<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Nifi Failed authorization in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323529#M229142</link>
    <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/84820"&gt;@wbivp&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The nifi-user.log output you shared indicates that the user string "&lt;A href="mailto:cdpadmindev@DOMAIN&amp;quot;" target="_blank"&gt;cdpadmindev@DOMAIN"&lt;/A&gt;&amp;nbsp;has not been authorized to against the NiFi /flow resource identifier (&lt;SPAN&gt;View the user interface).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The authorizers.xml configuration file controls how user and/or group based authorizations are setup and managed.&amp;nbsp; So first things is what is configured in that file?&lt;BR /&gt;&lt;BR /&gt;Is it using a file based authorizer or external Ranger based authorizer?&lt;BR /&gt;Is it using any user group providers?&lt;BR /&gt;Did you configure and initial admin identity?&amp;nbsp; if so, does that initial admin identity string exactly match your user string from the nifi-user.log you shared?&lt;BR /&gt;&lt;BR /&gt;If using the file based authorizer, you should have in the authorizers.xml both the "file-user-group-provider" and the "file-access-policy-provider".&amp;nbsp; &amp;nbsp;These providers are used to create the users.xml and authorizations.xml file on startup if they do NOT already exist.&amp;nbsp; so even if you do have the initial admin set correctly, if NiFi was started previously before the user string was set, you would have existing users.xml and authorizations.xml files without this user and the required admin policies set.&amp;nbsp; (remove these files and restart NiFi so they are generated again).&lt;BR /&gt;&lt;BR /&gt;If using Ranger as your authorizer, you need to make sure that the user string exactly as you see in the nifi-user.log exists as a user in Ranger and the the NiFi service plugin in ranger is setup and has the correct NiFi resource identifier policies authorized for that user.&amp;nbsp; Here is a reference article on those Ranger based NiFi policies:&lt;BR /&gt;&lt;A href="https://community.cloudera.com/t5/Community-Articles/NiFi-Ranger-based-policy-descriptions/ta-p/246586" target="_blank"&gt;https://community.cloudera.com/t5/Community-Articles/NiFi-Ranger-based-policy-descriptions/ta-p/246586&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;If you found this response assisted with your query, please take a moment to login and click on "Accept as Solution" below this post.&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 01 Sep 2021 19:04:42 GMT</pubDate>
    <dc:creator>MattWho</dc:creator>
    <dc:date>2021-09-01T19:04:42Z</dc:date>
    <item>
      <title>Nifi Failed authorization</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323457#M229121</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I get the following issue when logging in to nifi UI , user success login but UI not showing NIFI Menu :&lt;BR /&gt;2021-09-01 13:24:02,942 INFO [NiFi Web Server-1911] o.a.n.w.a.c.AccessDeniedExceptionMapper identity[cdpadmindev@DOMAIN], groups[] does not have permission to access the requested resource. Unable to view the user interface. Returning Forbidden response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm using cloudera private base with kerberos and AD&lt;/P&gt;&lt;P&gt;The NIFI configuration is still the default, is there anything that needs to be changed?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;WB&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 08:58:51 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323457#M229121</guid>
      <dc:creator>wbivp</dc:creator>
      <dc:date>2026-04-21T08:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi Failed authorization</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323466#M229124</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/84820"&gt;@wbivp&lt;/a&gt;&amp;nbsp;You need to create /proxy policy for Nifi in ranger, Refer to below document for more info&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cloudera.com/t5/Community-Articles/NiFi-Ranger-based-policy-descriptions/ta-p/246586" target="_blank"&gt;https://community.cloudera.com/t5/Community-Articles/NiFi-Ranger-based-policy-descriptions/ta-p/246586&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.cloudera.com/HDPDocuments/HDP3/HDP-3.1.4/authorization-ranger/content/resource_policy_create_a_nifi_policy.html" target="_blank"&gt;https://docs.cloudera.com/HDPDocuments/HDP3/HDP-3.1.4/authorization-ranger/content/resource_policy_create_a_nifi_policy.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 06:54:42 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323466#M229124</guid>
      <dc:creator>Scharan</dc:creator>
      <dc:date>2021-09-01T06:54:42Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi Failed authorization</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323470#M229126</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35149"&gt;@Scharan&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;thanks for your response, we already have the policy in ranger by default :&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="wbivp_0-1630479549445.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/32196iC9A108B2EB42B8FD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="wbivp_0-1630479549445.png" alt="wbivp_0-1630479549445.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and i already assign our user and group to this policy , but still failed authorization&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 07:00:02 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323470#M229126</guid>
