<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Understanding NiFi Certificates functionality in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Understanding-NiFi-Certificates-functionality/m-p/336545#M232293</link>
    <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;Please bear with me if I ask a simple/basic question. I am new to NiFi and appreciate your patience and support.&lt;/P&gt;&lt;P&gt;I am setting up secure NiFi in 2 clusters. I am using NiFi 1.15.3 version in my setup. My cluster 1 has nodes: node1, node2, node3 and cluster 2 has nodes: node4, node5, node6.&lt;/P&gt;&lt;P&gt;I have created certificates in my organization by setting node1 as primary node and other nodes as alternative nodes. I use the same certificates in both clusters since I added all the nodes to the certificate when creating it.&lt;/P&gt;&lt;P&gt;My cluster 1 starts and I can able to login to web ui with admin user without any issues. However, my cluster 2 starts without any issues but when I try to login, it throws:&lt;/P&gt;&lt;P&gt;Insufficient permission. Untrusted proxy CN=node1, O=xxxx, L=yyyy, ST=zzzz, C=US&lt;/P&gt;&lt;P&gt;and in logs:&lt;/P&gt;&lt;P&gt;o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET &lt;A href="https://node4:8443/nifi-api/flow/current-user" target="_blank"&gt;https://node4:8443/nifi-api/flow/current-user&lt;/A&gt; [Untrusted proxy CN=node1, O=xxxx, L=yyyy, ST=zzzz, C=US]&lt;/P&gt;&lt;P&gt;As a part of troubleshooting, I added the node1 as initial user and node identity in cluster 2's authorizers.xml file. After deleting users.xml and authorizations.xml and restarting the NiFi, I was able to login to web UI.&lt;/P&gt;&lt;P&gt;My questions:&lt;BR /&gt;1. Should I add the certificate's primary node as initial user and node identity where ever I use this certificate?&lt;BR /&gt;2. What if the primary node went down for some reason. Will it cause any issue?&lt;BR /&gt;&lt;BR /&gt;Appreciate any help on this.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
    <pubDate>Thu, 17 Feb 2022 21:22:40 GMT</pubDate>
    <dc:creator>spserd</dc:creator>
    <dc:date>2022-02-17T21:22:40Z</dc:date>
    <item>
      <title>Understanding NiFi Certificates functionality</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Understanding-NiFi-Certificates-functionality/m-p/336545#M232293</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;Please bear with me if I ask a simple/basic question. I am new to NiFi and appreciate your patience and support.&lt;/P&gt;&lt;P&gt;I am setting up secure NiFi in 2 clusters. I am using NiFi 1.15.3 version in my setup. My cluster 1 has nodes: node1, node2, node3 and cluster 2 has nodes: node4, node5, node6.&lt;/P&gt;&lt;P&gt;I have created certificates in my organization by setting node1 as primary node and other nodes as alternative nodes. I use the same certificates in both clusters since I added all the nodes to the certificate when creating it.&lt;/P&gt;&lt;P&gt;My cluster 1 starts and I can able to login to web ui with admin user without any issues. However, my cluster 2 starts without any issues but when I try to login, it throws:&lt;/P&gt;&lt;P&gt;Insufficient permission. Untrusted proxy CN=node1, O=xxxx, L=yyyy, ST=zzzz, C=US&lt;/P&gt;&lt;P&gt;and in logs:&lt;/P&gt;&lt;P&gt;o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET &lt;A href="https://node4:8443/nifi-api/flow/current-user" target="_blank"&gt;https://node4:8443/nifi-api/flow/current-user&lt;/A&gt; [Untrusted proxy CN=node1, O=xxxx, L=yyyy, ST=zzzz, C=US]&lt;/P&gt;&lt;P&gt;As a part of troubleshooting, I added the node1 as initial user and node identity in cluster 2's authorizers.xml file. After deleting users.xml and authorizations.xml and restarting the NiFi, I was able to login to web UI.&lt;/P&gt;&lt;P&gt;My questions:&lt;BR /&gt;1. Should I add the certificate's primary node as initial user and node identity where ever I use this certificate?&lt;BR /&gt;2. What if the primary node went down for some reason. Will it cause any issue?&lt;BR /&gt;&lt;BR /&gt;Appreciate any help on this.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 17 Feb 2022 21:22:40 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Understanding-NiFi-Certificates-functionality/m-p/336545#M232293</guid>
      <dc:creator>spserd</dc:creator>
      <dc:date>2022-02-17T21:22:40Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding NiFi Certificates functionality</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Understanding-NiFi-Certificates-functionality/m-p/336546#M232294</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/95925"&gt;@spserd&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please have a look at this &lt;A href="https://nifi.apache.org/docs/nifi-docs/html/toolkit-guide.html#wildcard_certificates" target="_self"&gt;section&lt;/A&gt; of the NiFi documentation. It says:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;Wildcard certificates (i.e. two nodes node1.nifi.apache.org and node2.nifi.apache.org being assigned the same certificate with a CN or SAN entry of *.nifi.apache.org) are not officially supported and not recommended. There are numerous disadvantages to using wildcard certificates, and a cluster working with wildcard certificates has occurred in previous versions out of lucky accidents, not intentional support. Wildcard SAN entries are acceptable if each cert maintains an additional unique SAN entry and CN entry.&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Even though you are not using an asterisk wildcard your single certificate doesn't meet the requirements of a unique SAN and CN entries and is not recommended/supported. You should have separate certificates for each host.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;André&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Feb 2022 22:41:58 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Understanding-NiFi-Certificates-functionality/m-p/336546#M232294</guid>
      <dc:creator>araujo</dc:creator>
      <dc:date>2022-02-17T22:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding NiFi Certificates functionality</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Understanding-NiFi-Certificates-functionality/m-p/336603#M232316</link>
      <description>&lt;P&gt;Thanks Andre. Appreciate your help!&lt;/P&gt;</description>
      <pubDate>Fri, 18 Feb 2022 14:04:15 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Understanding-NiFi-Certificates-functionality/m-p/336603#M232316</guid>
      <dc:creator>spserd</dc:creator>
      <dc:date>2022-02-18T14:04:15Z</dc:date>
    </item>
  </channel>
</rss>

