<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Nifi untrusted proxy caused by Untrusted Proxy Exception thrown by X509AuthenticationProvider in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Nifi-untrusted-proxy-caused-by-Untrusted-Proxy-Exception/m-p/318384#M227460</link>
    <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/88947"&gt;@myuintelli2021&lt;/a&gt;,&amp;nbsp;did&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;'s response&amp;nbsp;&lt;SPAN&gt;resolve your issue? If so, can you please mark it as the solution? It will make it easier for others to find the answer in the future.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 14 Jun 2021 06:01:33 GMT</pubDate>
    <dc:creator>VidyaSargur</dc:creator>
    <dc:date>2021-06-14T06:01:33Z</dc:date>
    <item>
      <title>Nifi untrusted proxy caused by Untrusted Proxy Exception thrown by X509AuthenticationProvider</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-untrusted-proxy-caused-by-Untrusted-Proxy-Exception/m-p/317796#M227327</link>
      <description>&lt;P&gt;I have setup a 3-node nifi cluster (i.e. nifi2, nifi3, and nifi4) using version 1.13.2 and I have enabled security and TLS using nifi tool kit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, I have configured the nifi cluster to authenticate using openid connect against azure ad.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;During the login, the browser was redirected to the azure portal for authentication, after successful login, it was redirected back to the nifi node but got "Untrusted proxy error" with following stack trace on every node:&lt;BR /&gt;...&lt;BR /&gt;2021-06-04 17:49:09,091 DEBUG [NiFi Web Server-17] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: null&lt;BR /&gt;2021-06-04 17:49:09,102 DEBUG [NiFi Web Server-17] o.a.n.w.s.x509.X509CertificateExtractor No client certificate found in request.&lt;BR /&gt;2021-06-04 17:49:09,102 DEBUG [NiFi Web Server-17] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: null&lt;BR /&gt;2021-06-04 17:49:09,107 INFO [NiFi Web Server-17] o.a.n.w.s.NiFiAuthenticationFilter Attempting request for (&amp;lt;JWT token&amp;gt;) GET &lt;A href="https://nifi4.{valid_domain}.com/nifi-api/flow/current-user" target="_blank" rel="noopener"&gt;https://nifi4.{valid_domain}.com/nifi-api/flow/current-user&lt;/A&gt; (source ip: 10.2.2.7)&lt;BR /&gt;2021-06-04 17:49:09,210 INFO [NiFi Web Server-17] o.a.n.w.s.NiFiAuthenticationFilter Authentication success for user@{valid_domain}.com&lt;BR /&gt;2021-06-04 17:49:09,211 DEBUG [NiFi Web Server-17] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: user@{valid_domain}.com&lt;BR /&gt;2021-06-04 17:49:09,211 DEBUG [NiFi Web Server-17] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: user@{valid_domain}.com&lt;BR /&gt;2021-06-04 17:49:09,211 DEBUG [NiFi Web Server-17] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: user@{valid_domain}.com&lt;BR /&gt;2021-06-04 17:49:09,891 DEBUG [NiFi Web Server-15] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: null&lt;BR /&gt;2021-06-04 17:49:09,891 DEBUG [NiFi Web Server-15] o.a.n.w.s.x509.X509AuthenticationFilter Raw X-ProxiedEntitiesChain - &amp;lt;user@{valid_domain}.com&amp;gt;&lt;BR /&gt;2021-06-04 17:49:09,891 DEBUG [NiFi Web Server-15] o.a.n.w.s.x509.X509AuthenticationFilter Raw X-ProxiedEntityGroups - &amp;lt;&amp;gt;&lt;BR /&gt;2021-06-04 17:49:09,892 INFO [NiFi Web Server-15] o.a.n.w.s.NiFiAuthenticationFilter Attempting request for (&amp;lt;user@{valid_domain}.com&amp;gt;&amp;lt;CN=nifi4.{valid_domain}.com, OU=NIFI&amp;gt;) GET &lt;A href="https://nifi4.{valid_domain}.com/nifi-api/flow/current-user" target="_blank" rel="noopener"&gt;https://nifi4.{valid_domain}.com/nifi-api/flow/current-user&lt;/A&gt; (source ip: 10.2.2.7)&lt;BR /&gt;2021-06-04 17:49:09,896 WARN [NiFi Web Server-15] o.a.n.w.s.NiFiAuthenticationFilter Rejecting access to web api: Untrusted proxy CN=nifi4.{valid_domain}.com, OU=NIFI&lt;BR /&gt;2021-06-04 17:49:09,897 DEBUG [NiFi Web Server-15] o.a.n.w.s.NiFiAuthenticationFilter&lt;BR /&gt;org.apache.nifi.web.security.UntrustedProxyException: Untrusted proxy CN=nifi4.