<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Untrusted proxy error Authentication Failed o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET https://172.24.0.3:8443/nifi-api/flow/current-user 2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3 in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399523#M250505</link>
    <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/122979"&gt;@spiker&lt;/a&gt;, Welcome&amp;nbsp;to our community! To help you get the best possible answer, I have tagged our NiFi experts&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/95503"&gt;@steven-matison&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/80381"&gt;@SAMSAL&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/20288"&gt;@Shelton&lt;/a&gt;&amp;nbsp;&amp;nbsp;who may be able to assist you further.&lt;BR /&gt;&lt;BR /&gt;Please feel free to provide any additional information or details about your query, and we hope that you will find a satisfactory solution to your question.&lt;/P&gt;</description>
    <pubDate>Fri, 03 Jan 2025 05:38:43 GMT</pubDate>
    <dc:creator>VidyaSargur</dc:creator>
    <dc:date>2025-01-03T05:38:43Z</dc:date>
    <item>
      <title>Untrusted proxy error Authentication Failed o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET https://172.24.0.3:8443/nifi-api/flow/current-user 2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3:844</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399519#M250504</link>
      <description>&lt;P&gt;I'm currently facing an issue with implementing OpenID Connect (OIDC) authentication in Apache NiFi. And I am putting my NIFI in the kubernets. so, I am with the NIFI containers.&lt;BR /&gt;Error Overview:&lt;BR /&gt;I receive the following error in the NiFi logs:&lt;BR /&gt;2025-01-02 10:29:05,167 INFO [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Started 172.24.0.3 [&amp;lt;oncloudtemuser@sossourabh7687gmail.onmicrosoft.com&amp;gt;&amp;lt;CN=172.24.0.3, OU=NIFI, O=NIFI, L=HYDRABAD, ST=TELANGANA, C=IN&amp;gt;] GET&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://172.24.0.3:8443/nifi-api/flow/current-user" target="_blank" rel="nofollow noopener noreferrer"&gt;https://172.24.0.3:8443/nifi-api/flow/current-user&lt;/A&gt;&lt;BR /&gt;2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://172.24.0.3:8443/nifi-api/flow/current-user" target="_blank" rel="nofollow noopener noreferrer"&gt;https://172.24.0.3:8443/nifi-api/flow/current-user&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;[Untrusted proxy CN=172.24.0.3, OU=NIFI, O=NIFI, L=HYDRABAD, ST=TELANGANA, C=IN]&lt;BR /&gt;2025-01-02 10:29:05,207 ERROR [NiFi Web Server-190] o.a.nifi.web.api.config.ThrowableMapper An unexpected error has occurred: java.io.UncheckedIOException: Read Current User Entity failed. Returning Internal Server Error response.&lt;BR /&gt;Error Details:&lt;BR /&gt;The logs indicate a JsonParseException when trying to read the current user entity, and the Untrusted proxy warning appears to be a potential cause:&lt;BR /&gt;Caused by: com.fasterxml.jackson.core.JsonParseException: Unrecognized token 'Authentication': was expecting (JSON String, Number, Array, Object or token 'null', 'true' or 'false')&lt;BR /&gt;at [Source: REDACTED (`StreamReadFeature.INCLUDE_SOURCE_IN_LOCATION` disabled); line: 1, column: 16]&lt;BR /&gt;This seems to be a token parsing issue where an unexpected token (Authentication) is encountered, possibly due to a misconfigured authentication header or an issue with the proxy setup.&lt;BR /&gt;&amp;nbsp;nifi.properties file&lt;BR /&gt;# Core Properties #&lt;BR /&gt;nifi.flow.configuration.file=./conf/flow.json.gz&lt;BR /&gt;nifi.flow.configuration.archive.enabled=true&lt;BR /&gt;nifi.flow.configuration.archive.dir=./conf/archive/&lt;BR /&gt;nifi.flow.configuration.archive.max.time=10 days&lt;BR /&gt;nifi.flow.configuration.archive.max.storage=500 MB&lt;BR /&gt;nifi.flow.configuration.archive.max.count=&lt;BR /&gt;nifi.flowcontroller.autoResumeState=true&lt;BR /&gt;nifi.flowcontroller.graceful.shutdown.period=20 secs&lt;BR /&gt;nifi.flowservice.writedelay.interval=500 ms&lt;BR /&gt;nifi.administrative.yield.duration=30 sec&lt;BR /&gt;# If a component has no work to do (is "bored"), how long should we wait before checking again for work?