<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Unable to locate initial admin error when using OIDC in Nifi Cluster mode in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Unable-to-locate-initial-admin-error-when-using-OIDC-in-Nifi/m-p/371930#M241119</link>
    <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/105353"&gt;@EddyChan&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;In your authorizers.xml it appears you have configured your "managed-authorizer" --&amp;gt; "Access Policy Provider" property to reference a User Group Provider (aad-user-group-provider" instead of an Access Policy Provider.&amp;nbsp; It should be configured to use the "file-access-policy-provider".&lt;BR /&gt;&lt;BR /&gt;The file-access-policy-provider then gets a list of users and groups from the then referenced user-group-providers in order to generate initial admin access policies.&lt;BR /&gt;&lt;BR /&gt;I see your file-access-policy-provider "initial admin identity" property is configured with:&lt;/P&gt;&lt;PRE&gt;{{.Values.auth.oidc.admin}}&lt;/PRE&gt;&lt;P&gt;I don't know what user identity string this resolves to.&amp;nbsp; Keep in mind that NiFi users and group idnetity strings are case sensitive. So if your admin user identity returned by the "aad-user-group-provider" is "&lt;SPAN&gt;joseace@azure.com&lt;/SPAN&gt;" for example and "{{.Values.auth.oidc.admin}}" resolves to "&lt;SPAN&gt;joseAce@azure.com&lt;/SPAN&gt;", NiFi recognizes these as two different users.&lt;BR /&gt;&lt;BR /&gt;You may also want to try putting the&amp;nbsp; add-user-group-provider class in DEBUG in the NiFi logback.xml to see if it provides a listing of all the users and groups returned by that provider configuration.&lt;/P&gt;&lt;PRE&gt;org.apache.nifi.authorization.azure.AzureGraphUserGroupProvider&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="batang,apple gothic"&gt;If you found that the provided solution(s) assisted you with your query, please take a moment to login and click&lt;/FONT&gt;&amp;nbsp;&lt;FONT face="arial black,avant garde" color="#FF0000"&gt;Accept as Solution&amp;nbsp;&lt;/FONT&gt;&lt;FONT face="batang,apple gothic" color="#000000"&gt;below each response that helped.&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="batang,apple gothic" color="#000000"&gt;Matt&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 01 Jun 2023 14:22:20 GMT</pubDate>
    <dc:creator>MattWho</dc:creator>
    <dc:date>2023-06-01T14:22:20Z</dc:date>
    <item>
      <title>Unable to locate initial admin error when using OIDC in Nifi Cluster mode</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Unable-to-locate-initial-admin-error-when-using-OIDC-in-Nifi/m-p/371904#M241111</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Unable to up the Nifi Cluster Mode with OIDC Integration&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Have Existing Cert-Manager v1.5.3 (Let's Encrypt)&lt;/LI&gt;&lt;LI&gt;Currently using OIDC with Cluster Mode&lt;/LI&gt;&lt;LI&gt;Nifi Image version 1.19.1&lt;/LI&gt;&lt;LI&gt;Pull nifi release v1.1.3&lt;/LI&gt;&lt;LI&gt;Kong gateway/proxy version 3.2&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;My value.yaml (Note: I only put necessary info value not a full value.yaml)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;replicaCount: 2

properties:
  externalSecure: false
  isNode: true
  httpsPort: 8443 
  webProxyHost: nifi-cluster.domain.name:443 

service:
  type: ClusterIP
  httpsPort: 8443
  # nodePort: 30236
  annotations: 
    kubernetes.io/ingress.class: kong-nginx
    konghq.com/protocol: "https"

ingress:
  enabled: true
  className: kong-nginx
  annotations: 
    cert-manager.io/cluster-issuer: letsencrypt-xxx
    konghq.com/strip-path: "false"
    konghq.com/plugins: session
    konghq.com/session-affinity-cookie: my_session_cookie
    konghq.com/protocols: "http,https"  # Enable both HTTP and HTTPS
    konghq.com/session-affinity: "true"  # Enable session affinity
  tls: 
    - secretName: nifi-certificate
      hosts:
        - nifi-cluster.domain.name
  hosts: 
    - nifi-cluster.domain.name
  path: /&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My authorizers.xml &lt;STRONG&gt;(Note: my coredns are using cluster.devops)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;{{- $replicas := int .Values.replicaCount }}
{{- $chart := .Chart.Name }}
{{- $release := .Release.Name }}
{{- $fullname := include "apache-nifi.fullname" . }}
{{- $namespace := .Release.Namespace }}
&amp;lt;?xml version="1.0" encoding="UTF-8" standalone="yes"?&amp;gt;
&amp;lt;!--
  Licensed to the Apache Software Foundation (ASF) under one or more
  contributor license agreements.  See the NOTICE file distributed with
  this work for additional information regarding copyright ownership.