{valid_domain}.com, OU=NIFI&lt;BR /&gt;at org.apache.nifi.web.security.x509.X509AuthenticationProvider.authenticate(X509AuthenticationProvider.java:133)&lt;BR /&gt;at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:174)&lt;BR /&gt;at org.apache.nifi.web.security.NiFiAuthenticationFilter.authenticate(NiFiAuthenticationFilter.java:79)&lt;BR /&gt;at org.apache.nifi.web.security.NiFiAuthenticationFilter.doFilter(NiFiAuthenticationFilter.java:59)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:331)&lt;BR /&gt;at org.springframework.web.filter.CorsFilter.doFilterInternal(CorsFilter.java:96)&lt;BR /&gt;at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:331)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:214)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:177)&lt;BR /&gt;at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:347)&lt;BR /&gt;at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:263)&lt;BR /&gt;at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193)&lt;BR /&gt;at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1601)&lt;BR /&gt;at org.apache.nifi.web.filter.TimerFilter.doFilter(TimerFilter.java:51)&lt;BR /&gt;at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193)&lt;BR /&gt;at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1601)&lt;BR /&gt;at org.apache.nifi.web.filter.ExceptionFilter.doFilter(ExceptionFilter.java:46)&lt;BR /&gt;at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:201)&lt;BR /&gt;at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1601)&lt;BR /&gt;at org.eclipse.jetty.servlets.DoSFilter.doFilterChain(DoSFilter.java:487)&lt;BR /&gt;at org.eclipse.jetty.servlets.DoSFilter.doFilter(DoSFilter.java:336)&lt;BR /&gt;at org.eclipse.jetty.servlets.DoSFilter.doFilter(DoSFilter.java:301)&lt;BR /&gt;at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193)&lt;BR /&gt;at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1601)&lt;BR /&gt;at org.apache.nifi.web.security.headers.StrictTransportSecurityFilter.doFilter(StrictTransportSecurityFilter.java:48)&lt;BR /&gt;at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193)&lt;BR /&gt;at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1601)&lt;BR /&gt;at org.apache.nifi.web.security.headers.XContentTypeOptionsFilter.doFilter(XContentTypeOptionsFilter.java:48)&lt;BR /&gt;at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193)&lt;BR /&gt;at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1601)&lt;BR /&gt;at org.apache.nifi.web.security.headers.XSSProtectionFilter.doFilter(XSSProtectionFilter.java:48)&lt;BR /&gt;at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193)&lt;BR /&gt;at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1601)&lt;BR /&gt;at org.apache.nifi.web.security.headers.ContentSecurityPolicyFilter.doFilter(ContentSecurityPolicyFilter.java:47)&lt;BR /&gt;at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193)&lt;BR /&gt;at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1601)&lt;BR /&gt;at org.apache.nifi.web.security.headers.XFrameOptionsFilter.doFilter(XFrameOptionsFilter.java:48)&lt;BR /&gt;at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193)&lt;BR /&gt;at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1601)&lt;BR /&gt;at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:548)&lt;BR /&gt;at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:143)&lt;BR /&gt;at org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:602)&lt;BR /&gt;at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:127)&lt;BR /&gt;at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:235)&lt;BR /&gt;at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1624)&lt;BR /&gt;at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:233)&lt;BR /&gt;at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1435)&lt;BR /&gt;at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:188)&lt;BR /&gt;at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:501)&lt;BR /&gt;at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1594)&lt;BR /&gt;at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:186)&lt;BR /&gt;at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1350)&lt;BR /&gt;at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:141)&lt;BR /&gt;at org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:146)&lt;BR /&gt;at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:763)&lt;BR /&gt;at org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:191)&lt;BR /&gt;at