&lt;BR /&gt;nifi.bored.yield.duration=10 millis&lt;BR /&gt;nifi.queue.backpressure.count=10000&lt;BR /&gt;nifi.queue.backpressure.size=1 GB&lt;/P&gt;&lt;P&gt;nifi.authorizer.configuration.file=./conf/authorizers.xml&lt;BR /&gt;nifi.login.identity.provider.configuration.file=./conf/login-identity-providers.xml&lt;BR /&gt;nifi.ui.banner.text=nifi-dev&lt;BR /&gt;nifi.nar.library.directory=./lib&lt;BR /&gt;nifi.nar.library.autoload.directory=./extensions&lt;BR /&gt;nifi.nar.working.directory=./work/nar/&lt;BR /&gt;nifi.nar.unpack.uber.jar=false&lt;BR /&gt;nifi.upload.working.directory=./work/uploads&lt;/P&gt;&lt;P&gt;#####################&lt;BR /&gt;# Python Extensions #&lt;BR /&gt;#####################&lt;BR /&gt;# Uncomment in order to enable Python Extensions.&lt;BR /&gt;#nifi.python.command=python3&lt;BR /&gt;nifi.python.framework.source.directory=./python/framework&lt;BR /&gt;nifi.python.extensions.source.directory.default=./python/extensions&lt;BR /&gt;nifi.python.working.directory=./work/python&lt;BR /&gt;nifi.python.max.processes=100&lt;BR /&gt;nifi.python.max.processes.per.extension.type=10&lt;/P&gt;&lt;P&gt;####################&lt;BR /&gt;# State Management #&lt;BR /&gt;####################&lt;BR /&gt;nifi.state.management.configuration.file=./conf/state-management.xml&lt;BR /&gt;# The ID of the local state provider&lt;BR /&gt;nifi.state.management.provider.local=local-provider&lt;BR /&gt;# The ID of the cluster-wide state provider. This will be ignored if NiFi is not clustered but must be populated if running in a cluster.&lt;BR /&gt;nifi.state.management.provider.cluster=zk-provider&lt;BR /&gt;# The Previous Cluster State Provider from which the framework will load Cluster State when the current Cluster Provider has no entries&lt;BR /&gt;nifi.state.management.provider.cluster.previous=&lt;BR /&gt;# Specifies whether or not this instance of NiFi should run an embedded ZooKeeper server&lt;BR /&gt;nifi.state.management.embedded.zookeeper.start=false&lt;BR /&gt;# Properties file that provides the ZooKeeper properties to use if &amp;lt;nifi.state.management.embedded.zookeeper.start&amp;gt; is set to true&lt;BR /&gt;nifi.state.management.embedded.zookeeper.properties=./conf/zookeeper.properties&lt;/P&gt;&lt;P&gt;# Database Settings&lt;BR /&gt;nifi.database.directory=./database_repository&lt;/P&gt;&lt;P&gt;# FlowFile Repository&lt;BR /&gt;nifi.flowfile.repository.implementation=org.apache.nifi.controller.repository.WriteAheadFlowFileRepository&lt;BR /&gt;nifi.flowfile.repository.wal.implementation=org.apache.nifi.wali.SequentialAccessWriteAheadLog&lt;BR /&gt;nifi.flowfile.repository.directory=./flowfile_repository&lt;BR /&gt;nifi.flowfile.repository.checkpoint.interval=20 secs&lt;BR /&gt;nifi.flowfile.repository.always.sync=false&lt;BR /&gt;nifi.flowfile.repository.retain.orphaned.flowfiles=false&lt;/P&gt;&lt;P&gt;nifi.swap.manager.implementation=org.apache.nifi.controller.FileSystemSwapManager&lt;BR /&gt;nifi.queue.swap.threshold=20000&lt;/P&gt;&lt;P&gt;# Content Repository&lt;BR /&gt;nifi.content.repository.implementation=org.apache.nifi.controller.repository.FileSystemRepository&lt;BR /&gt;nifi.content.claim.max.appendable.size=50 KB&lt;BR /&gt;nifi.content.repository.directory.default=./content_repository&lt;BR /&gt;nifi.content.repository.archive.max.retention.period=1 hours&lt;BR /&gt;nifi.content.repository.archive.max.usage.percentage=70%&lt;BR /&gt;nifi.content.repository.archive.enabled=true&lt;BR /&gt;nifi.content.repository.always.sync=false&lt;/P&gt;&lt;P&gt;# Provenance