  The ASF licenses this file to You under the Apache License, Version 2.0
  (the "License"); you may not use this file except in compliance with
  the License.  You may obtain a copy of the License at
      http://www.apache.org/licenses/LICENSE-2.0
  Unless required by applicable law or agreed to in writing, software
  distributed under the License is distributed on an "AS IS" BASIS,
  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  See the License for the specific language governing permissions and
  limitations under the License.
--&amp;gt;
&amp;lt;!--
    This file lists the userGroupProviders, accessPolicyProviders, and authorizers to use when running securely. In order
    to use a specific authorizer it must be configured here and it's identifier must be specified in the nifi.properties file.
    If the authorizer is a managedAuthorizer, it may need to be configured with an accessPolicyProvider and an userGroupProvider.
    This file allows for configuration of them, but they must be configured in order:
    ...
    all userGroupProviders
    all accessPolicyProviders
    all Authorizers
    ...
--&amp;gt;

&amp;lt;authorizers&amp;gt;
    &amp;lt;userGroupProvider&amp;gt;
        &amp;lt;identifier&amp;gt;file-user-group-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileUserGroupProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Users File"&amp;gt;./auth-conf/users.xml&amp;lt;/property&amp;gt;
        &amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;
        {{- range $i := until $replicas }}
        &amp;lt;property name="Initial User Identity {{ $i }}"&amp;gt;CN={{ $fullname }}-{{ $i }}.{{ $fullname }}-headless.{{ $namespace }}.svc.cluster.devops, OU=NIFI&amp;lt;/property&amp;gt;
        {{- end }}
    &amp;lt;/userGroupProvider&amp;gt;

    &amp;lt;accessPolicyProvider&amp;gt;
        &amp;lt;identifier&amp;gt;file-access-policy-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAccessPolicyProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="User Group Provider"&amp;gt;file-user-group-provider&amp;lt;/property&amp;gt;
        &amp;lt;property name="Authorizations File"&amp;gt;./auth-conf/authorizations.xml&amp;lt;/property&amp;gt;
        &amp;lt;property name="Node Identity"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;/accessPolicyProvider&amp;gt;

    &amp;lt;authorizer&amp;gt;
        &amp;lt;identifier&amp;gt;managed-authorizer&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.StandardManagedAuthorizer&amp;lt;/class&amp;gt;
        &amp;lt;property name="Access Policy Provider"&amp;gt;file-access-policy-provider&amp;lt;/property&amp;gt;
    &amp;lt;/authorizer&amp;gt;

    {{- if .Values.auth.oidc.enabled}}
    &amp;lt;userGroupProvider&amp;gt;
        &amp;lt;identifier&amp;gt;aad-user-group-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.azure.AzureGraphUserGroupProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Refresh Delay"&amp;gt;1 mins&amp;lt;/property&amp;gt;
        &amp;lt;property name="Authority Endpoint"&amp;gt;https://login.microsoftonline.com&amp;lt;/property&amp;gt;
        &amp;lt;property name="Directory ID"&amp;gt;{{.Values.auth.oidc.tenantId}}&amp;lt;/property&amp;gt;
        &amp;lt;property name="Application ID"&amp;gt;{{.Values.auth.oidc.clientId}}&amp;lt;/property&amp;gt;
        &amp;lt;property name="Client Secret"&amp;gt;{{.Values.auth.oidc.clientSecret}}&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Filter Prefix"&amp;gt;aad-nifi&amp;lt;/property&amp;gt;
        &amp;lt;property name="Page Size"&amp;gt;100&amp;lt;/property&amp;gt;
    &amp;lt;/userGroupProvider&amp;gt;

    &amp;lt;userGroupProvider&amp;gt;
        &amp;lt;identifier&amp;gt;composite-configurable-user-group-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.CompositeConfigurableUserGroupProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Configurable User Group Provider"&amp;gt;file-user-group-provider&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Group Provider 1"&amp;gt;aad-user-group-provider&amp;lt;/property&amp;gt;
    &amp;lt;/userGroupProvider&amp;gt;

    &amp;lt;accessPolicyProvider&amp;gt;
        &amp;lt;identifier&amp;gt;file-access-policy-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAccessPolicyProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="User Group Provider"&amp;gt;composite-configurable-user-group-provider&amp;lt;/property&amp;gt;
        &amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;