org.eclipse.jetty.server.handler.HandlerList.handle(HandlerList.java:59)&lt;BR /&gt;at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:127)&lt;BR /&gt;at org.eclipse.jetty.server.Server.handle(Server.java:516)&lt;BR /&gt;at org.eclipse.jetty.server.HttpChannel.lambda$handle$1(HttpChannel.java:388)&lt;BR /&gt;at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:633)&lt;BR /&gt;at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:380)&lt;BR /&gt;at org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:279)&lt;BR /&gt;at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:311)&lt;BR /&gt;at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:105)&lt;BR /&gt;at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:540)&lt;BR /&gt;at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:395)&lt;BR /&gt;at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:161)&lt;BR /&gt;at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:105)&lt;BR /&gt;at org.eclipse.jetty.io.ChannelEndPoint$1.run(ChannelEndPoint.java:104)&lt;BR /&gt;at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:336)&lt;BR /&gt;at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:313)&lt;BR /&gt;at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:171)&lt;BR /&gt;at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.run(EatWhatYouKill.java:129)&lt;BR /&gt;at org.eclipse.jetty.util.thread.ReservedThreadExecutor$ReservedThread.run(ReservedThreadExecutor.java:383)&lt;BR /&gt;at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:882)&lt;BR /&gt;at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1036)&lt;BR /&gt;at java.lang.Thread.run(Unknown Source)&lt;/P&gt;&lt;P&gt;...&lt;BR /&gt;&lt;BR /&gt;According to the log, the authentication was successful and the node, where authentication happened, tried to broadcast the authentication info to all nodes in the cluster.&lt;BR /&gt;&lt;BR /&gt;But due to an unknown x509 related reason, the proxies (in listening mode) rejected the broadcasted authentication info.&lt;BR /&gt;&lt;BR /&gt;I am aware there is a separate post&amp;nbsp;@&amp;nbsp;&lt;A href="https://community.cloudera.com/t5/Support-Questions/NiFi-Untrusted-proxy/m-p/150447/highlight/false#M112949;" target="_blank" rel="noopener"&gt;https://community.cloudera.com/t5/Support-Questions/NiFi-Untrusted-proxy/m-p/150447/highlight/false#M112949;&lt;/A&gt;&amp;nbsp;I tried the suggestions and but no luck.&lt;BR /&gt;&lt;BR /&gt;What/what certificate might be causing&amp;nbsp;org.apache.nifi.web.security.x509.X509AuthenticationProvider.authenticate(X509AuthenticationProvider.java:133) to fail? How to resolve it?&lt;BR /&gt;&lt;BR /&gt;Many thanks to the help.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 13:45:47 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-untrusted-proxy-caused-by-Untrusted-Proxy-Exception/m-p/317796#M227327</guid>
      <dc:creator>myuintelli2021</dc:creator>
      <dc:date>2021-06-07T13:45:47Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi untrusted proxy caused by Untrusted Proxy Exception thrown by X509AuthenticationProvider</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-untrusted-proxy-caused-by-Untrusted-Proxy-Exception/m-p/317806#M227331</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/88947"&gt;@myuintelli2021&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The "Untrusted Proxy Exception" issue has nothing to do with Authentication. It is an authorization issue within NiFi.&lt;BR /&gt;&lt;BR /&gt;In a NiFi cluster, a users authenticates access to the specific node for which the opened the UI.&amp;nbsp; Subsequent request to access specific resource endpoints (like being able to view the UI), need to be&amp;nbsp; the sent to the cluster coordinator node.&amp;nbsp; The cluster coordinator then replicates that request to all nodes in the cluster and confirms each node responded to that request.&lt;BR /&gt;&lt;BR /&gt;When for example node 1 needs to send a request made my user 1 to node 2, node 1 makes this request on behalf of the authenticated user 1.&amp;nbsp; &amp;nbsp;So node 1 is proxying users 1's request.&amp;nbsp; So within NiFi authorizations, node 1 must be authorized to act as a proxy.&lt;BR /&gt;&lt;BR /&gt;NiFi offers multiple authorizers, so the first question here is which authorizer are you using?&lt;BR /&gt;&lt;BR /&gt;How is your authorizers.xml configured?&lt;BR /&gt;&lt;BR /&gt;A very simple setup that utilizes a local managed authorizer might look like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;authorizers&amp;gt;