      <dc:creator>wbivp</dc:creator>
      <dc:date>2021-09-01T07:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi Failed authorization</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323529#M229142</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/84820"&gt;@wbivp&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The nifi-user.log output you shared indicates that the user string "&lt;A href="mailto:cdpadmindev@DOMAIN&amp;quot;" target="_blank"&gt;cdpadmindev@DOMAIN"&lt;/A&gt;&amp;nbsp;has not been authorized to against the NiFi /flow resource identifier (&lt;SPAN&gt;View the user interface).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The authorizers.xml configuration file controls how user and/or group based authorizations are setup and managed.&amp;nbsp; So first things is what is configured in that file?&lt;BR /&gt;&lt;BR /&gt;Is it using a file based authorizer or external Ranger based authorizer?&lt;BR /&gt;Is it using any user group providers?&lt;BR /&gt;Did you configure and initial admin identity?&amp;nbsp; if so, does that initial admin identity string exactly match your user string from the nifi-user.log you shared?&lt;BR /&gt;&lt;BR /&gt;If using the file based authorizer, you should have in the authorizers.xml both the "file-user-group-provider" and the "file-access-policy-provider".&amp;nbsp; &amp;nbsp;These providers are used to create the users.xml and authorizations.xml file on startup if they do NOT already exist.&amp;nbsp; so even if you do have the initial admin set correctly, if NiFi was started previously before the user string was set, you would have existing users.xml and authorizations.xml files without this user and the required admin policies set.&amp;nbsp; (remove these files and restart NiFi so they are generated again).&lt;BR /&gt;&lt;BR /&gt;If using Ranger as your authorizer, you need to make sure that the user string exactly as you see in the nifi-user.log exists as a user in Ranger and the the NiFi service plugin in ranger is setup and has the correct NiFi resource identifier policies authorized for that user.&amp;nbsp; Here is a reference article on those Ranger based NiFi policies:&lt;BR /&gt;&lt;A href="https://community.cloudera.com/t5/Community-Articles/NiFi-Ranger-based-policy-descriptions/ta-p/246586" target="_blank"&gt;https://community.cloudera.com/t5/Community-Articles/NiFi-Ranger-based-policy-descriptions/ta-p/246586&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;If you found this response assisted with your query, please take a moment to login and click on "Accept as Solution" below this post.&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 19:04:42 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323529#M229142</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2021-09-01T19:04:42Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi Failed authorization</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323530#M229143</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/84820"&gt;@wbivp&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Is the exact user string you see in the nifi-user.log the same (case sensitive)&amp;nbsp; as what is set in Ranger?&lt;BR /&gt;is this user string authorized for the /flow policy?&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 19:07:19 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323530#M229143</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2021-09-01T19:07:19Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi Failed authorization</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323543#M229147</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We using ranger authorizer , user string exactly same with nifi-user.log and ranger user&amp;nbsp;&lt;/P&gt;&lt;P&gt;below authorizers.xml content :&lt;/P&gt;&lt;P&gt;&amp;lt;authorizers&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;userGroupProvider&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;cm-user-group-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.CMUserGroupProvider&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="Knox Nodes Properties Location"&amp;gt;/var/run/cloudera-scm-agent/process/1546339122-nifi-NIFI_NODE/knox-conf/knox-gateway.properties&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="NiFi Registry Nodes Properties Location"&amp;gt;/var/run/cloudera-scm-agent/process/1546339122-nifi-NIFI_NODE/nifiregistry-conf/peer.properties&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="NiFi Group"&amp;gt;nifi&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Infer Unqualified Hostnames"&amp;gt;false&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="NiFi Nodes Properties Location"&amp;gt;/var/run/cloudera-scm-agent/process/1546339122-nifi-NIFI_NODE/nifinode-conf/peer.properties&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/userGroupProvider&amp;gt;&amp;lt;userGroupProvider&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;composite-configurable-user-group-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.CompositeConfigurableUserGroupProvider&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Group Provider 1"&amp;gt;cm-user-group-provider&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Configurable User Group Provider"&amp;gt;file-user-group-provider&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/userGroupProvider&amp;gt;&amp;lt;userGroupProvider&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;file-user-group-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.FileUserGroupProvider&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="Initial User Identity 1"&amp;gt;wahyu.budiman&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Users File"&amp;gt;/var/lib/nifi/users.