        &amp;lt;property name="Initial Admin Identity"&amp;gt;{{.Values.auth.oidc.admin}}&amp;lt;/property&amp;gt;
        &amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Node Identity 1"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;/accessPolicyProvider&amp;gt;

    &amp;lt;authorizer&amp;gt;
        &amp;lt;identifier&amp;gt;managed-authorizer&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.StandardManagedAuthorizer&amp;lt;/class&amp;gt;
        &amp;lt;property name="Access Policy Provider"&amp;gt;aad-user-group-provider&amp;lt;/property&amp;gt;
    &amp;lt;/authorizer&amp;gt;
    {{- end}}
&amp;lt;/authorizers&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Error hit and the nifi pod were in crashloop state&lt;/STRONG&gt;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;Caused by: org.apache.nifi.authorization.exception.AuthorizerCreationException: org.apache.nifi.authorization.exception.AuthorizerCreationException: Unable to locate initial admin joseAce@azure.com to seed policies&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;org.apache.nifi.NiFi Application Server shutdown started&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;STRONG&gt;Expected Result&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Able to login in cluster mode(2 Replica) with oidc integration (AzureAD)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Appreciate that someone could help me to find where the configuration needs to be correct.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2023 09:51:43 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Unable-to-locate-initial-admin-error-when-using-OIDC-in-Nifi/m-p/371904#M241111</guid>
      <dc:creator>EddyChan</dc:creator>
      <dc:date>2023-06-01T09:51:43Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to locate initial admin error when using OIDC in Nifi Cluster mode</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Unable-to-locate-initial-admin-error-when-using-OIDC-in-Nifi/m-p/371916#M241114</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/105353"&gt;@EddyChan&lt;/a&gt;&amp;nbsp;Welcome to our community! To help you get the best possible answer, I have tagged in our NiFi experts&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/103151"&gt;@cotopaul&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/31438"&gt;@TimothySpann&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/80381"&gt;@SAMSAL&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/95503"&gt;@steven-matison&lt;/a&gt;&amp;nbsp; who may be able to assist you further.&lt;BR /&gt;&lt;BR /&gt;Please feel free to provide any additional information or details about your query, and we hope that you will find a satisfactory solution to your question.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2023 12:07:23 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Unable-to-locate-initial-admin-error-when-using-OIDC-in-Nifi/m-p/371916#M241114</guid>
      <dc:creator>VidyaSargur</dc:creator>
      <dc:date>2023-06-01T12:07:23Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to locate initial admin error when using OIDC in Nifi Cluster mode</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Unable-to-locate-initial-admin-error-when-using-OIDC-in-Nifi/m-p/371930#M241119</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/105353"&gt;@EddyChan&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;In your authorizers.xml it appears you have configured your "managed-authorizer" --&amp;gt; "Access Policy Provider" property to reference a User Group Provider (aad-user-group-provider" instead of an Access Policy Provider.&amp;nbsp; It should be configured to use the "file-access-policy-provider".&lt;BR /&gt;&lt;BR /&gt;The file-access-policy-provider then gets a list of users and groups from the then referenced user-group-providers in order to generate initial admin access policies.&lt;BR /&gt;&lt;BR /&gt;I see your file-access-policy-provider "initial admin identity" property is configured with:&lt;/P&gt;&lt;PRE&gt;{{.Values.auth.oidc.admin}}&lt;/PRE&gt;&lt;P&gt;I don't know what user identity string this resolves to.&amp;nbsp; Keep in mind that NiFi users and group idnetity strings are case sensitive. So if your admin user identity returned by the "aad-user-group-provider" is "&lt;SPAN&gt;joseace@azure.com&lt;/SPAN&gt;" for example and "{{.Values.auth.oidc.admin}}" resolves to "&lt;SPAN&gt;joseAce@azure.com&lt;/SPAN&gt;", NiFi recognizes these as two different users.