    &amp;lt;userGroupProvider&amp;gt;
        &amp;lt;identifier&amp;gt;file-user-group-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileUserGroupProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Users File"&amp;gt;./conf/users.xml&amp;lt;/property&amp;gt;
        &amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Initial User Identity 1"&amp;gt;user@{valid_domain}.com&amp;lt;/property&amp;gt;
        property name="Initial User Identity 2"&amp;gt;CN=nifi2.{valid_domain}.com, OU=NIFI&amp;lt;/property&amp;gt;
        property name="Initial User Identity 3"&amp;gt;CN=nifi3.{valid_domain}.com, OU=NIFI&amp;lt;/property&amp;gt;
        property name="Initial User Identity 4"&amp;gt;CN=nifi4.{valid_domain}.com, OU=NIFI&amp;lt;/property&amp;gt;
    &amp;lt;/userGroupProvider&amp;gt;

    &amp;lt;accessPolicyProvider&amp;gt;
        &amp;lt;identifier&amp;gt;file-access-policy-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAccessPolicyProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="User Group Provider"&amp;gt;file-user-group-provider&amp;lt;/property&amp;gt;
        &amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;
        &amp;lt;property name="Initial Admin Identity"&amp;gt;user@{valid_domain}.com&amp;lt;/property&amp;gt;
        &amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Node Identity 1"&amp;gt;CN=nifi2.{valid_domain}.com, OU=NIFI&amp;lt;/property&amp;gt;
        &amp;lt;property name="Node Identity 1"&amp;gt;CN=nifi3.{valid_domain}.com, OU=NIFI&amp;lt;/property&amp;gt;
        &amp;lt;property name="Node Identity 1"&amp;gt;CN=nifi4.{valid_domain}.com, OU=NIFI&amp;lt;/property&amp;gt;
    &amp;lt;/accessPolicyProvider&amp;gt;

    &amp;lt;authorizer&amp;gt;
        &amp;lt;identifier&amp;gt;managed-authorizer&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.StandardManagedAuthorizer&amp;lt;/class&amp;gt;
        &amp;lt;property name="Access Policy Provider"&amp;gt;file-access-policy-provider&amp;lt;/property&amp;gt;
    &amp;lt;/authorizer&amp;gt;

&amp;lt;/authorizers&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The "&lt;STRONG&gt;file-user-group-provider&lt;/STRONG&gt;" is used here to generate the "&lt;STRONG&gt;users.xml&lt;/STRONG&gt;" file initially.&amp;nbsp; Once created, this provider will not edit it if you make changes (only does anything if the file does NOT exist already).&amp;nbsp; So I would suggest you check this file to make sure yoru initial admin and all 3 of your nodes are present in this file (case sensitive).&lt;BR /&gt;&lt;BR /&gt;The "&lt;STRONG&gt;file-access-policy-provider&lt;/STRONG&gt;" is used here to generate the "&lt;STRONG&gt;authorizations.xml&lt;/STRONG&gt;", which sets up the minimum necessary authorization policies needed fro your initial admin user and your NiFi cluster nodes.&amp;nbsp; If you look in this file, you will see numerous policies that your initial admins assigned UUID should be authorized for.&amp;nbsp; You should also see /proxy policies set in here with the assigned UUIDs from your NiFi nodes.&lt;BR /&gt;&lt;BR /&gt;If these are missing, you should correct your authorizers.xml, remove the existing users.xml and authorizations.xml files, and restart your NiFi so these two files are created again.&lt;BR /&gt;&lt;BR /&gt;Also noticed from your log snippet that it is identifying your nodes via their entire DN (&lt;STRONG&gt;CN=nifi2.{valid_domain}.com, OU=NIFI&lt;/STRONG&gt;).&amp;nbsp; &amp;nbsp;There exists the ability to setup identity mapping properties in the nifi.properties file which are used to reformat authenticated users/nodes.&lt;BR /&gt;&lt;BR /&gt;For example, setting below three properties would change "&lt;STRONG&gt;CN=nifi2.{valid_domain}.com, OU=NIFI&lt;/STRONG&gt;" into "&lt;STRONG&gt;nifi2.{valid_domain}.com&lt;/STRONG&gt;":&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nifi.security.identity.mapping.pattern.dn=^CN=(.*?), OU=(.*?)$
nifi.security.identity.mapping.value.dn=$1