Repository Properties&lt;BR /&gt;nifi.provenance.repository.implementation=org.apache.nifi.provenance.VolatileProvenanceRepository&lt;/P&gt;&lt;P&gt;# Persistent Provenance Repository Properties&lt;BR /&gt;nifi.provenance.repository.directory.default=./provenance_repository&lt;BR /&gt;nifi.provenance.repository.max.storage.time=30 days&lt;BR /&gt;nifi.provenance.repository.max.storage.size=100 MB&lt;BR /&gt;nifi.provenance.repository.rollover.time=30 secs&lt;BR /&gt;nifi.provenance.repository.rollover.size=100 MB&lt;BR /&gt;nifi.provenance.repository.query.threads=2&lt;BR /&gt;nifi.provenance.repository.index.threads=2&lt;BR /&gt;nifi.provenance.repository.compress.on.rollover=true&lt;BR /&gt;nifi.provenance.repository.always.sync=false&lt;BR /&gt;# Comma-separated list of fields. Fields that are not indexed will not be searchable. Valid fields are:&lt;BR /&gt;# EventType, FlowFileUUID, Filename, TransitURI, ProcessorID, AlternateIdentifierURI, Relationship, Details&lt;BR /&gt;nifi.provenance.repository.indexed.fields=EventType, FlowFileUUID, Filename, ProcessorID, Relationship&lt;BR /&gt;# FlowFile Attributes that should be indexed and made searchable. &amp;nbsp;Some examples to consider are filename, uuid, mime.type&lt;BR /&gt;nifi.provenance.repository.indexed.attributes=&lt;BR /&gt;# Large values for the shard size will result in more Java heap usage when searching the Provenance Repository&lt;BR /&gt;# but should provide better performance&lt;BR /&gt;nifi.provenance.repository.index.shard.size=500 MB&lt;BR /&gt;# Indicates the maximum length that a FlowFile attribute can be when retrieving a Provenance Event from&lt;BR /&gt;# the repository. If the length of any attribute exceeds this value, it will be truncated when the event is retrieved.&lt;BR /&gt;nifi.provenance.repository.max.attribute.length=65536&lt;BR /&gt;nifi.provenance.repository.concurrent.merge.threads=2&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;# Volatile Provenance Respository Properties&lt;BR /&gt;nifi.provenance.repository.buffer.size=100000&lt;/P&gt;&lt;P&gt;# Component and Node Status History Repository&lt;BR /&gt;nifi.components.status.repository.implementation=org.apache.nifi.controller.status.history.VolatileComponentStatusRepository&lt;/P&gt;&lt;P&gt;# Volatile Status History Repository Properties&lt;BR /&gt;nifi.components.status.repository.buffer.size=1440&lt;BR /&gt;nifi.components.status.snapshot.frequency=1 min&lt;/P&gt;&lt;P&gt;# QuestDB Status History Repository Properties&lt;BR /&gt;nifi.status.repository.questdb.persist.node.days=14&lt;BR /&gt;nifi.status.repository.questdb.persist.component.days=3&lt;BR /&gt;nifi.status.repository.questdb.persist.location=./status_repository&lt;/P&gt;&lt;P&gt;# NAR Persistence Properties&lt;BR /&gt;nifi.nar.persistence.provider.implementation=org.apache.nifi.nar.StandardNarPersistenceProvider&lt;BR /&gt;nifi.nar.persistence.provider.properties.directory=./nar_repository&lt;/P&gt;&lt;P&gt;# Asset Management&lt;BR /&gt;nifi.asset.manager.implementation=org.apache.nifi.asset.StandardAssetManager&lt;BR /&gt;nifi.asset.manager.properties.directory=./assets&lt;/P&gt;&lt;P&gt;# Site to Site properties&lt;BR /&gt;nifi.remote.input.host=172.24.0.3&lt;BR /&gt;nifi.remote.input.secure=true&lt;BR /&gt;nifi.remote.input.socket.port=10000&lt;BR /&gt;nifi.remote.input.http.enabled=false&lt;BR /&gt;nifi.remote.input.http.transaction.ttl=30 sec&lt;BR /&gt;nifi.remote.contents.cache.expiration=30 secs&lt;/P&gt;&lt;P&gt;# web properties #&lt;BR /&gt;#############################################&lt;/P&gt;&lt;P&gt;# For security, NiFi will present the UI on 127.0.0.1 and only be accessible through this loopback interface.&lt;BR /&gt;# Be aware that changing these properties may affect how your instance can be accessed without any restriction.&lt;BR /&gt;# We recommend configuring HTTPS instead. The administrators guide provides instructions on how to do this.