&lt;BR /&gt;&lt;BR /&gt;You may also want to try putting the&amp;nbsp; add-user-group-provider class in DEBUG in the NiFi logback.xml to see if it provides a listing of all the users and groups returned by that provider configuration.&lt;/P&gt;&lt;PRE&gt;org.apache.nifi.authorization.azure.AzureGraphUserGroupProvider&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="batang,apple gothic"&gt;If you found that the provided solution(s) assisted you with your query, please take a moment to login and click&lt;/FONT&gt;&amp;nbsp;&lt;FONT face="arial black,avant garde" color="#FF0000"&gt;Accept as Solution&amp;nbsp;&lt;/FONT&gt;&lt;FONT face="batang,apple gothic" color="#000000"&gt;below each response that helped.&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="batang,apple gothic" color="#000000"&gt;Matt&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2023 14:22:20 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Unable-to-locate-initial-admin-error-when-using-OIDC-in-Nifi/m-p/371930#M241119</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2023-06-01T14:22:20Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to locate initial admin error when using OIDC in Nifi Cluster mode</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Unable-to-locate-initial-admin-error-when-using-OIDC-in-Nifi/m-p/372167#M241171</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Tested in my env by configure to "file-access-policy-provider" is workable in one replica. But when try two replicas it hit the error like below&lt;BR /&gt;&lt;BR /&gt;user-app log&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;INFO [main] o.a.n.a.FileAccessPolicyProvider Populating authorizations for Initial Admin: joseAce@azure.com
INFO [main] o.a.n.a.FileUserGroupProvider Users/Groups file loaded at Sun Jun 04 03:30:39 MYT 2023
INFO [main] o.a.n.a.FileAccessPolicyProvider Added mapped node OU=NIFI, CN=nifi-infra-1.nifi-infra-headless.jose-env.svc.cluster.devops (raw node identity OU=NIFI, CN=nifi-infra-1.nifi-infra-headless.jose-env.svc.cluster.devops)
INFO [main] o.a.n.a.FileAccessPolicyProvider Added mapped node OU=NIFI, CN=nifi-infra-0.nifi-infra-headless.jose-env.svc.cluster.devops (raw node identity OU=NIFI, CN=nifi-infra-0.nifi-infra-headless.jose-env.svc.cluster.devops)
DEBUG [main] o.a.n.a.FileAccessPolicyProvider Empty node group name provided&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;app-log&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Caused by: org.springframework.beans.factory.UnsatisfiedDependencyException: Error creating bean with name 'org.springframework.security.config.annotation.method.configuration.GlobalMethodSecurityConfiguration': Unsatisfied dependency expressed through method 'setObjectPostProcessor' parameter 0; nested exception is org.springframework.beans.factory.UnsatisfiedDependencyException: Error creating bean with name 'org.apache.nifi.web.security.configuration.AuthenticationSecurityConfiguration': Unsatisfied dependency expressed through constructor parameter 2; nested exception is org.springframework.beans.factory.BeanCreationException: Error creating bean with name 'authorizer': FactoryBean threw exception on object creation; nested exception is org.apache.nifi.authorization.exception.AuthorizerCreationException: org.apache.nifi.authorization.exception.AuthorizerCreationException: Unable to locate initial admin jose@silverlakeaxis.com to seed policies
        at org.springframework.beans.factory.annotation.AutowiredAnnotationBeanPostProcessor$AutowiredMethodElement.resolveMethodArguments(AutowiredAnnotationBeanPostProcessor.java:768)
        at org.springframework.beans.factory.annotation.AutowiredAnnotationBeanPostProcessor$AutowiredMethodElement.inject(AutowiredAnnotationBeanPostProcessor.java:720)
        at org.springframework.beans.factory.annotation.InjectionMetadata.inject(InjectionMetadata.java:119)
        at org.springframework.beans.factory.annotation.AutowiredAnnotationBeanPostProcessor.postProcessProperties(AutowiredAnnotationBeanPostProcessor.java:399)
        at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.populateBean(AbstractAutowireCapableBeanFactory.java:1431)
        at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.doCreateBean(AbstractAutowireCapableBeanFactory.java:619)
        at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.createBean(AbstractAutowireCapableBeanFactory.java:542)
