<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: NIFI Insufficient Permissions for LDAP User Group in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/NIFI-Insufficient-Permissions-for-LDAP-User-Group/m-p/352084#M236433</link>
    <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/82000"&gt;@ajignacio&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;User and group identity strings much match identically.&lt;BR /&gt;Your ldap-user-group-provider is syncing users and groups by the identity string found in the CN AD attribute.&amp;nbsp; This is why you are seeing only the CN username and CN groupname strings in the users UI within NiFi.&lt;BR /&gt;&lt;BR /&gt;However, when you are logging in to NiFi to authenticate you user via the ldap-provider, the resulting user identity sting is the users full AD Distinguished Name (DN).&amp;nbsp; NiFi treats different strings as different users.&lt;BR /&gt;The&amp;nbsp; ldap-provider can be changed to use the user identity string typed in the username field instead of using the full DN.&amp;nbsp; This is done by changing the following property:&lt;/P&gt;&lt;PRE&gt;&amp;lt;property name="Identity Strategy"&amp;gt;USE_DN&amp;lt;/property&amp;gt;&lt;/PRE&gt;&lt;P&gt;change it to :&lt;/P&gt;&lt;PRE&gt;&amp;lt;property name="Identity Strategy"&amp;gt;USE_USERNAME&amp;lt;/property&amp;gt;&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;Upon successful authentication the resulting user identity is evaluated against any identity mapping patterns that may be configured in the nifi.properties file.&amp;nbsp; The resulting mapped value is then passed to the configured authorizer (managed-authorizer in your setup).&amp;nbsp; There the authorizers is looking up that user identity string (case sensitive) against the user strings synced by your configured users group providers.&amp;nbsp; If an exact match is found both the user string and the now learned group string(s) are checked against the configured NiFi policies to determine authorization.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="batang,apple gothic"&gt;If you found that the provided solution(s) assisted you with your query, please take a moment to login and click&lt;/FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT face="arial black,avant garde" color="#FF0000"&gt;Accept as Solution&amp;nbsp;&lt;/FONT&gt;&lt;FONT face="batang,apple gothic" color="#000000"&gt;below each response that helped.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 12 Sep 2022 20:52:21 GMT</pubDate>
    <dc:creator>MattWho</dc:creator>
    <dc:date>2022-09-12T20:52:21Z</dc:date>
    <item>
      <title>NIFI Insufficient Permissions for LDAP User Group</title>
      <link>https://community.cloudera.com/t5/Support-Questions/NIFI-Insufficient-Permissions-for-LDAP-User-Group/m-p/351856#M236392</link>
      <description>&lt;P&gt;Hello Nifi Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have integrated our Nifi 1.16.2 with LDAP AD server.&lt;BR /&gt;We have created an Initial Local Admin (nifi_ldap) and used "composite-configurable-user-group-provider" as user group provider. We also restricted to one particular group of LDAP server (namely "EDH_ML"). But none of the users of this group ("EDH_ML") is able to access the Nifi and getting "Insufficient Permission Error".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could someone can help us to resolve this error? -- Sharing nifi screenshot and configuration settings/logs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nifi Users&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajignacio_1-1662721667073.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/35497iB0FEB11DA7E778B7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ajignacio_1-1662721667073.png" alt="ajignacio_1-1662721667073.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nifi Login Error&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajignacio_2-1662721848127.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/35498iD1A1D98C1DC0EA6F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ajignacio_2-1662721848127.png" alt="ajignacio_2-1662721848127.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nifi User Policies&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajignacio_3-1662721920829.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/35499i821B690F7B0D53A3/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ajignacio_3-1662721920829.png" alt="ajignacio_3-1662721920829.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Authorizer.xml&lt;/P&gt;&lt;PRE&gt;&lt;BR /&gt;&amp;lt;userGroupProvider&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;file-user-group-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.FileUserGroupProvider&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="Users File"&amp;gt;./conf/users.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Initial User Identity 1"&amp;gt;cn=Service Account\, nifi_ldap,ou=Service Accounts,ou=Xyz Dev,dc=dev,dc=coorporate&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/userGroupProvider&amp;gt;&lt;/PRE&gt;&lt;PRE&gt;&amp;lt;userGroupProvider&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;ldap-user-group-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.ldap.tenants.LdapUserGroupProvider&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="Authentication Strategy"&amp;gt;SIMPLE&amp;lt;/property&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&amp;lt;property name="Manager DN"&amp;gt;cn=Service Account\, nifi_ldap,ou=Service Accounts,ou=Xyz Dev,dc=dev,dc=coorporate&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Manager Password"&amp;gt;pass321&amp;lt;/property&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&amp;lt;property name="TLS - Keystore"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Keystore Password"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Keystore Type"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Truststore"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Truststore Password"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Truststore Type"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Client Auth"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Protocol"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Shutdown