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/userGroupProvider&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;authorizer&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;ranger-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.ranger.authorization.ManagedRangerAuthorizer&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;classpath&amp;gt;/var/run/cloudera-scm-agent/process/1546339122-nifi-NIFI_NODE/hadoop-conf&amp;lt;/classpath&amp;gt;&lt;BR /&gt;&amp;lt;property name="Ranger Security Config Path"&amp;gt;/var/run/cloudera-scm-agent/process/1546339122-nifi-NIFI_NODE/ranger-nifi-security.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Group Provider"&amp;gt;composite-configurable-user-group-provider&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Ranger Admin Identity"&amp;gt;rangerhostname&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Ranger Service Type"&amp;gt;nifi&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Ranger Audit Config Path"&amp;gt;/var/run/cloudera-scm-agent/process/1546339122-nifi-NIFI_NODE/ranger-nifi-audit.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Ranger Application Id"&amp;gt;Cluster1_nifi&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Ranger Kerberos Enabled"&amp;gt;true&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/authorizer&amp;gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Sep 2021 03:51:38 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323543#M229147</guid>
      <dc:creator>wbivp</dc:creator>
      <dc:date>2021-09-02T03:51:38Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi Failed authorization</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323544#M229148</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our Nifi using ranger authorizers , after we set ranger nifi policy (/flow , /proxies , etc) to my username, i can login and access web UI , the next question about group authorization, because other user with same group still cannot acces web UI&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;below the log :&lt;BR /&gt;2021-09-02 10:57:45,166 INFO [NiFi Web Server-424] o.a.n.w.s.NiFiAuthenticationFilter Attempting request for (&amp;lt;JWT token&amp;gt;) GET https://nifihostname:8443/nifi-api/flow/current-user (source ip: )&lt;BR /&gt;2021-09-02 10:57:45,169 INFO [NiFi Web Server-424] o.a.n.w.s.NiFiAuthenticationFilter Authentication success for test.username&lt;BR /&gt;2021-09-02 10:57:45,172 INFO [NiFi Web Server-424] o.a.n.w.a.c.AccessDeniedExceptionMapper identity[test.username], groups[] does not have permission to access the requested resource. Unable to view the user interface. Returning Forbidden response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks ,&lt;/P&gt;&lt;P&gt;WahyuB&lt;/P&gt;</description>
      <pubDate>Thu, 02 Sep 2021 04:09:56 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323544#M229148</guid>
      <dc:creator>wbivp</dc:creator>
      <dc:date>2021-09-02T04:09:56Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi Failed authorization</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323609#M229167</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/84820"&gt;@wbivp&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Within Ranger you can authorizer users and/or groups to the policies you define.&lt;BR /&gt;The Ranger plugin with the NiFi service runs in the background within NiFi that connects with Ranger to download the latest set of policies.&lt;BR /&gt;&lt;BR /&gt;What is provided by Ranger is simply user(s) A, B, C strings and/or group(s) X, Y, Z strings are authorized read and/or write to NiFi Resource Identifier(s).&amp;nbsp; There is nothin in what is downloaded from Ranger that will tell NiFi as the client what users belong to group(s) X, Y, or Z.&amp;nbsp; &amp;nbsp;This means that NiFi itself needs to be aware of these associations.&lt;BR /&gt;&lt;BR /&gt;This is why in the nifi-user.log you see the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;o.a.n.w.a.c.AccessDeniedExceptionMapper identity[test.username], groups[] does ...&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;This log line tells us that NiFi is unaware of any groups the the authenticated user string "test.username" is a member.&amp;nbsp; If NiFi was aware the "groups[]" in this log line would show a comma separated list of all these group strings.&lt;BR /&gt;&lt;BR /&gt;NiFi offers numerous user-group-providers that can be added to the authorizers.xml that allow these associations between user and groups to be set.&amp;nbsp; Your authorizers.xml file shared contains the "&lt;SPAN&gt;cm-user-group-provider" (only used to assign NiFi node hostnames to a group string "nifi") and the "file-user-group-provider" [1] which gives users a way of manually adding group strings and associating users to that group directly from the NiFi UI.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;So with your current setup, you would login as your authorized user, go to the NiFi Global Menu, and then select "users".