        at org.springframework.beans.factory.support.AbstractBeanFactory.lambda$doGetBean$0(AbstractBeanFactory.java:335)
        at org.springframework.beans.factory.support.DefaultSingletonBeanRegistry.getSingleton(DefaultSingletonBeanRegistry.java:234)
        at org.springframework.beans.factory.support.AbstractBeanFactory.doGetBean(AbstractBeanFactory.java:333)
        at org.springframework.beans.factory.support.AbstractBeanFactory.getBean(AbstractBeanFactory.java:208)
        at org.springframework.beans.factory.support.ConstructorResolver.instantiateUsingFactoryMethod(ConstructorResolver.java:410)
        at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.instantiateUsingFactoryMethod(AbstractAutowireCapableBeanFactory.java:1352)
        at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.createBeanInstance(AbstractAutowireCapableBeanFactory.java:1195)
        at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.doCreateBean(AbstractAutowireCapableBeanFactory.java:582)
        at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.createBean(AbstractAutowireCapableBeanFactory.java:542)
        at org.springframework.beans.factory.support.AbstractBeanFactory.lambda$doGetBean$0(AbstractBeanFactory.java:335)
        at org.springframework.beans.factory.support.DefaultSingletonBeanRegistry.getSingleton(DefaultSingletonBeanRegistry.java:234)
        at org.springframework.beans.factory.support.AbstractBeanFactory.doGetBean(AbstractBeanFactory.java:333)
        at org.springframework.beans.factory.support.AbstractBeanFactory.getBean(AbstractBeanFactory.java:208)
        at org.springframework.beans.factory.support.BeanDefinitionValueResolver.resolveReference(BeanDefinitionValueResolver.java:330)
        ... 67 common frames omitted
Caused by: org.springframework.beans.factory.UnsatisfiedDependencyException: Error creating bean with name 'org.apache.nifi.web.security.configuration.AuthenticationSecurityConfiguration': Unsatisfied dependency expressed through constructor parameter 2; nested exception is org.springframework.beans.factory.BeanCreationException: Error creating bean with name 'authorizer': FactoryBean threw exception on object creation; nested exception is org.apache.nifi.authorization.exception.AuthorizerCreationException: org.apache.nifi.authorization.exception.AuthorizerCreationException: Unable to locate initial admin joseAce@azure.com to seed policies
        at org.springframework.beans.factory.support.ConstructorResolver.createArgumentArray(ConstructorResolver.java:800)
        at org.springframework.beans.factory.support.ConstructorResolver.autowireConstructor(ConstructorResolver.java:229)
        at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.autowireConstructor(AbstractAutowireCapableBeanFactory.java:1372)
        at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.createBeanInstance(AbstractAutowireCapableBeanFactory.java:1222)
        at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.doCreateBean(AbstractAutowireCapableBeanFactory.java:582)
        at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.createBean(AbstractAutowireCapableBeanFactory.java:542)
        at org.springframework.beans.factory.support.AbstractBeanFactory.lambda$doGetBean$0(AbstractBeanFactory.java:335)
        at org.springframework.beans.factory.support.DefaultSingletonBeanRegistry.getSingleton(DefaultSingletonBeanRegistry.java:234)
        at org.springframework.beans.factory.support.AbstractBeanFactory.doGetBean(AbstractBeanFactory.java:333)
        at org.springframework.beans.factory.support.AbstractBeanFactory.getBean(AbstractBeanFactory.java:208)
        at org.springframework.beans.factory.support.ConstructorResolver.instantiateUsingFactoryMethod(ConstructorResolver.java:410)
        at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.instantiateUsingFactoryMethod(AbstractAutowireCapableBeanFactory.java:1352)
        at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.createBeanInstance(AbstractAutowireCapableBeanFactory.java:1195)
        at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.getSingletonFactoryBeanForTypeCheck(AbstractAutowireCapableBeanFactory.java:1027)
        at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.getTypeForFactoryBean(AbstractAutowireCapableBeanFactory.java:907)
        at org.springframework.beans.factory.support.AbstractBeanFactory.isTypeMatch(AbstractBeanFactory.java:637)