nifi.security.identity.mapping.transform.dn=LOWER&lt;/LI-CODE&gt;&lt;P&gt;Then all you would need to do is have the lowercase&amp;nbsp;"&lt;STRONG&gt;nifi2.{valid_domain}.com&lt;/STRONG&gt;" hostnames populated in your authorizers.xml file.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;You can create as many sets of identity mapping properties as you like as long as each set using a unique string in the property names (above uses "&lt;STRONG&gt;dn&lt;/STRONG&gt;"), but you could create another set using dn2, dn3, kerb2, kerb3, username, etc.&amp;nbsp; &amp;nbsp;Just keep in mind that all authenticated user/client strings will be evaluated by these mapping properties in alphanumeric order and first matching pattern will have its value and transform applied. After that any additional pattern properties would not get evaluated.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If you found this assisted with your query, please take a moment to login and click "accept" on this solution.&lt;BR /&gt;Thank you,&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 14:43:04 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-untrusted-proxy-caused-by-Untrusted-Proxy-Exception/m-p/317806#M227331</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2021-06-07T14:43:04Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi untrusted proxy caused by Untrusted Proxy Exception thrown by X509AuthenticationProvider</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-untrusted-proxy-caused-by-Untrusted-Proxy-Exception/m-p/317811#M227335</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/88947"&gt;@myuintelli2021&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Noticed in another post from you that commented:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;I am aware that there are 3 TLS certificates (one for each server) stored in keystore and 1 self-signed CA (stored in truststore) for nifi cluster. &lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;BR /&gt;NiFi keystore used in each node MUST meet following minimum criteria:&lt;BR /&gt;- Must contain&amp;nbsp;&lt;STRONG&gt;ONLY&lt;/STRONG&gt; 1 PrivateKeyEntry. Having more than 1 PrivateKeyEntry will not work as NiFi will not know which to use.&amp;nbsp;&lt;BR /&gt;- The DN used in the PrivateKeyEntry must not contain wildcards. Since NiFi certificate is used for ClientAuth, the PrivateKeyEntry DN is what is presented to identify the node.&amp;nbsp; Many Authorizers will not support client names with wildcards, plus it is not advisable security wise.&lt;BR /&gt;- The PrivateKeyEntry must have an Extended Key Usage (EKU) that supports both clientAuth and serverAuth&lt;BR /&gt;- The PrivateKeyEntry must have at least 1 SAN entry that matches the hostname for the server on which the keystore is being used.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Assuming since you used the NiFi CA toolkit to build your keystores and truststore files, you are good here. Just adding this detail in case you switch a some point to using private or publicly signed certificates.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 15:05:53 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-untrusted-proxy-caused-by-Untrusted-Proxy-Exception/m-p/317811#M227335</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2021-06-07T15:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi untrusted proxy caused by Untrusted Proxy Exception thrown by X509AuthenticationProvider</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-untrusted-proxy-caused-by-Untrusted-Proxy-Exception/m-p/317934#M227360</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the detailed explanation and suggestion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is my modified authorizer.xml file:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;lt;?xml version="1.0" encoding="UTF-8" standalone="yes"?&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;lt;authorizers&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;userGroupProvider&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;identifier&amp;gt;file-user-group-provider&amp;lt;/identifier&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.FileUserGroupProvider&amp;lt;/class&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;property name="Users File"&amp;gt;./conf/users.xml&amp;lt;/property&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;property name="Initial User Identity 1"&amp;gt;user@{valid_domain}.com&amp;lt;/property&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;property name="Initial User Identity 2"&amp;gt;CN=nifi2.