&lt;/P&gt;&lt;P&gt;nifi.web.http.host=&lt;BR /&gt;nifi.web.http.port=&lt;BR /&gt;nifi.web.http.network.interface.default=&lt;/P&gt;&lt;P&gt;#############################################&lt;/P&gt;&lt;P&gt;nifi.web.https.host=172.24.0.3&lt;BR /&gt;nifi.web.https.port=8443&lt;BR /&gt;nifi.web.https.network.interface.default=&lt;BR /&gt;nifi.web.https.application.protocols=h2 http/1.1&lt;BR /&gt;nifi.web.jetty.working.directory=./work/jetty&lt;BR /&gt;nifi.web.jetty.threads=200&lt;BR /&gt;nifi.web.max.header.size=16 KB&lt;BR /&gt;nifi.web.proxy.context.path=&lt;BR /&gt;nifi.web.proxy.host=&lt;BR /&gt;nifi.web.max.content.size=&lt;BR /&gt;nifi.web.max.requests.per.second=30000&lt;BR /&gt;nifi.web.max.access.token.requests.per.second=25&lt;BR /&gt;nifi.web.request.timeout=60 secs&lt;BR /&gt;nifi.web.request.ip.whitelist=&lt;BR /&gt;nifi.web.should.send.server.version=true&lt;BR /&gt;nifi.web.request.log.format=%{client}a - %u %t "%r" %s %O "%{Referer}i" "%{User-Agent}i"&lt;/P&gt;&lt;P&gt;# Filter JMX MBeans available through the System Diagnostics REST API&lt;BR /&gt;nifi.web.jmx.metrics.allowed.filter.pattern=&lt;/P&gt;&lt;P&gt;# Include or Exclude TLS Cipher Suites for HTTPS&lt;BR /&gt;nifi.web.https.ciphersuites.include=&lt;BR /&gt;nifi.web.https.ciphersuites.exclude=&lt;/P&gt;&lt;P&gt;# security properties #&lt;BR /&gt;nifi.sensitive.props.key=/02b3ljnw7Lh/Yq5NMrChoib6xdgv1Y1&lt;BR /&gt;nifi.sensitive.props.algorithm=NIFI_PBKDF2_AES_GCM_256&lt;/P&gt;&lt;P&gt;nifi.security.autoreload.enabled=false&lt;BR /&gt;nifi.security.autoreload.interval=10 secs&lt;BR /&gt;nifi.security.keystore=/opt/nifi-2.1.0/certs/nifi_keystore.p12&lt;BR /&gt;nifi.security.keystore.certificate=/opt/nifi-2.1.0/certs/nifi.crt&lt;BR /&gt;nifi.security.keystore.privateKey=/opt/nifi-2.1.0/certs/nifi.key&lt;BR /&gt;nifi.security.keystoreType=PKCS12&lt;BR /&gt;nifi.security.keystorePasswd=065ad6b41cf772b6a47f96cff82698f6&lt;BR /&gt;nifi.security.keyPasswd=065ad6b41cf772b6a47f96cff82698f6&lt;BR /&gt;nifi.security.truststore=/opt/nifi-2.1.0/certs/nifi_truststore.p12&lt;BR /&gt;nifi.security.truststore.certificate=/opt/nifi-2.1.0/certs/rootCA.pem&lt;BR /&gt;nifi.security.truststoreType=PKCS12&lt;BR /&gt;nifi.security.truststorePasswd=61cac7c7fff3ab70e3fe4365192cd966&lt;/P&gt;&lt;P&gt;nifi.security.user.authorizer=managed-authorizer&lt;BR /&gt;nifi.security.allow.anonymous.authentication=false&lt;BR /&gt;nifi.security.user.login.identity.provider=&lt;BR /&gt;nifi.security.user.jws.key.rotation.period=PT1H&lt;BR /&gt;nifi.security.ocsp.responder.url=&lt;BR /&gt;nifi.security.ocsp.responder.certificate=&lt;/P&gt;&lt;P&gt;# OpenId Connect SSO Properties #&lt;BR /&gt;nifi.security.user.oidc.discovery.url=&lt;A href="https://login.microsoftonline.com/XXXXXXXXXXXXXXXXXXXXXXX/v2.0/.well-known/openid-configuration" target="_blank" rel="nofollow noopener noreferrer"&gt;https://login.microsoftonline.com/XXXXXXXXXXXXXXXXXXXXXXX/v2.0/.well-known/openid-configuration&lt;/A&gt;&lt;BR /&gt;nifi.security.user.oidc.connect.timeout=10 secs&lt;BR /&gt;nifi.security.user.oidc.read.timeout=10 secs&lt;BR /&gt;nifi.security.user.oidc.client.id=XXXXXXXXXXXXXXXX&lt;BR /&gt;nifi.security.user.oidc.client.secret=XXXXXXXXXXXXXXXXXXXXX&lt;BR /&gt;nifi.security.user.oidc.preferred.jwsalgorithm=&lt;BR /&gt;nifi.security.user.oidc.additional.scopes=profile&lt;BR /&gt;nifi.security.user.oidc.claim.identifying.user=email&lt;BR /&gt;nifi.security.user.oidc.fallback.claims.identifying.user=upn&lt;BR /&gt;nifi.security.user.oidc.claim.groups=groups&lt;BR /&gt;nifi.security.user.oidc.truststore.strategy=JDK&lt;BR /&gt;nifi.security.user.oidc.token.refresh.window=60 secs&lt;/P&gt;&lt;P&gt;# SAML Properties #&lt;BR /&gt;nifi.security.user.saml.idp.metadata.url=&lt;BR /&gt;nifi.security.user.saml.sp.entity.id=&lt;BR /&gt;nifi.security.user.saml.identity.attribute.name=&lt;BR /&gt;nifi.security.user.saml.group.attribute.name=&lt;BR /&gt;nifi.security.user.saml.request.signing.enabled=false&lt;BR /&gt;nifi.security.user.saml.want.assertions.signed=true&lt;BR /&gt;nifi.security.user.saml.signature.algorithm=&lt;A href="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256" target="_blank" rel="nofollow noopener noreferrer"&gt;http://www.w3.org/2001/04/xmldsig-more#rsa-sha256&lt;/A&gt;&lt;BR /&gt;nifi.security.user.saml.authentication.expiration=12 hours&lt;BR /&gt;nifi.security.user.saml.single.logout.enabled=false&lt;BR /&gt;nifi.security.user.saml.http.client.truststore.strategy=JDK&lt;BR /&gt;nifi.security.user.saml.http.client.connect.timeout=30 secs&lt;BR /&gt;nifi.security.user.saml.http.client.read.timeout=30 secs&lt;/P&gt;&lt;P&gt;# Identity Mapping Properties #&lt;BR /&gt;# These properties allow normalizing user identities such that identities coming from different identity providers&lt;BR /&gt;# (certificates, LDAP, Kerberos) can be treated the same internally in NiFi. The following example demonstrates normalizing&lt;BR /&gt;# DNs from certificates and principals from Kerberos into a common identity string:&lt;BR /&gt;#&lt;BR /&gt;# nifi.security.identity.mapping.pattern.dn=^CN=(.*?), OU=(.*?), O=(.*?), L=(.*?), ST=(.*?), C=(.*?)$&lt;BR /&gt;# nifi.security.identity.mapping.value.dn=$1@$2&lt;BR /&gt;# nifi.security.identity.mapping.transform.dn=NONE&lt;BR /&gt;# nifi.security.identity.mapping.pattern.kerb=^(.*?)/instance@(.*?)$&lt;BR /&gt;# nifi.security.identity.mapping.value.kerb=$1@$2&lt;BR /&gt;# nifi.security.identity.mapping.transform.kerb=UPPER&lt;/P&gt;&lt;P&gt;# Group Mapping Properties #&lt;BR /&gt;# These properties allow normalizing group names coming from external sources like LDAP. The following example&lt;BR /&gt;# lowercases any group name.&lt;BR /&gt;#&lt;BR /&gt;# nifi.security.group.mapping.pattern.anygroup=^(.*)$&lt;BR /&gt;# nifi.security.group.mapping.value.anygroup=$1&lt;BR /&gt;# nifi.security.group.mapping.transform.anygroup=LOWER&lt;/P&gt;&lt;P&gt;# cluster common properties (all nodes must have same values) #&lt;BR /&gt;nifi.cluster.protocol.heartbeat.interval=5 sec&lt;BR /&gt;nifi.cluster.protocol.heartbeat.missable.max=8&lt;BR /&gt;nifi.cluster.protocol.is.secure=true&lt;/P&gt;&lt;P&gt;# cluster node properties (only configure for cluster nodes) #&lt;BR /&gt;nifi.cluster.is.node=true&lt;BR /&gt;nifi.cluster.leader.election.implementation=CuratorLeaderElectionManager&lt;BR /&gt;nifi.cluster.node.address=172.24.0.3&lt;BR /&gt;nifi.cluster.node.protocol.port=8082&lt;BR /&gt;nifi.cluster.node.protocol.max.threads=50&lt;BR /&gt;nifi.cluster.node.event.history.size=25&lt;BR /&gt;nifi.cluster.node.connection.timeout=60 secs&lt;BR /&gt;nifi.cluster.node.read.timeout=60 secs&lt;BR /&gt;nifi.cluster.node.max.concurrent.requests=100&lt;BR /&gt;nifi.cluster.firewall.file=&lt;BR /&gt;nifi.cluster.flow.election.max.wait.time=1 mins&lt;BR /&gt;nifi.cluster.flow.election.max.candidates=1&lt;/P&gt;&lt;P&gt;# cluster load balancing properties #&lt;BR /&gt;nifi.cluster.load.balance.host=172.24.0.3&lt;BR /&gt;nifi.cluster.load.balance.port=6342&lt;BR /&gt;nifi.cluster.load.balance.connections.per.node=1&lt;BR /&gt;nifi.cluster.load.balance.max.thread.count=8&lt;BR /&gt;nifi.cluster.load.balance.comms.timeout=30 sec&lt;/P&gt;&lt;P&gt;# zookeeper properties, used for cluster management #&lt;BR /&gt;nifi.zookeeper.connect.string=zookeeper:2181&lt;BR /&gt;nifi.zookeeper.connect.timeout=30 secs&lt;BR /&gt;nifi.zookeeper.session.timeout=30 secs&lt;BR /&gt;nifi.zookeeper.root.node=/nifi&lt;BR /&gt;nifi.zookeeper.client.secure=false&lt;BR /&gt;nifi.zookeeper.security.keystore=&lt;BR /&gt;nifi.zookeeper.security.keystoreType=&lt;BR /&gt;nifi.zookeeper.security.keystorePasswd=&lt;BR /&gt;nifi.zookeeper.security.truststore=&lt;BR /&gt;nifi.zookeeper.security.truststoreType=&lt;BR /&gt;nifi.zookeeper.security.truststorePasswd=&lt;BR /&gt;nifi.zookeeper.jute.maxbuffer=&lt;/P&gt;&lt;P&gt;# Zookeeper properties for the authentication scheme used when creating acls on znodes used for cluster management&lt;BR /&gt;# Values supported for nifi.zookeeper.auth.type are "default", which will apply world/anyone rights on znodes&lt;BR /&gt;# and "sasl" which will give rights to the sasl/kerberos identity used to authenticate the nifi node&lt;BR /&gt;# The identity is determined using the value in nifi.kerberos.service.principal and the removeHostFromPrincipal&lt;BR /&gt;# and removeRealmFromPrincipal values (which should align with the kerberos.removeHostFromPrincipal and kerberos.removeRealmFromPrincipal&lt;BR /&gt;# values configured on the zookeeper server).&lt;BR /&gt;nifi.zookeeper.auth.type=&lt;BR /&gt;nifi.zookeeper.kerberos.removeHostFromPrincipal=&lt;BR /&gt;nifi.zookeeper.kerberos.removeRealmFromPrincipal=&lt;/P&gt;&lt;P&gt;# kerberos #&lt;BR /&gt;nifi.kerberos.krb5.file=/etc/krb5.conf&lt;/P&gt;&lt;P&gt;# kerberos service principal #&lt;BR /&gt;nifi.kerberos.service.principal=&lt;BR /&gt;nifi.kerberos.service.keytab.location=&lt;/P&gt;&lt;P&gt;# analytics properties #&lt;BR /&gt;nifi.analytics.predict.enabled=false&lt;BR /&gt;nifi.analytics.predict.interval=3 mins&lt;BR /&gt;nifi.analytics.query.interval=5 mins&lt;BR /&gt;nifi.analytics.connection.model.implementation=org.apache.nifi.controller.status.analytics.models.OrdinaryLeastSquares&lt;BR /&gt;nifi.analytics.connection.model.score.name=rSquared&lt;BR /&gt;nifi.analytics.connection.model.score.threshold=.90&lt;/P&gt;&lt;P&gt;# kubernetes #&lt;BR /&gt;nifi.cluster.leader.election.kubernetes.lease.prefix=&lt;/P&gt;&lt;P&gt;# flow analysis properties&lt;BR /&gt;nifi.registry.check.for.rule.violations.before.commit=&lt;/P&gt;&lt;P&gt;# runtime monitoring properties&lt;BR /&gt;nifi.monitor.long.running.task.schedule=&lt;BR /&gt;nifi.monitor.long.running.task.threshold=&lt;/P&gt;&lt;P&gt;# Enable automatic diagnostic at shutdown.&lt;BR /&gt;nifi.diagnostics.on.shutdown.enabled=false&lt;/P&gt;&lt;P&gt;# Include verbose diagnostic information.&lt;BR /&gt;nifi.diagnostics.on.shutdown.verbose=false&lt;/P&gt;&lt;P&gt;# The location of the diagnostics folder.&lt;BR /&gt;nifi.diagnostics.on.shutdown.directory=./diagnostics&lt;/P&gt;&lt;P&gt;# The maximum number of files permitted in the directory. If the limit is exceeded, the oldest files are deleted.&lt;BR /&gt;nifi.diagnostics.on.shutdown.max.filecount=10&lt;/P&gt;&lt;P&gt;# The diagnostics folder's maximum permitted size in bytes. If the limit is exceeded, the oldest files are deleted.&lt;BR /&gt;nifi.diagnostics.on.shutdown.max.directory.size=10 MB&lt;/P&gt;&lt;P&gt;# Performance tracking properties&lt;BR /&gt;## Specifies what percentage of the time we should track the amount of time processors are using CPU, reading from/writing to content repo, etc.&lt;BR /&gt;## This can be useful to understand which components are the most expensive and to understand where system bottlenecks may be occurring.&lt;BR /&gt;## The value must be in the range of 0 (inclusive) to 100 (inclusive). A larger value will produce more accurate results, while a smaller value may be&lt;BR /&gt;## less expensive to compute.&lt;BR /&gt;## Results can be obtained by running "nifi.sh diagnostics &amp;lt;filename&amp;gt;" and then inspecting the produced file.&lt;BR /&gt;nifi.performance.tracking.percentage=0&lt;/P&gt;&lt;P&gt;# NAR Provider Properties #&lt;BR /&gt;# These properties allow configuring one or more NAR providers. A NAR provider retrieves NARs from an external source&lt;BR /&gt;# and copies them to the directory specified by nifi.nar.library.autoload.directory.&lt;BR /&gt;#&lt;BR /&gt;# Each NAR provider property follows the format:&lt;BR /&gt;# &amp;nbsp;nifi.nar.library.provider.&amp;lt;identifier&amp;gt;.&amp;lt;property-name&amp;gt;&lt;BR /&gt;#&lt;BR /&gt;# Each NAR provider must have at least one property named "implementation".