        at org.springframework.beans.factory.support.DefaultListableBeanFactory.doGetBeanNamesForType(DefaultListableBeanFactory.java:583)
        at org.springframework.beans.factory.support.DefaultListableBeanFactory.getBeanNamesForType(DefaultListableBeanFactory.java:550)
        at org.springframework.beans.factory.BeanFactoryUtils.beanNamesForTypeIncludingAncestors(BeanFactoryUtils.java:265)
        at org.springframework.beans.factory.support.DefaultListableBeanFactory.findAutowireCandidates(DefaultListableBeanFactory.java:1557)
        at org.springframework.beans.factory.support.DefaultListableBeanFactory.doResolveDependency(DefaultListableBeanFactory.java:1354)
        at org.springframework.beans.factory.support.DefaultListableBeanFactory.resolveDependency(DefaultListableBeanFactory.java:1311)
        at org.springframework.beans.factory.annotation.AutowiredAnnotationBeanPostProcessor$AutowiredMethodElement.resolveMethodArguments(AutowiredAnnotationBeanPostProcessor.java:760)
        ... 87 common frames omitted
Caused by: org.springframework.beans.factory.BeanCreationException: Error creating bean with name 'authorizer': FactoryBean threw exception on object creation; nested exception is org.apache.nifi.authorization.exception.AuthorizerCreationException: org.apache.nifi.authorization.exception.AuthorizerCreationException: Unable to locate initial admin joseAce@azure.com to seed policies
        at org.springframework.beans.factory.support.FactoryBeanRegistrySupport.doGetObjectFromFactoryBean(FactoryBeanRegistrySupport.java:176)
        at org.springframework.beans.factory.support.FactoryBeanRegistrySupport.getObjectFromFactoryBean(FactoryBeanRegistrySupport.java:101)
        at org.springframework.beans.factory.support.AbstractBeanFactory.getObjectForBeanInstance(AbstractBeanFactory.java:1898)
        at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.getObjectForBeanInstance(AbstractAutowireCapableBeanFactory.java:1284)
        at org.springframework.beans.factory.support.AbstractBeanFactory.doGetBean(AbstractBeanFactory.java:345)
        at org.springframework.beans.factory.support.AbstractBeanFactory.getBean(AbstractBeanFactory.java:208)
        at org.springframework.beans.factory.config.DependencyDescriptor.resolveCandidate(DependencyDescriptor.java:276)
        at org.springframework.beans.factory.support.DefaultListableBeanFactory.doResolveDependency(DefaultListableBeanFactory.java:1391)
        at org.springframework.beans.factory.support.DefaultListableBeanFactory.resolveDependency(DefaultListableBeanFactory.java:1311)
        at org.springframework.beans.factory.support.ConstructorResolver.resolveAutowiredArgument(ConstructorResolver.java:887)
        at org.springframework.beans.factory.support.ConstructorResolver.createArgumentArray(ConstructorResolver.java:791)
        ... 109 common frames omitted
Caused by: org.apache.nifi.authorization.exception.AuthorizerCreationException: org.apache.nifi.authorization.exception.AuthorizerCreationException: Unable to locate initial admin joseAce@azure.com to seed policies
        at org.apache.nifi.authorization.FileAccessPolicyProvider.onConfigured(FileAccessPolicyProvider.java:267)
        at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
        at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
        at java.lang.reflect.Method.invoke(Method.java:498)
        at org.apache.nifi.authorization.AccessPolicyProviderInvocationHandler.invoke(AccessPolicyProviderInvocationHandler.java:54)
        at com.sun.proxy.$Proxy81.onConfigured(Unknown Source)
        at org.apache.nifi.authorization.AuthorizerFactoryBean.loadProviderProperties(AuthorizerFactoryBean.java:211)
        at org.apache.nifi.authorization.AuthorizerFactoryBean.getObject(AuthorizerFactoryBean.java:168)
        at org.apache.nifi.authorization.AuthorizerFactoryBean.getObject(AuthorizerFactoryBean.java:72)
        at org.springframework.beans.factory.support.FactoryBeanRegistrySupport.doGetObjectFromFactoryBean(FactoryBeanRegistrySupport.java:169)
        ... 119 common frames omitted
Caused by: org.apache.nifi.authorization.exception.AuthorizerCreationException: Unable to locate initial admin joseAce@azure.com to seed policies
        at org.apache.nifi.authorization.FileAccessPolicyProvider.populateInitialAdmin(FileAccessPolicyProvider.java:678)
        at org.apache.nifi.authorization.FileAccessPolicyProvider.load(FileAccessPolicyProvider.java:607)