&amp;nbsp; This will open the NiFi Users UI where you should see your initial admin user which you defined in your file-user-group-provider&lt;SPAN&gt;.&amp;nbsp; You would need to click on the&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattWho_0-1630601184771.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/32218i15003A6E3505ED1B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattWho_0-1630601184771.png" alt="MattWho_0-1630601184771.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;icon to add additional users and groups manually.&amp;nbsp; Adding users and groups here has nothing to do with authentication. You are using this Ui to establish user to group associations.&amp;nbsp; So I would start by creating a new group.&amp;nbsp; The Identity string used must match case sensitive the exact group string as seen in Ranger.&lt;BR /&gt;Then you can start adding your user strings (must match user strings case sensitive as seen in Ranger)&lt;BR /&gt;As you add users you will be able to select the group(s) you added as those that user should be associated with.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattWho_1-1630601469834.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/32219i5F79719F46AFC831/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattWho_1-1630601469834.png" alt="MattWho_1-1630601469834.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Using above as an example, NiFi would then associate user string "JoeSmith" with group string "admins".&lt;BR /&gt;&lt;BR /&gt;To see what other user-group-providers exist within your NiFi version, you should look at the "Admin Guide" found under help within your NiFi's embedded documentation access via the UI.&lt;BR /&gt;&lt;BR /&gt;A very commonly used user-group-provider is the "ldap-user-group-provider" [2] which can be used to sync user and groups strings from LDAP/AD and establish the associations between them based on what is in LDAP/AD.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[1]&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://nifi.apache.org/docs/nifi-docs/html/administration-guide.html#fileusergroupprovider" target="_blank" rel="noopener"&gt;https://nifi.apache.org/docs/nifi-docs/html/administration-guide.html#fileusergroupprovider&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;[2]&amp;nbsp;&lt;A href="https://nifi.apache.org/docs/nifi-docs/html/administration-guide.html#ldapusergroupprovider" target="_blank" rel="noopener"&gt;https://nifi.apache.org/docs/nifi-docs/html/administration-guide.html#ldapusergroupprovider&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If you found these responses assisted with your query, please take a moment to login and click on "Accept as Solution" below each post.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Sep 2021 17:21:55 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323609#M229167</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2021-09-02T17:21:55Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi Failed authorization</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323680#M229190</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I try your suggestion to setup "ldap-user-group-provider" , and now nifi service cannot start ,&lt;/P&gt;&lt;P&gt;this is the error message , do you have an example of the required parameters ?&lt;/P&gt;&lt;PRE&gt;Caused by: org.springframework.beans.factory.UnsatisfiedDependencyException: Error creating bean with name 'org.apache.nifi.web.NiFiWebApiSecurityConfiguration': Unsatisfied dependency expressed through method 'setAnonymousAuthenticationProvider' parameter 0; nested exception is org.springframework.beans.factory.BeanCreationException: Error creating bean with name 'anonymousAuthenticationProvider' defined in class path resource [nifi-web-security-context.xml]: Cannot resolve reference to bean 'authorizer' while setting constructor argument; nested exception is org.springframework.beans.factory.BeanCreationException: Error creating bean with name 'authorizer': FactoryBean threw exception on object creation; nested exception is org.springframework.ldap.AuthenticationException: [LDAP: error code 49 - 80090308: LdapErr: DSID-0C090439, comment: AcceptSecurityContext error, data 52e, v4563]; nested exception is javax.naming.AuthenticationException: [LDAP: error code 49 - 80090308: LdapErr: DSID-0C090439, comment: AcceptSecurityContext error, data 52e, v4563]&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Sep 2021 10:09:30 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323680#M229190</guid>
      <dc:creator>wbivp</dc:creator>
      <dc:date>2021-09-04T10:09:30Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi Failed authorization</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323943#M229248</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/84820"&gt;@wbivp&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;When NiFi is configured to use the ldap-user-group-provider, it must be able to successfully execute that provider during startup to generate a list of users and groups within NiFi.&lt;BR /&gt;&lt;BR /&gt;The exception points that that provider being unable to execute successfully.&lt;BR /&gt;The exception in the logs shows:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;javax.naming.AuthenticationException: [LDAP: error code 49 - 80090308: LdapErr: DSID-0C090439, comment: AcceptSecurityContext error, data 52e, v4563]&lt;/LI-CODE&gt;&lt;P&gt;This points at an authentication issue when trying to communicate with your ldap server.