{valid_domain}.com&amp;lt;/property&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;property name="Initial User Identity 3"&amp;gt;CN=nifi3.{valid_domain}.com&amp;lt;/property&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;property name="Initial User Identity 4"&amp;gt;CN=nifi4.{valid_domain}.com&amp;lt;/property&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;/userGroupProvider&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;lt;accessPolicyProvider&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;identifier&amp;gt;file-access-policy-provider&amp;lt;/identifier&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAccessPolicyProvider&amp;lt;/class&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;property name="User Group Provider"&amp;gt;file-user-group-provider&amp;lt;/property&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;property name="Initial Admin Identity"&amp;gt;user@{valid_domain}.com&amp;lt;/property&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;property name="Node Identity 1"&amp;gt;CN=nifi2.{valid_domain}.com&amp;lt;/property&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;property name="Node Identity 2"&amp;gt;CN=nifi3.{valid_domain}.com&amp;lt;/property&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;property name="Node Identity 3"&amp;gt;CN=nifi4.{valid_domain}.com&amp;lt;/property&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;property name="Node Group"&amp;gt;&amp;lt;/property&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;/accessPolicyProvider&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;lt;authorizer&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;identifier&amp;gt;managed-authorizer&amp;lt;/identifier&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.StandardManagedAuthorizer&amp;lt;/class&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;property name="Access Policy Provider"&amp;gt;file-access-policy-provider&amp;lt;/property&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;lt;/authorizer&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;lt;/authorizers&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I added following lines to nifi.properties:&lt;BR /&gt;&lt;EM&gt;nifi.security.identity.mapping.pattern.dn=^CN=(.*?), OU=(.*?)$&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nifi.security.identity.mapping.value.dn=$1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nifi.security.identity.mapping.transform.dn=LOWER&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also verified that keystore on each node only contains the certificate for that pariticular node like follows:&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;C:\nifi-1.13.2\conf&amp;gt;keytool -list --keystore ./keystore.jks -v&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Enter keystore password:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Keystore type: jks&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Keystore provider: SUN&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Your keystore contains 1 entry&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Alias name: nifi-key&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Creation date: Jun 2, 2021&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Entry type: PrivateKeyEntry&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Certificate chain length: 2&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Certificate[1]:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Owner: CN=nifi4.