<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Creating a Secure NiFi Cluster with 3rd Party Provided Certificates in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Creating-a-Secure-NiFi-Cluster-with-3rd-Party-Provided/m-p/365930#M239445</link>
    <description>&lt;P&gt;Hello, I am following the Apache NiFi Walkthroughs, specifically the NiFi Standalone Using External CA.&amp;nbsp; I am trying to install a 5 node cluster.&amp;nbsp; The process I am following is:&lt;/P&gt;&lt;P&gt;I created, using TinyCert the following:&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; A signed NiFi server certifcate for each NiFi server in my cluster i.e., nifi1, nifi2, nifi3, nifi4, and nifi5.&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; The matching private keys in PEM format.&lt;/P&gt;&lt;P&gt;3.&amp;nbsp; A signed client certificate that I created on nifi1 (which I then planned to reuse for the other nodes i.e., nifi2, nifi3, nifi4, and nifi5).&lt;/P&gt;&lt;P&gt;4.&amp;nbsp; The matching private key in PEM format.&lt;/P&gt;&lt;P&gt;5.&amp;nbsp; The CA certificate in PEM format.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then, on each server i.e., nifi1, nifi2, nifi3, nifi4, and nifi5, i followed the steps indicated in the walkthrough i.e.,&amp;nbsp;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; concatenate the server certificate and CA certificate to form the certificate chain.&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; Form the PKCS12 keystore from the certificate chain and private key.&lt;/P&gt;&lt;P&gt;3.&amp;nbsp; Convert the PKCS12 keystore for the NiFi instance into the Java Keystore file.&lt;/P&gt;&lt;P&gt;4.&amp;nbsp; Convert the CA certificate into the NiFi trustore&amp;nbsp;&lt;/P&gt;&lt;P&gt;5.&amp;nbsp; Then, for each nifi server, I move the keystore.jks, truststore.jks to the appropriate nifi server.&lt;/P&gt;&lt;P&gt;6.&amp;nbsp; Then, for each nifi server e.g., nifi1, nifi2, etc..., I modified the nifi.properties files for each as indicated&amp;nbsp;&lt;/P&gt;&lt;P&gt;7.&amp;nbsp; I then generated the client certificate keystore from the client certificate and key.&lt;/P&gt;&lt;P&gt;8.&amp;nbsp; For each node, in each respective nifi.properties file, I changed the following:&lt;/P&gt;&lt;P&gt;nifi.cluster.is.node = true, and nifi.cluster.load.balance.host=nifi1 (and nifi2 in the corresponding nifi.properties file for nifi2, and so on...&lt;/P&gt;&lt;P&gt;I then updated each nifi servers nifi.properties file by updating the nifi.zookeeper.connect.string = to the IP address:2181,xxx for each zookeeper (I have 5 zookeeper nodes)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I then updated the state-management.xml file, and added the ip address:2181 of each zookeeper node in the connect string property.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I then updated the authorizers.xml file for each nifi server.&lt;/P&gt;&lt;P&gt;I then started nifi on each nifi server.&lt;/P&gt;&lt;P&gt;Here is the log from nifi-app.log from nifi1:&lt;/P&gt;&lt;P&gt;GNU nano 2.9.8 nifi-app.log&lt;/P&gt;&lt;P&gt;2023-03-12 14:40:31,710 INFO [main] org.apache.nifi.NiFi Launching NiFi...&lt;BR /&gt;2023-03-12 14:40:31,769 INFO [main] o.a.nifi.properties.NiFiPropertiesLoader Loading Application Properties$&lt;BR /&gt;2023-03-12 14:40:31,779 INFO [main] org.apache.nifi.NiFi Application Properties loaded [203]&lt;BR /&gt;2023-03-12 14:40:31,894 INFO [main] org.apache.nifi.BootstrapListener Started Bootstrap Listener, Listening$&lt;BR /&gt;2023-03-12 14:40:31,908 INFO [main] org.apache.nifi.BootstrapListener Successfully initiated communication $&lt;BR /&gt;2023-03-12 14:40:31,996 INFO [main] org.apache.nifi.nar.NarUnpacker Expanding 128 NAR files with all proces$&lt;BR /&gt;2023-03-12 14:45:31,550 INFO [main] org.apache.nifi.nar.NarUnpacker NAR loading process took 299554337505 n$&lt;BR /&gt;2023-03-12 14:46:17,598 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:17,612 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:22,622 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:23,019 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:23,478 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:23,481 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:23,534 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:23,562 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:23,583 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:23,594 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:23,603 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,166 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,170 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,205 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,219 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,245 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,256 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,281 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,434 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,441 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,441 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,443 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,450 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:25,174 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:26,005 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:27,053 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:27,665 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:27,730 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:27,948 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:28,429 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:28,665 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:28,779 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:29,457 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:30,035 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:30,041 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;[ Read 1879 lines ]&lt;BR /&gt;^G Get Help ^O Write Out ^W Where Is ^K Cut Text ^J Justify ^C Cur Pos M-U Undo&lt;BR /&gt;^X Exit ^R Read File ^\ Replace ^U Uncut Text ^T To Spell ^_ Go To Line M-E Redo&lt;/P&gt;&lt;P&gt;Is this a viable approach for setting up a multi-node secure cluster using 3rd party certificates?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 12 Mar 2023 15:29:36 GMT</pubDate>