&lt;BR /&gt;#&lt;BR /&gt;# Example HDFS NAR Provider:&lt;BR /&gt;# &amp;nbsp; nifi.nar.library.provider.hdfs.implementation=org.apache.nifi.flow.resource.hadoop.HDFSExternalResourceProvider&lt;BR /&gt;# &amp;nbsp; nifi.nar.library.provider.hdfs.resources=/path/to/core-site.xml,/path/to/hdfs-site.xml&lt;BR /&gt;# &amp;nbsp; nifi.nar.library.provider.hdfs.storage.location=hdfs://hdfs-location&lt;BR /&gt;# &amp;nbsp; nifi.nar.library.provider.hdfs.source.directory=/nars&lt;BR /&gt;# &amp;nbsp; nifi.nar.library.provider.hdfs.kerberos.principal=nifi@NIFI.COM&lt;BR /&gt;# &amp;nbsp; nifi.nar.library.provider.hdfs.kerberos.keytab=/path/to/nifi.keytab&lt;BR /&gt;# &amp;nbsp; nifi.nar.library.provider.hdfs.kerberos.password=&lt;BR /&gt;#&lt;BR /&gt;# Example NiFi Registry NAR Provider:&lt;BR /&gt;# &amp;nbsp; nifi.nar.library.provider.nifi-registry.implementation=org.apache.nifi.registry.extension.NiFiRegistryExternalResourceProvider&lt;BR /&gt;# &amp;nbsp; nifi.nar.library.provider.nifi-registry.url=&lt;A href="http://localhost:18080/" target="_blank" rel="nofollow noopener noreferrer"&gt;http://localhost:18080&lt;/A&gt;&lt;/P&gt;&lt;P&gt;authorizers.xml file&lt;/P&gt;&lt;P&gt;&amp;lt;?xml version="1.0" encoding="UTF-8" standalone="yes"?&amp;gt;&lt;BR /&gt;&amp;lt;authorizers&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;lt;userGroupProvider&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;identifier&amp;gt;file-user-group-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileUserGroupProvider&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;property name="Users File"&amp;gt;./conf/users.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;lt;/userGroupProvider&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;lt;userGroupProvider&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;identifier&amp;gt;aad-user-group-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;class&amp;gt;org.apache.nifi.authorization.azure.AzureGraphUserGroupProvider&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;property name="Refresh Delay"&amp;gt;5 mins&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;property name="Authority Endpoint"&amp;gt;&lt;A href="https://login.microsoftonline.com/" target="_blank" rel="nofollow noopener noreferrer"&gt;https://login.microsoftonline.com&lt;/A&gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;property name="Directory ID"&amp;gt;XXXXXXXXXXXXXXXXX&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;property name="Application ID"&amp;gt;XXXXXXXXXXXXXXXXX&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;property name="Client Secret"&amp;gt;XXXXXXXXXXXXXXXXX&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;property name="Group Filter Prefix"&amp;gt;Nifi-AAD&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;property name="Page Size"&amp;gt;100&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;lt;/userGroupProvider&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;lt;userGroupProvider&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;identifier&amp;gt;composite-configurable-user-group-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;class&amp;gt;org.apache.nifi.authorization.CompositeConfigurableUserGroupProvider&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;property name="Configurable User Group Provider"&amp;gt;file-user-group-provider&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;property name="User Group Provider 1"&amp;gt;aad-user-group-provider&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;lt;/userGroupProvider&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;lt;accessPolicyProvider&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;identifier&amp;gt;file-access-policy-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAccessPolicyProvider&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;property