{valid_domain}.com, OU=NIFI&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Issuer: CN=localhost, OU=NIFI&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Serial number: 179cd17233f00000000&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Valid from: Wed Jun 02 14:18:36 UTC 2021 until: Tue Sep 05 14:18:36 UTC 2023&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Certificate fingerprints:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;SHA1: 16:CC:2F:B0:A1:51:23:AD:8B:25:3D:EB:E4:C8:CF:89:49:20:C2:91&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;SHA256: 23:2A:9C:92:08:99:32:16:8A:AB:5F:DD:A3:A7:CC:C5:F7:B0:13:01:02:50:90:8B:35:50:D7:6D:BD:D5:38:E9&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Signature algorithm name: SHA256withRSA&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Subject Public Key Algorithm: 2048-bit RSA key&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Version: 3&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;But I still get the same error (i.e. unauthorized proxy after successful authentication):&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt;2021-06-08 15:31:15,852 INFO [NiFi Web Server-16] o.a.n.w.s.NiFiAuthenticationFilter Attempting request for (&amp;lt;JWT token&amp;gt;) GET &lt;A href="https://nifi4.{valid_domain}.com/nifi-api/flow/current-user" target="_blank"&gt;https://nifi4.{valid_domain}.com/nifi-api/flow/current-user&lt;/A&gt; (source ip: 10.2.2.7)&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt;2021-06-08 15:31:15,859 INFO [NiFi Web Server-16] o.a.n.w.s.NiFiAuthenticationFilter Authentication success for user@{valid_domain}.com&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt;2021-06-08 15:31:15,981 INFO [NiFi Web Server-21] o.a.n.w.s.NiFiAuthenticationFilter Attempting request for (&amp;lt;user@{valid_domain}.com&amp;gt;&amp;lt;CN=nifi4.{valid_domain}.com, OU=NIFI&amp;gt;) GET &lt;A href="https://nifi4.{valid_domain}.com/nifi-api/flow/current-user" target="_blank"&gt;https://nifi4.{valid_domain}.com/nifi-api/flow/current-user&lt;/A&gt; (source ip: 10.2.2.7)&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt;2021-06-08 15:31:15,985 WARN [NiFi Web Server-21] o.a.n.w.s.NiFiAuthenticationFilter Rejecting access to web api: Untrusted proxy nifi4.{valid_domain}.com&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt;2021-06-08 15:33:19,173 INFO [NiFi Web Server-15] o.a.n.w.s.NiFiAuthenticationFilter Attempting request for (&amp;lt;user@{valid_domain}.com&amp;gt;&amp;lt;CN=nifi3.{valid_domain}.com, OU=NIFI&amp;gt;) GET &lt;A href="https://nifi4.{valid_domain}.com/nifi-api/flow/current-user" target="_blank"&gt;https://nifi4.{valid_domain}.com/nifi-api/flow/current-user&lt;/A&gt; (source ip: 10.2.2.5)&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt;2021-06-08 15:33:19,173 WARN [NiFi Web Server-15] o.a.n.w.s.NiFiAuthenticationFilter Rejecting access to web api: Untrusted proxy nifi3.{valid_domain}.com&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;What else might be causing this?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Many thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jun 2021 15:52:23 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-untrusted-proxy-caused-by-Untrusted-Proxy-Exception/m-p/317934#M227360</guid>
      <dc:creator>myuintelli2021</dc:creator>
      <dc:date>2021-06-08T15:52:23Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi untrusted proxy caused by Untrusted Proxy Exception thrown by X509AuthenticationProvider</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-untrusted-proxy-caused-by-Untrusted-Proxy-Exception/m-p/317986#M227380</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/88947"&gt;@myuintelli2021&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Let's start with your mapping pattern setup here:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nifi.security.identity.mapping.pattern.dn=^CN=(.*?), OU=(.*?)$
nifi.security.identity.mapping.value.dn=$1
nifi.security.identity.mapping.transform.dn=LOWER&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;You node hostnames look like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;CN=nifi4.{valid_domain}.com, OU=NIFI&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;So if we ran your hostname against the pattern Java Regular expression we would see:&lt;BR /&gt;Capture group 1 &lt;STRONG&gt;(.*?)&lt;/STRONG&gt; would match on&amp;nbsp;&lt;STRONG&gt;nifi4.{valid_domain}.com&lt;BR /&gt;&lt;/STRONG&gt;Capture group 2 &lt;STRONG&gt;(.*?)&lt;/STRONG&gt; would match on &lt;STRONG&gt;NIFI&lt;/STRONG&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Then the value &lt;STRONG&gt;$1&lt;/STRONG&gt; used is only what came from capture group 1, so the string that would get passed to the NiFi authorizer would be&amp;nbsp;&lt;STRONG&gt;nifi4.{valid_domain}.com&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;You log output does reflect this now:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;2021-06-08 15:33:19,173 WARN [NiFi Web Server-15] o.a.n.w.s.NiFiAuthenticationFilter Rejecting access to web api: Untrusted proxy nifi3.{valid_domain}.com&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;The problem you have is that your file-user-group-provider is still using the full DN when setting up your clients and policies for your nodes:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;property name="Initial User Identity 2"&amp;gt;CN=nifi2.{valid_domain}.com&amp;lt;/property&amp;gt;