    <dc:creator>davehkd</dc:creator>
    <dc:date>2023-03-12T15:29:36Z</dc:date>
    <item>
      <title>Creating a Secure NiFi Cluster with 3rd Party Provided Certificates</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Creating-a-Secure-NiFi-Cluster-with-3rd-Party-Provided/m-p/365930#M239445</link>
      <description>&lt;P&gt;Hello, I am following the Apache NiFi Walkthroughs, specifically the NiFi Standalone Using External CA.&amp;nbsp; I am trying to install a 5 node cluster.&amp;nbsp; The process I am following is:&lt;/P&gt;&lt;P&gt;I created, using TinyCert the following:&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; A signed NiFi server certifcate for each NiFi server in my cluster i.e., nifi1, nifi2, nifi3, nifi4, and nifi5.&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; The matching private keys in PEM format.&lt;/P&gt;&lt;P&gt;3.&amp;nbsp; A signed client certificate that I created on nifi1 (which I then planned to reuse for the other nodes i.e., nifi2, nifi3, nifi4, and nifi5).&lt;/P&gt;&lt;P&gt;4.&amp;nbsp; The matching private key in PEM format.&lt;/P&gt;&lt;P&gt;5.&amp;nbsp; The CA certificate in PEM format.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then, on each server i.e., nifi1, nifi2, nifi3, nifi4, and nifi5, i followed the steps indicated in the walkthrough i.e.,&amp;nbsp;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; concatenate the server certificate and CA certificate to form the certificate chain.&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; Form the PKCS12 keystore from the certificate chain and private key.&lt;/P&gt;&lt;P&gt;3.&amp;nbsp; Convert the PKCS12 keystore for the NiFi instance into the Java Keystore file.&lt;/P&gt;&lt;P&gt;4.&amp;nbsp; Convert the CA certificate into the NiFi trustore&amp;nbsp;&lt;/P&gt;&lt;P&gt;5.&amp;nbsp; Then, for each nifi server, I move the keystore.jks, truststore.jks to the appropriate nifi server.&lt;/P&gt;&lt;P&gt;6.&amp;nbsp; Then, for each nifi server e.g., nifi1, nifi2, etc..., I modified the nifi.properties files for each as indicated&amp;nbsp;&lt;/P&gt;&lt;P&gt;7.&amp;nbsp; I then generated the client certificate keystore from the client certificate and key.&lt;/P&gt;&lt;P&gt;8.&amp;nbsp; For each node, in each respective nifi.properties file, I changed the following:&lt;/P&gt;&lt;P&gt;nifi.cluster.is.node = true, and nifi.cluster.load.balance.host=nifi1 (and nifi2 in the corresponding nifi.properties file for nifi2, and so on...&lt;/P&gt;&lt;P&gt;I then updated each nifi servers nifi.properties file by updating the nifi.zookeeper.connect.string = to the IP address:2181,xxx for each zookeeper (I have 5 zookeeper nodes)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I then updated the state-management.xml file, and added the ip address:2181 of each zookeeper node in the connect string property.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I then updated the authorizers.xml file for each nifi server.&lt;/P&gt;&lt;P&gt;I then started nifi on each nifi server.&lt;/P&gt;&lt;P&gt;Here is the log from nifi-app.log from nifi1:&lt;/P&gt;&lt;P&gt;GNU nano 2.9.8 nifi-app.log&lt;/P&gt;&lt;P&gt;2023-03-12 14:40:31,710 INFO [main] org.apache.nifi.NiFi Launching NiFi...&lt;BR /&gt;2023-03-12 14:40:31,769 INFO [main] o.a.nifi.properties.NiFiPropertiesLoader Loading Application Properties$&lt;BR /&gt;2023-03-12 14:40:31,779 INFO [main] org.apache.nifi.NiFi Application Properties loaded [203]&lt;BR /&gt;2023-03-12 14:40:31,894 INFO [main] org.apache.nifi.BootstrapListener Started Bootstrap Listener, Listening$&lt;BR /&gt;2023-03-12 14:40:31,908 INFO [main] org.apache.nifi.BootstrapListener Successfully initiated communication $&lt;BR /&gt;2023-03-12 14:40:31,996 INFO [main] org.apache.nifi.nar.NarUnpacker Expanding 128 NAR files with all proces$&lt;BR /&gt;2023-03-12 14:45:31,550 INFO [main] org.apache.nifi.nar.NarUnpacker NAR loading process took 299554337505 n$&lt;BR /&gt;2023-03-12 14:46:17,598 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:17,612 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:22,622 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:23,019 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:23,478 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:23,481 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:23,534 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:23,562 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:23,583 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:23,594 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:23,603 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,166 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,170 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,205 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,219 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,245 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,256 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,281 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,434 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,441 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,441 