment&lt;BR /&gt;Key_Agreement&lt;BR /&gt;]&lt;/P&gt;&lt;P&gt;#5: ObjectId: 2.5.29.17 Criticality=false&lt;BR /&gt;SubjectAlternativeName [&lt;BR /&gt;DNSName: ip-10-175-124-182.ucsd.edu&lt;BR /&gt;]&lt;/P&gt;&lt;P&gt;#6: ObjectId: 2.5.29.14 Criticality=false&lt;BR /&gt;SubjectKeyIdentifier [&lt;BR /&gt;KeyIdentifier [&lt;BR /&gt;0000: 32 1C 2E 86 0C CA 3A E9 1A B8 FD 8E B0 F7 D5 52 2.....:........R&lt;BR /&gt;0010: A9 25 EB 74 .%.t&lt;BR /&gt;]&lt;BR /&gt;]&lt;/P&gt;&lt;P&gt;Certificate[2]:&lt;BR /&gt;Owner: CN=localhost, OU=NIFI&lt;BR /&gt;Issuer: CN=localhost, OU=NIFI&lt;BR /&gt;Serial number: 170095f420d00000000&lt;BR /&gt;Valid from: Mon Feb 03 04:46:42 UTC 2020 until: Thu Feb 02 04:46:42 UTC 2023&lt;BR /&gt;Certificate fingerprints:&lt;BR /&gt;MD5: 8A:13:63:54:E7:E7:E3:E6:FC:16:9E:3B:D0:9D:41:58&lt;BR /&gt;SHA1: F5:D0:31:33:5C:AD:9A:39:B5:BF:33:6D:5E:52:A4:F0:5F:99:4C:10&lt;BR /&gt;SHA256: 70:1A:ED:41:B7:9C:51:62:B5:26:42:A0:31:9D:D7:04:79:78:FF:9B:89:26:DF:74:24:62:EF:EF:85:4C:E1:E5&lt;BR /&gt;Signature algorithm name: SHA256withRSA&lt;BR /&gt;Subject Public Key Algorithm: 2048-bit RSA key&lt;BR /&gt;Version: 3&lt;/P&gt;&lt;P&gt;Extensions:&lt;/P&gt;&lt;P&gt;#1: ObjectId: 2.5.29.35 Criticality=false&lt;BR /&gt;AuthorityKeyIdentifier [&lt;BR /&gt;KeyIdentifier [&lt;BR /&gt;0000: A4 D7 F2 A6 D0 76 CF 42 9E 78 D0 78 20 DF 63 7B .....v.B.x.x .c.&lt;BR /&gt;0010: FA E8 F2 BC ....&lt;BR /&gt;]&lt;BR /&gt;]&lt;/P&gt;&lt;P&gt;#2: ObjectId: 2.5.29.19 Criticality=false&lt;BR /&gt;BasicConstraints:[&lt;BR /&gt;CA:true&lt;BR /&gt;PathLen:2147483647&lt;BR /&gt;]&lt;/P&gt;&lt;P&gt;#3: ObjectId: 2.5.29.37 Criticality=false&lt;BR /&gt;ExtendedKeyUsages [&lt;BR /&gt;clientAuth&lt;BR /&gt;serverAuth&lt;BR /&gt;]&lt;/P&gt;&lt;P&gt;#4: ObjectId: 2.5.29.15 Criticality=true&lt;BR /&gt;KeyUsage [&lt;BR /&gt;DigitalSignature&lt;BR /&gt;Non_repudiation&lt;BR /&gt;Key_Encipherment&lt;BR /&gt;Data_Encipherment&lt;BR /&gt;Key_Agreement&lt;BR /&gt;Key_CertSign&lt;BR /&gt;Crl_Sign&lt;BR /&gt;]&lt;/P&gt;&lt;P&gt;#5: ObjectId: 2.5.29.14 Criticality=false&lt;BR /&gt;SubjectKeyIdentifier [&lt;BR /&gt;KeyIdentifier [&lt;BR /&gt;0000: A4 D7 F2 A6 D0 76 CF 42 9E 78 D0 78 20 DF 63 7B .....v.B.x.x .c.&lt;BR /&gt;0010: FA E8 F2 BC ....&lt;BR /&gt;]&lt;BR /&gt;]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*******************************************&lt;BR /&gt;*******************************************&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Warning:&lt;BR /&gt;The JKS keystore uses a proprietary format. It is recommended to migrate to PKCS12 which is an industry standard format using "keytool -importkeystore -srckeystore keystore.jks -destkeystore keystore.jks -deststoretype pkcs12"&lt;/P&gt;</description>
      <pubDate>Mon, 03 Feb 2020 05:05:40 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/288886#M213933</guid>
      <dc:creator>DivyaKaki</dc:creator>
      <dc:date>2020-02-03T05:05:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to Generate Certs to secure 3 node nifi cluster and configs</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/289023#M213989</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/73471"&gt;@DivyaKaki&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are trying to harden your security, using localhost as the CN for your certificate authority is not good security practice.&lt;BR /&gt;&lt;BR /&gt;Your keystore PrivateKeyEntry structure is good.&amp;nbsp; You have 1 entry.&amp;nbsp; That one entry includes two certificates.&amp;nbsp; The first is for the server on which this certificate is being used.&amp;nbsp; The second is the public certificate for the CA that signed certificate 1 in this chain.&amp;nbsp; Certificate 1 has the proper EKUs and a good SAN.&lt;BR /&gt;&lt;BR /&gt;Please take a moment to accept the answers that helped solved your query.&lt;BR /&gt;&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Mon, 03 Feb 2020 22:24:33 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-Generate-Certs-to-secure-3-node-nifi-cluster-and/m-p/289023#M213989</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2020-02-03T22:24:33Z</dc:date>
    </item>
  </channel>
</rss>