&lt;BR /&gt;(misconfiguration int the provider, bad Manager or Manager password provided)&lt;BR /&gt;&lt;BR /&gt;From the NiFi host can you make run a ldapsearch query against your ldap server using all the same configured values from your provider?&lt;BR /&gt;&lt;BR /&gt;Without your authorizers.xml file, it would be difficult for me to point out any other misconfigurations if present.&lt;BR /&gt;&lt;BR /&gt;If you found the provided response(s) assisted with your query, please take a moment to login and click on "Accept as Solution" below each solution that helped you.&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 18:16:48 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/323943#M229248</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2021-09-08T18:16:48Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi Failed authorization</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/324001#M229268</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp; , this is my authorizer.xml , for now i still cannot get authorize within group&lt;/P&gt;&lt;P&gt;&amp;lt;authorizers&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;userGroupProvider&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;cm-user-group-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.CMUserGroupProvider&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="Knox Nodes Properties Location"&amp;gt;/var/run/cloudera-scm-agent/process/1546339525-nifi-NIFI_NODE/knox-conf/knox-gateway.properties&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="NiFi Registry Nodes Properties Location"&amp;gt;/var/run/cloudera-scm-agent/process/1546339525-nifi-NIFI_NODE/nifiregistry-conf/peer.properties&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="NiFi Group"&amp;gt;nifi&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Infer Unqualified Hostnames"&amp;gt;false&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="NiFi Nodes Properties Location"&amp;gt;/var/run/cloudera-scm-agent/process/1546339525-nifi-NIFI_NODE/nifinode-conf/peer.properties&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/userGroupProvider&amp;gt;&amp;lt;userGroupProvider&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;composite-user-group-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.CompositeUserGroupProvider&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Group Provider 1"&amp;gt;ldap-user-group-provider&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Group Provider 2"&amp;gt;cm-user-group-provider&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/userGroupProvider&amp;gt;&amp;lt;userGroupProvider&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;ldap-user-group-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.ldap.tenants.LdapUserGroupProvider&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="Connect Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Client Auth"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Protocol"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Identity Attribute"&amp;gt;cn&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Name Attribute"&amp;gt;cn&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Search Scope"&amp;gt;ONE_LEVEL&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Object Class"&amp;gt;group&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Url"&amp;gt;ldap://msad.local.co:389&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Keystore Type"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Search Base"&amp;gt;OU=DEVELOPER,DC=msad,DC=local,DC=co&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Membership - Enforce Case Sensitivity"&amp;gt;false&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Authentication Strategy"&amp;gt;SIMPLE&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Search Base"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Member Attribute - Referenced User Attribute"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Member Attribute"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Keystore"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Truststore"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Search Scope"&amp;gt;ONE_LEVEL&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property encryption="aes/gcm/256" name="Manager Password"&amp;gt;Yf41&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Group Name Attribute"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Truststore Password"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Object Class"&amp;gt;user&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Referral Strategy"&amp;gt;FOLLOW&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Page Size"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Read Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Group Name Attribute - Referenced Group Attribute"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Keystore Password"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Shutdown Gracefully"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Sync Interval"&amp;gt;30 mins&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Manager DN"&amp;gt;CN=CDP Admin,OU=DEVELOPER,DC=msad,DC=local,DC=co&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Search Filter"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Truststore Type"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Search Filter"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/userGroupProvider&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;authorizer&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;ranger-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.ranger.authorization.ManagedRangerAuthorizer&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;classpath&amp;gt;/var/run/cloudera-scm-agent/process/1546339525-nifi-NIFI_NODE/hadoop-conf&amp;lt;/classpath&amp;gt;&lt;BR /&gt;&amp;lt;property name="Ranger Security Config Path"&amp;gt;/var/run/cloudera-scm-agent/process/1546339525-nifi-NIFI_NODE/ranger-nifi-security.