        at org.apache.nifi.authorization.FileAccessPolicyProvider.onConfigured(FileAccessPolicyProvider.java:258)
        ... 129 common frames omitted
INFO [Thread-1] org.apache.nifi.NiFi Application Server shutdown started&lt;/LI-CODE&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Jose&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 03:32:05 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Unable-to-locate-initial-admin-error-when-using-OIDC-in-Nifi/m-p/372167#M241171</guid>
      <dc:creator>EddyChan</dc:creator>
      <dc:date>2023-06-06T03:32:05Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to locate initial admin error when using OIDC in Nifi Cluster mode</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Unable-to-locate-initial-admin-error-when-using-OIDC-in-Nifi/m-p/372279#M241202</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/105353"&gt;@EddyChan&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The exception:&lt;/P&gt;&lt;PRE&gt;Caused by: org.apache.nifi.authorization.exception.AuthorizerCreationException: Unable to locate initial admin joseAce@azure.com to seed policies&lt;/PRE&gt;&lt;P&gt;means that on startup the file-access-policy-provider attempted to generate the authorizations.xml file to seed it with initial admin policies for user identity string "joseAce@azure.com"; however, neither of the file-user-group-provider or the aad-user-group-provider returned that user identity string.&lt;BR /&gt;&lt;BR /&gt;So you'll need to take a look at the generated authorizers.xml files when you create your two replicas.&amp;nbsp; Something is getting messed up in the configuration file.&amp;nbsp; &amp;nbsp;The order in which the providers are added to the authorizers.xml is very important (User-group-providers must come first, then composite-providers, then file-access-policy-provider, and finally the authorizer).&lt;BR /&gt;&lt;BR /&gt;Perhaps in your file-access-policy-provider, you also have the following property being added which is blank:&lt;/P&gt;&lt;PRE&gt;&amp;lt;property name="&lt;SPAN&gt;Node Group&lt;/SPAN&gt;"&amp;gt;nifi&amp;lt;/property&amp;nbsp;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="batang,apple gothic"&gt;If you found that the provided solution(s) assisted you with your query, please take a moment to login and click&lt;/FONT&gt;&amp;nbsp;&lt;FONT face="arial black,avant garde" color="#FF0000"&gt;Accept as Solution&amp;nbsp;&lt;/FONT&gt;&lt;FONT face="batang,apple gothic" color="#000000"&gt;below each response that helped.&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="batang,apple gothic" color="#000000"&gt;Matt&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2023 19:49:43 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Unable-to-locate-initial-admin-error-when-using-OIDC-in-Nifi/m-p/372279#M241202</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2023-06-07T19:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to locate initial admin error when using OIDC in Nifi Cluster mode</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Unable-to-locate-initial-admin-error-when-using-OIDC-in-Nifi/m-p/372499#M241247</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/105353"&gt;@EddyChan&lt;/a&gt;,&amp;nbsp;Has any of the replies helped resolve your issue? If so, please mark the appropriate reply as the solution, as it will make it easier for others to find the answer in the future.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jun 2023 05:32:16 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Unable-to-locate-initial-admin-error-when-using-OIDC-in-Nifi/m-p/372499#M241247</guid>
      <dc:creator>VidyaSargur</dc:creator>
      <dc:date>2023-06-12T05:32:16Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to locate initial admin error when using OIDC in Nifi Cluster mode</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Unable-to-locate-initial-admin-error-when-using-OIDC-in-Nifi/m-p/372534#M241260</link>
      <description>&lt;P&gt;Tried follow accordingly, not working at the moment hit the same issue. Will look into other configuration.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 04:03:52 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Unable-to-locate-initial-admin-error-when-using-OIDC-in-Nifi/m-p/372534#M241260</guid>
      <dc:creator>EddyChan</dc:creator>
      <dc:date>2023-06-13T04:03:52Z</dc:date>
    </item>
  </channel>
</rss>