&amp;lt;property name="Initial User Identity 3"&amp;gt;CN=nifi3.{valid_domain}.com&amp;lt;/property&amp;gt;
&amp;lt;property name="Initial User Identity 4"&amp;gt;CN=nifi4.{valid_domain}.com&amp;lt;/property&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;Above lines should be now:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;property name="Initial User Identity 2"&amp;gt;nifi2.{valid_domain}.com&amp;lt;/property&amp;gt;
&amp;lt;property name="Initial User Identity 3"&amp;gt;nifi3.{valid_domain}.com&amp;lt;/property&amp;gt;
&amp;lt;property name="Initial User Identity 4"&amp;gt;nifi4.{valid_domain}.com&amp;lt;/property&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;AND in the file-acces-policy-provider:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;property name="Node Identity 1"&amp;gt;CN=nifi2.{valid_domain}.com&amp;lt;/property&amp;gt;
&amp;lt;property name="Node Identity 2"&amp;gt;CN=nifi3.{valid_domain}.com&amp;lt;/property&amp;gt;
&amp;lt;property name="Node Identity 3"&amp;gt;CN=nifi4.{valid_domain}.com&amp;lt;/property&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;Above needs to change to:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;property name="Node Identity 1"&amp;gt;nifi2.{valid_domain}.com&amp;lt;/property&amp;gt;
&amp;lt;property name="Node Identity 2"&amp;gt;nifi3.{valid_domain}.com&amp;lt;/property&amp;gt;
&amp;lt;property name="Node Identity 3"&amp;gt;nifi4.{valid_domain}.com&amp;lt;/property&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will need to remove the users.xml and authorizations.xml files again, so that they get recreated on NiFi startup after making these changes.&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;BR /&gt;Matt&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jun 2021 13:16:09 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-untrusted-proxy-caused-by-Untrusted-Proxy-Exception/m-p/317986#M227380</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2021-06-09T13:16:09Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi untrusted proxy caused by Untrusted Proxy Exception thrown by X509AuthenticationProvider</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-untrusted-proxy-caused-by-Untrusted-Proxy-Exception/m-p/318384#M227460</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/88947"&gt;@myuintelli2021&lt;/a&gt;,&amp;nbsp;did&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;'s response&amp;nbsp;&lt;SPAN&gt;resolve your issue? If so, can you please mark it as the solution? It will make it easier for others to find the answer in the future.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jun 2021 06:01:33 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-untrusted-proxy-caused-by-Untrusted-Proxy-Exception/m-p/318384#M227460</guid>
      <dc:creator>VidyaSargur</dc:creator>
      <dc:date>2021-06-14T06:01:33Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi untrusted proxy caused by Untrusted Proxy Exception thrown by X509AuthenticationProvider</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-untrusted-proxy-caused-by-Untrusted-Proxy-Exception/m-p/318555#M227491</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/32119"&gt;@VidyaSargur&lt;/a&gt;&amp;nbsp;We have not resolved the issue yet due to some priority shift. We're still seeing the same error. Will follow up on it soon. Ming&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jun 2021 18:56:49 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-untrusted-proxy-caused-by-Untrusted-Proxy-Exception/m-p/318555#M227491</guid>
      <dc:creator>myuintelli2021</dc:creator>
      <dc:date>2021-06-14T18:56:49Z</dc:date>
    </item>
  </channel>
</rss>