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,443 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:24,450 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:25,174 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:26,005 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:27,053 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:27,665 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:27,730 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:27,948 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:28,429 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:28,665 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:28,779 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:29,457 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:30,035 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;2023-03-12 14:46:30,041 INFO [main] org.apache.nifi.nar.NarClassLoaders Loaded NAR file: /home/ec2-user/nif$&lt;BR /&gt;[ Read 1879 lines ]&lt;BR /&gt;^G Get Help ^O Write Out ^W Where Is ^K Cut Text ^J Justify ^C Cur Pos M-U Undo&lt;BR /&gt;^X Exit ^R Read File ^\ Replace ^U Uncut Text ^T To Spell ^_ Go To Line M-E Redo&lt;/P&gt;&lt;P&gt;Is this a viable approach for setting up a multi-node secure cluster using 3rd party certificates?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Mar 2023 15:29:36 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Creating-a-Secure-NiFi-Cluster-with-3rd-Party-Provided/m-p/365930#M239445</guid>
      <dc:creator>davehkd</dc:creator>
      <dc:date>2023-03-12T15:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a Secure NiFi Cluster with 3rd Party Provided Certificates</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Creating-a-Secure-NiFi-Cluster-with-3rd-Party-Provided/m-p/366006#M239467</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/102685"&gt;@davehkd&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;I am not sure I am clear on the ask.&amp;nbsp; Are you having issues with your 5 node NiFi cluster?&lt;BR /&gt;&lt;BR /&gt;As far as certificates go for NiFi, it really does not matter where you obtain them or if you use self-signed (not recommended) as long as the keystore meets the requirements for NiFi.&lt;BR /&gt;&lt;BR /&gt;A NiFi node's keystore must meeting the following requirements:&lt;BR /&gt;1. Keystore contains only 1 PrivateKey entry.&amp;nbsp; You can not have multiple PrivateKey Entries in the keystore since NiFi will not know which to use.&lt;BR /&gt;2. Keystore PrivateKey entry MUST have Extended Key Usage (EKU) of clientAuth and serverAuth,&amp;nbsp; NiFi nodes communicate with one another and thus will act as clients and servers in the TLS exchange.&lt;BR /&gt;3. Keystore PrivateKey entry must contain a DNS entry for the hostname on which the certificate is being used.&lt;BR /&gt;&lt;BR /&gt;A NiFi node's truststore contains 1 too many trustedCertEntries.&amp;nbsp; It needs to contain the complete trust chain for any client certificates that will be used to authenticate with NiFi via a mutual TLS handshake.&amp;nbsp; This includes the complete trust chain for each node in yoru cluster.&amp;nbsp; A trust chain consist of every intermediate CA public cert all the way to the root CA public cert.&amp;nbsp; The root CA will have the same owner and issuer.&amp;nbsp; The cacerts file that is included with most java distributions is a truststore containing most public signing authorities intermediate and root CAs.&lt;BR /&gt;&lt;BR /&gt;You can obtain a verbose listing of your keystore/truststore using the keytool command found in yoru java install&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;path to JDK&amp;gt;/bin/keytool -v -list -keystore &amp;lt;keystore or truststore filename&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;From the output verify following on PrivateKey entry:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattWho_1-1678736086766.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/36961i9D5CADA204278F12/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattWho_1-1678736086766.png" alt="MattWho_1-1678736086766.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;(DNSName will have your nodes hostname)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="batang,apple gothic"&gt;If you found that the provided solution(s) assisted you with your query, please take a moment to login and click&lt;/FONT&gt;&amp;nbsp;&lt;FONT face="arial black,avant garde" color="#FF0000"&gt;Accept as Solution&amp;nbsp;&lt;/FONT&gt;&lt;FONT face="batang,apple gothic" color="#000000"&gt;below each response that helped.&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="batang,apple gothic" color="#000000"&gt;Matt&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 19:35:52 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Creating-a-Secure-NiFi-Cluster-with-3rd-Party-Provided/m-p/366006#M239467</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2023-03-13T19:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a Secure NiFi Cluster with 3rd Party Provided Certificates</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Creating-a-Secure-NiFi-Cluster-with-3rd-Party-Provided/m-p/366020#M239469</link>
      <description>&lt;P&gt;hello Matt, i was simply trying to understand if my approach for use of 3rd party certificates as I described was an appropriate approach.&lt;/P&gt;&lt;P&gt;Thanks for pointing out the tool. I'll use it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 20:43:52 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Creating-a-Secure-NiFi-Cluster-with-3rd-Party-Provided/m-p/366020#M239469</guid>
      <dc:creator>davehkd</dc:creator>
      <dc:date>2023-03-13T20:43:52Z</dc:date>
    </item>
  </channel>
</rss>