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Group Provider"&amp;gt;composite-user-group-provider&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Ranger Admin Identity"&amp;gt;host_ranger&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Ranger Service Type"&amp;gt;nifi&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Ranger Audit Config Path"&amp;gt;/var/run/cloudera-scm-agent/process/1546339525-nifi-NIFI_NODE/ranger-nifi-audit.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Ranger Application Id"&amp;gt;Cluster1_nifi&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Ranger Kerberos Enabled"&amp;gt;true&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/authorizer&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;/authorizers&amp;gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Sep 2021 14:23:25 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/324001#M229268</guid>
      <dc:creator>wbivp</dc:creator>
      <dc:date>2021-09-09T14:23:25Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi Failed authorization</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/324019#M229275</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/84820"&gt;@wbivp&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The exception form the logs you shared is telling you that the ldap-user-group-provider is failing to connect to the configured ldap server using the manager DN and Manager password that has been configured.&amp;nbsp; So first thing you need to do is validate, re-enter, and test your manager DN and password from command line to make sure they work from the NiFi host.&amp;nbsp; Any need to engage with your ldap team.&lt;BR /&gt;&lt;BR /&gt;Here is your ldap-user-group-provider (I re-order the properties to make it easier to read:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;userGroupProvider&amp;gt;

	&amp;lt;identifier&amp;gt;ldap-user-group-provider&amp;lt;/identifier&amp;gt;
	&amp;lt;class&amp;gt;org.apache.nifi.ldap.tenants.LdapUserGroupProvider&amp;lt;/class&amp;gt;
	&amp;lt;property name="Authentication Strategy"&amp;gt;SIMPLE&amp;lt;/property&amp;gt;

	&amp;lt;property name="Manager DN"&amp;gt;CN=CDP Admin,OU=DEVELOPER,DC=msad,DC=local,DC=co&amp;lt;/property&amp;gt;
	&amp;lt;property encryption="aes/gcm/256" name="Manager Password"&amp;gt;Yf41&amp;lt;/property&amp;gt;

	&amp;lt;property name="TLS - Keystore"&amp;gt;&amp;lt;/property&amp;gt;
	&amp;lt;property name="TLS - Keystore Password"&amp;gt;&amp;lt;/property&amp;gt;
	&amp;lt;property name="TLS - Keystore Type"&amp;gt;&amp;lt;/property&amp;gt;
	&amp;lt;property name="TLS - Truststore"&amp;gt;&amp;lt;/property&amp;gt;
	&amp;lt;property name="TLS - Truststore Password"&amp;gt;&amp;lt;/property&amp;gt;
	&amp;lt;property name="TLS - Truststore Type"&amp;gt;&amp;lt;/property&amp;gt;
	&amp;lt;property name="TLS - Client Auth"&amp;gt;&amp;lt;/property&amp;gt;
	&amp;lt;property name="TLS - Protocol"&amp;gt;&amp;lt;/property&amp;gt;
	&amp;lt;property name="TLS - Shutdown Gracefully"&amp;gt;&amp;lt;/property&amp;gt;

	&amp;lt;property name="Referral Strategy"&amp;gt;FOLLOW&amp;lt;/property&amp;gt;
	&amp;lt;property name="Connect Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;
	&amp;lt;property name="Read Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;

	&amp;lt;property name="Url"&amp;gt;ldap://msad.local.co:389&amp;lt;/property&amp;gt;
	&amp;lt;property name="Page Size"&amp;gt;&amp;lt;/property&amp;gt;
	&amp;lt;property name="Sync Interval"&amp;gt;30 mins&amp;lt;/property&amp;gt;
	&amp;lt;property name="Group Membership - Enforce Case Sensitivity"&amp;gt;false&amp;lt;/property&amp;gt;

	&amp;lt;property name="User Search Base"&amp;gt;OU=DEVELOPER,DC=msad,DC=local,DC=co&amp;lt;/property&amp;gt;
	&amp;lt;property name="User Object Class"&amp;gt;user&amp;lt;/property&amp;gt;
	&amp;lt;property name="User Search Scope"&amp;gt;ONE_LEVEL&amp;lt;/property&amp;gt;
	&amp;lt;property name="User Search Filter"&amp;gt;&amp;lt;/property&amp;gt;
	&amp;lt;property name="User Identity Attribute"&amp;gt;cn&amp;lt;/property&amp;gt;
	&amp;lt;property name="User Group Name Attribute"&amp;gt;&amp;lt;/property&amp;gt;
	&amp;lt;property name="User Group Name Attribute - Referenced Group Attribute"&amp;gt;&amp;lt;/property&amp;gt;

	&amp;lt;property name="Group Search Base"&amp;gt;&amp;lt;/property&amp;gt;
	&amp;lt;property name="Group Object Class"&amp;gt;group&amp;lt;/property&amp;gt;
	&amp;lt;property name="Group Search Scope"&amp;gt;ONE_LEVEL&amp;lt;/property&amp;gt;
	&amp;lt;property name="Group Search Filter"&amp;gt;&amp;lt;/property&amp;gt;
	&amp;lt;property name="Group Name Attribute"&amp;gt;cn&amp;lt;/property&amp;gt;
	&amp;lt;property name="Group Member Attribute"&amp;gt;&amp;lt;/property&amp;gt;
	&amp;lt;property name="Group Member Attribute - Referenced User Attribute"&amp;gt;&amp;lt;/property&amp;gt;