Gracefully"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&amp;lt;property name="Referral Strategy"&amp;gt;FOLLOW&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Connect Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Read Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&amp;lt;property name="Url"&amp;gt;ldap://ldap.dev:389&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Page Size"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Sync Interval"&amp;gt;30 mins&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Membership - Enforce Case Sensitivity"&amp;gt;false&amp;lt;/property&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&amp;lt;property name="User Search Base"&amp;gt;dc=dev,dc=coorporate&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Object Class"&amp;gt;user&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Search Scope"&amp;gt;SUBTREE&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Search Filter"&amp;gt;(|(memberof=cn=EDH_ML,ou=Groups - Applications,ou=Groups,ou=Xyz Dev,dc=dev,dc=coorporate))&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Identity Attribute"&amp;gt;cn&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Group Name Attribute"&amp;gt;memberOf&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Group Name Attribute - Referenced Group Attribute"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&amp;lt;property name="Group Search Base"&amp;gt;ou=Groups - Applications,ou=Groups,ou=Xyz Dev,dc=dev,dc=coorporate&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Object Class"&amp;gt;group&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Search Scope"&amp;gt;SUBTREE&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Search Filter"&amp;gt;(|(cn=EDH_ML))&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Name Attribute"&amp;gt;cn&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Member Attribute"&amp;gt;member&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Member Attribute - Referenced User Attribute"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/userGroupProvider&amp;gt;&lt;/PRE&gt;&lt;PRE&gt;&amp;nbsp;&amp;lt;userGroupProvider&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;composite-configurable-user-group-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.CompositeConfigurableUserGroupProvider&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="Configurable User Group Provider"&amp;gt;file-user-group-provider&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Group Provider 1"&amp;gt;ldap-user-group-provider&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/userGroupProvider&amp;gt;&lt;BR /&gt;&lt;BR /&gt; &amp;lt;accessPolicyProvider&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;file-access-policy-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAccessPolicyProvider&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Group Provider"&amp;gt;composite-configurable-user-group-provider&amp;lt;/property&amp;gt; &lt;BR /&gt;&amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Initial Admin Identity"&amp;gt;cn=Service Account\, nifi_ldap,ou=Service Accounts,ou=Xyz Dev,dc=dev,dc=coorporate&amp;lt;/property&amp;gt; &lt;BR /&gt;&amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Node Identity 1"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Node Group"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/accessPolicyProvider&amp;gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt; &amp;lt;authorizer&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;managed-authorizer&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.StandardManagedAuthorizer&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="Access Policy Provider"&amp;gt;file-access-policy-provider&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/authorizer&amp;gt;&lt;BR /&gt;&lt;BR /&gt; &amp;lt;authorizer&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;file-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAuthorizer&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Users File"&amp;gt;./conf/users.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Initial Admin Identity"&amp;gt;cn=Service Account\, nifi_ldap,ou=Service Accounts,ou=Xyz Dev,dc=dev,dc=coorporate&amp;lt;/property&amp;gt; &lt;BR /&gt;&amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Node Identity 1"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/authorizer&amp;gt;&lt;BR /&gt;&lt;BR /&gt; &amp;lt;authorizer&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;single-user-authorizer&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.single.user.SingleUserAuthorizer&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;/authorizer&amp;gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;login-identity-providers.xml&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&amp;lt;provider&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;ldap-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.ldap.LdapProvider&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="Authentication Strategy"&amp;gt;SIMPLE&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Manager DN"&amp;gt;cn=Service Account\, nifi_ldap,ou=Service Accounts,ou=Xyz Dev,dc=dev,dc=coorporate&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Manager Password"&amp;gt;pass321&amp;lt;/property&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&amp;lt;property name="TLS - Keystore"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Keystore Password"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Keystore Type"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Truststore"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Truststore Password"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Truststore Type"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Client Auth"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Protocol"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="TLS - Shutdown Gracefully"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&amp;lt;property name="Referral Strategy"&amp;gt;FOLLOW&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Connect Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Read Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Url"&amp;gt;ldap://ldap.dev:389&amp;lt;/property&amp;gt; &lt;BR /&gt;&amp;lt;property name="User Search Base"&amp;gt;dc=dev,dc=coorporate&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Search Filter"&amp;gt;sAMAccountName={0}&amp;lt;/property&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&amp;lt;property name="Identity Strategy"&amp;gt;USE_DN&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Authentication Expiration"&amp;gt;12 hours&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/provider&amp;gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nifi-user.log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;2022-09-08 14:17:25,082 INFO [NiFi Web Server-19] org.apache.nifi.web.api.AccessResource Logout Started [cn=User_LN\, User_FN,ou=abcde,ou=Users,ou=coorporate,dc=dev,dc=coorporate]&lt;BR /&gt;2022-09-08 14:17:25,102 INFO [NiFi Web Server-186] org.apache.nifi.web.api.AccessResource Logout Request [97418afe-fd34-4cee-b788-0b9ade8a7fb4] Completed [cn=User_LN\, User_FN,ou=abcde,ou=Users,ou=coorporate,dc=dev,dc=coorporate]&lt;BR /&gt;2022-09-08 14:17:28,208 INFO [NiFi Web Server-145] o.a.n.w.s.NiFiAuthenticationFilter Authentication Started 127.0.0.1 [&amp;lt;anonymous&amp;gt;] GET https://localhost:8080/nifi-api/flow/current-user&lt;BR /&gt;2022-09-08 14:17:28,208 WARN [NiFi Web Server-145] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 127.0.0.1 GET https://localhost:8080/nifi-api/flow/current-user [Anonymous authentication has not been configured.]&lt;BR /&gt;2022-09-08 14:17:37,864 INFO [NiFi Web Server-194] o.a.n.w.a.c.AccessDeniedExceptionMapper identity[cn=User_LN\, User_FN,ou=abcde,ou=Users,ou=coorporate,dc=dev,dc=coorporate], groups[] does not have permission to access the requested resource. Unknown user with identity 'cn=User_LN\, User_FN,ou=abcde,ou=Users,ou=coorporate,dc=dev,dc=coorporate'. Returning Forbidden response.&lt;BR /&gt;2022-09-08 14:17:42,240 INFO [NiFi Web Server-145] org.apache.nifi.web.api.AccessResource Logout Started [cn=User_LN\, User_FN,ou=abcde,ou=Users,ou=coorporate,dc=dev,dc=coorporate]&lt;BR /&gt;2022-09-08 14:17:42,253 INFO [NiFi Web Server-153] org.apache.nifi.web.api.AccessResource Logout Request [b3ebfab9-4149-4d02-a65d-4b59907a0a67] Completed [cn=User_LN\, User_FN,ou=abcde,ou=Users,ou=coorporate,dc=dev,dc=coorporate]&lt;BR /&gt;2022-09-08 14:17:44,325 INFO [NiFi Web Server-194] o.a.n.w.s.NiFiAuthenticationFilter Authentication Started 127.0.0.1 [&amp;lt;anonymous&amp;gt;] GET https://localhost:8080/nifi-api/flow/current-user&lt;BR /&gt;2022-09-08 14:17:44,325 WARN [NiFi Web Server-194] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 127.0.0.1 GET https://localhost:8080/nifi-api/flow/current-user [Anonymous authentication has not been configured.]&lt;BR /&gt;2022-09-08 14:18:19,841 INFO [NiFi Web Server-153] o.a.n.w.a.c.AccessDeniedExceptionMapper identity[cn=User_LN\, User_FN,ou=abcde,ou=Users,ou=coorporate,dc=dev,dc=coorporate], groups[] does not have permission to access the requested resource. Unknown user with identity 'cn=User_LN\, User_FN,ou=abcde,ou=Users,ou=coorporate,dc=dev,dc=coorporate'. Returning Forbidden response.&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Alvin&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Sep 2022 11:17:29 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/NIFI-Insufficient-Permissions-for-LDAP-User-Group/m-p/351856#M236392</guid>
      <dc:creator>ajignacio</dc:creator>
      <dc:date>2022-09-09T11:17:29Z</dc:date>
    </item>
    <item>
      <title>Re: NIFI Insufficient Permissions for LDAP User Group</title>
      <link>https://community.cloudera.com/t5/Support-Questions/NIFI-Insufficient-Permissions-for-LDAP-User-Group/m-p/352084#M236433</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/82000"&gt;@ajignacio&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;User and group identity strings much match identically.&lt;BR /&gt;Your ldap-user-group-provider is syncing users and groups by the identity string found in the CN AD attribute.&amp;nbsp; This is why you are seeing only the CN username and CN groupname strings in the users UI within NiFi.&lt;BR /&gt;&lt;BR /&gt;However, when you are logging in to NiFi to authenticate you user via the ldap-provider, the resulting user identity sting is the users full AD Distinguished Name (DN).&amp;nbsp; NiFi treats different strings as different users.&lt;BR /&gt;The&amp;nbsp; ldap-provider can be changed to use the user identity string typed in the username field instead of using the full DN.&amp;nbsp; This is done by changing the following property:&lt;/P&gt;&lt;PRE&gt;&amp;lt;property name="Identity Strategy"&amp;gt;USE_DN&amp;lt;/property&amp;gt;&lt;/PRE&gt;&lt;P&gt;change it to :&lt;/P&gt;&lt;PRE&gt;&amp;lt;property name="Identity Strategy"&amp;gt;USE_USERNAME&amp;lt;/property&amp;gt;&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;Upon successful authentication the resulting user identity is evaluated against any identity mapping patterns that may be configured in the nifi.properties file.&amp;nbsp; The resulting mapped value is then passed to the configured authorizer (managed-authorizer in your setup).&amp;nbsp; There the authorizers is looking up that user identity string (case sensitive) against the user strings synced by your configured users group providers.&amp;nbsp; If an exact match is found both the user string and the now learned group string(s) are checked against the configured NiFi policies to determine authorization.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="batang,apple gothic"&gt;If you found that the provided solution(s) assisted you with your query, please take a moment to login and click&lt;/FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT face="arial black,avant garde" color="#FF0000"&gt;Accept as Solution&amp;nbsp;&lt;/FONT&gt;&lt;FONT face="batang,apple gothic" color="#000000"&gt;below each response that helped.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2022 20:52:21 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/NIFI-Insufficient-Permissions-for-LDAP-User-Group/m-p/352084#M236433</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2022-09-12T20:52:21Z</dc:date>
    </item>
  </channel>
</rss>