&amp;lt;/userGroupProvider&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;Now unrelated to your Manager credentials issue, I see some other configuration issues:&lt;BR /&gt;1.&amp;nbsp;"Page Size" &amp;lt;-- I aways recommend that users set this to 500 (this allows NiFi to request return in multiple pages of 500.&amp;nbsp; If unset, NiFi expects a single return and for large returns the LDAP server likely has a max for how many returns it will provide in a single page).&lt;BR /&gt;2. Within the "User" properties I see:&lt;BR /&gt;-&amp;nbsp;"User Search Scope"&amp;nbsp; &amp;lt;-- Are all users being synced actually at same level as configured "Search Base"?&amp;nbsp; Maybe use "SUBTREE" instead.&lt;BR /&gt;-&amp;nbsp;"User Group Name Attribute"&amp;nbsp; &amp;lt;--&amp;nbsp; With this unset, only users strings from the ldap "cn" attribute will be synced since there is no ldap attribute provided which identifies which groups this user belongs to.&amp;nbsp; This property tells NiFi which ldap user entry attribute contains the groups that the returned user&amp;nbsp; is a member of.&lt;BR /&gt;-&amp;nbsp;"User Group Name Attribute - Referenced Group Attribute". &amp;lt;-- by default this uses ldap "DN" attribute&lt;BR /&gt;3. Within the "Group" properties I see:&lt;BR /&gt;-&amp;nbsp;"Group Search Base" &amp;lt;--&amp;nbsp; With this set to blank a group based sync is not performed.&amp;nbsp; So with out "User Group Name Attribute" set in the "User" section and no Group sync being executed, NiFi will not get any group strings returned.&lt;BR /&gt;-&amp;nbsp;"Group Name Attribute" - Set to CN, which tells NiFi to use the value assigned to the ldap "cn" group entry attribute to as the group identity string in NiFi (but since other properties i mentioned are not set, none will be added to NiFi).&lt;BR /&gt;-&amp;nbsp;"Group Member Attribute" &amp;lt;-- If you were to determine user/group associations via a group sync this would need to be set so that NiFi knows which ldap group entry attribute defines which user are a member to each group returned by the group sync.&lt;BR /&gt;&lt;BR /&gt;So....&lt;BR /&gt;Step1 : Address the manager DN and/or Manager password issue blocking the provider from being able to successfully connect to your ldap.&lt;BR /&gt;Step 2: Fix the user and group sync sections so that NiFi can determine property what user and groups to sync and how to determine the associations between those groups.&amp;nbsp; This requires knowledge of your LDAP/AD user and group entries in your LDAP/AD.&amp;nbsp; I can't help you further here without an sample ldapsearch output for a user and a group from your ldap that you are trying to use for authorization in NiFi.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://nifi.apache.org/docs/nifi-docs/html/administration-guide.html#ldapusergroupprovider" target="_blank"&gt;https://nifi.apache.org/docs/nifi-docs/html/administration-guide.html#ldapusergroupprovider&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Please be sure to login and click "Accept as Solution" on all responses the assisted you within this query.&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Thu, 09 Sep 2021 18:53:45 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/324019#M229275</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2021-09-09T18:53:45Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi Failed authorization</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/324212#M229311</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/84820"&gt;@wbivp&lt;/a&gt;,&amp;nbsp;Has any of the replies helped resolve your issue? If so, please mark the appropriate reply as the solution, as it will make it easier for others to find the answer in the future.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 06:02:50 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/324212#M229311</guid>
      <dc:creator>VidyaSargur</dc:creator>
      <dc:date>2021-09-13T06:02:50Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi Failed authorization</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/324429#M229359</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is the sample from ldapsearch :&lt;BR /&gt;distinguishedName: CN=wbivp,OU=DEVELOPER,DC=msad,DC=local,DC=co&lt;BR /&gt;memberOf: CN=cdpconsultant,OU=Groups,OU=DEVELOPER,DC=msad,DC=local,DC=co&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;my username wbivp , with group cdpconsultant&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;from this information, please advise to fill in the configuration required by NIFI&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 14:49:07 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/324429#M229359</guid>
      <dc:creator>wbivp</dc:creator>
      <dc:date>2021-09-15T14:49:07Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi Failed authorization</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/324706#M229442</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if there is an example for NIFI User Group with ranger configuration it is very helpful&lt;/P&gt;</description>
      <pubDate>Sat, 18 Sep 2021 15:46:29 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/324706#M229442</guid>
      <dc:creator>wbivp</dc:creator>
      <dc:date>2021-09-18T15:46:29Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi Failed authorization</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/325094#M229523</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/84820"&gt;@wbivp&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Without full ldapsearch output for a user and group, I'd have to make some guesses and assumption with regards to your specific setup, but it looks like you are using AD so here is a configuration you may want to try:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;	&amp;lt;property name="User Search Base"&amp;gt;OU=DEVELOPER,DC=msad,DC=local,DC=co&amp;lt;/property&amp;gt;
	&amp;lt;property name="User Object Class"&amp;gt;user&amp;lt;/property&amp;gt;
	&amp;lt;property name="User Search Scope"&amp;gt;SUBTREE&amp;lt;/property&amp;gt;
	&amp;lt;property name="User Search Filter"&amp;gt;&amp;lt;/property&amp;gt;
	&amp;lt;property name="User Identity Attribute"&amp;gt;sAMAccountName&amp;lt;/property&amp;gt;
	&amp;lt;property name="User Group Name Attribute"&amp;gt;memberOf&amp;lt;/property&amp;gt;
	&amp;lt;property name="User Group Name Attribute - Referenced Group Attribute"&amp;gt;distinquishedName&amp;lt;/property&amp;gt;

	&amp;lt;property name="Group Search Base"&amp;gt;OU=Groups,OU=DEVELOPER,DC=msad,DC=local,DC=co&amp;lt;/property&amp;gt;
	&amp;lt;property name="Group Object Class"&amp;gt;group&amp;lt;/property&amp;gt;
	&amp;lt;property name="Group Search Scope"&amp;gt;SUBTREE&amp;lt;/property&amp;gt;
	&amp;lt;property name="Group Search Filter"&amp;gt;&amp;lt;/property&amp;gt;
	&amp;lt;property name="Group Name Attribute"&amp;gt;cn&amp;lt;/property&amp;gt;
	&amp;lt;property name="Group Member Attribute"&amp;gt;member&amp;lt;/property&amp;gt;
	&amp;lt;property name="Group Member Attribute - Referenced User Attribute"&amp;gt;distinquishedName&amp;lt;/property&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another thing you should do is enable DEBUG on the ldap-user-group-provider class.&amp;nbsp; With DEBUG, this provider will output to the nifi-app.log the list of user and groups strings that are being synced from your AD and also show the associations discovered between them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Adding this logger involves editing the contents of the NiFi's logback.xml file.&amp;nbsp; Scroll down in the logback.xml until you start seeing lines that start with "&amp;lt;logger..../&amp;gt;" and insert the following new line:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;logger name="org.apache.nifi.ldap.tenants.LdapUserGroupProvider" level="DEBUG"/&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Those user and groups strings are absolute and case sensitive.&amp;nbsp; So they must identically exist with Ranger when they get associated to policies you setup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the strings logged in the nifi-app.log do not match what you have in Ranger exactly, you'll need to adjust your configuration until they do.&amp;nbsp; If the strings don't match but can be manipulated to match using java regular expressions, take a look at the user and group mapping pattern [1] capabilities that can be configured in the nifi.properties file (there are different properties for manipulting identity/user strings and group strings.&amp;nbsp; These mappings are evaluated against the strings returned by the providers in the authorizers.xml and returned by the login providers before they are used to check authorization.&amp;nbsp; What is output to the log would be post any mapping being applied.&lt;BR /&gt;&lt;BR /&gt;[1] &lt;A href="https://nifi.apache.org/docs/nifi-docs/html/administration-guide.html#identity-mapping-properties" target="_blank"&gt;https://nifi.apache.org/docs/nifi-docs/html/administration-guide.html#identity-mapping-properties&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Sep 2021 13:45:29 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/325094#M229523</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2021-09-22T13:45:29Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi Failed authorization</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/325095#M229524</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/84820"&gt;@wbivp&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I created a community article long ago that details the Ranger based "NiFi Resource Identifier" policy strings you would use in Ranger to provide various levels of authorization within NiFi.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://community.cloudera.com/t5/Community-Articles/NiFi-Ranger-based-policy-descriptions/ta-p/246586" target="_blank"&gt;https://community.cloudera.com/t5/Community-Articles/NiFi-Ranger-based-policy-descriptions/ta-p/246586&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;For example, it you want to grant access so that users can access and create components within a PG:&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;/process-groups/&amp;lt;uuid of PG&amp;gt;&amp;nbsp;&lt;/STRONG&gt;.&amp;nbsp;&lt;BR /&gt;Grant Read and Write for your "group" and/or "user" to allow them to view configurations and added components (processors, controller services, child PGs, etc...) within this PG&lt;BR /&gt;&lt;STRONG&gt;/data/process-groups/&amp;lt;uuid of PG&amp;gt;&lt;BR /&gt;&lt;/STRONG&gt;Granting Read and Write for your "group" and/or "user" to allow user to view and delete content (flowfiles) queued within connection within this PG.&lt;BR /&gt;&lt;BR /&gt;Keep in mind that child PGs will inherit the access granted to the parent PG unless explicit policies have been set on the child PG.&lt;BR /&gt;&lt;BR /&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Wed, 22 Sep 2021 13:52:53 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-Failed-authorization/m-p/325095#M229524</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2021-09-22T13:52:53Z</dc:date>
    </item>
  </channel>
</rss>