name="User Group Provider"&amp;gt;composite-configurable-user-group-provider&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;property name="Initial Admin Identity"&amp;gt;oncloudtemuser@sossourabh7687gmail.onmicrosoft.com&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;property name="Node Identity 1"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;lt;/accessPolicyProvider&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;lt;authorizer&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;identifier&amp;gt;managed-authorizer&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;class&amp;gt;org.apache.nifi.authorization.StandardManagedAuthorizer&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;property name="Access Policy Provider"&amp;gt;file-access-policy-provider&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;lt;/authorizer&amp;gt;&lt;BR /&gt;&amp;lt;/authorizers&amp;gt;&lt;BR /&gt;Thank you for your help!&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 04:02:50 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399519#M250504</guid>
      <dc:creator>spiker</dc:creator>
      <dc:date>2025-01-03T04:02:50Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted proxy error Authentication Failed o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET https://172.24.0.3:8443/nifi-api/flow/current-user 2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399523#M250505</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/122979"&gt;@spiker&lt;/a&gt;, Welcome&amp;nbsp;to our community! To help you get the best possible answer, I have tagged our NiFi experts&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/95503"&gt;@steven-matison&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/80381"&gt;@SAMSAL&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/20288"&gt;@Shelton&lt;/a&gt;&amp;nbsp;&amp;nbsp;who may be able to assist you further.&lt;BR /&gt;&lt;BR /&gt;Please feel free to provide any additional information or details about your query, and we hope that you will find a satisfactory solution to your question.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 05:38:43 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399523#M250505</guid>
      <dc:creator>VidyaSargur</dc:creator>
      <dc:date>2025-01-03T05:38:43Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted proxy error Authentication Failed o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET https://172.24.0.3:8443/nifi-api/flow/current-user 2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399533#M250507</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;,&lt;BR /&gt;Could you please help me resolve the issue I mentioned above?&lt;BR /&gt;I would be very grateful if you could take a moment to look at my question and provide some guidance or insights.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 08:02:17 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399533#M250507</guid>
      <dc:creator>spiker</dc:creator>
      <dc:date>2025-01-03T08:02:17Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted proxy error Authentication Failed o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET https://172.24.0.3:8443/nifi-api/flow/current-user 2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399540#M250508</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/122979"&gt;@spiker&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The error you're encountering in Apache NiFi logs suggests a configuration issue related to OpenID Connect (OIDC) authentication and proxy settings within your Kubernetes environment.&lt;BR /&gt;Initial Request → Authentication Failed → JSON Parse Error → Internal Server Error : "Untrusted proxy"&lt;/P&gt;&lt;P&gt;Here is a beautiful document that you should go through for maybe a eureka moment&lt;BR /&gt;&lt;A href="https://docs.acceldata.io/odp/documentation/securing-nifi-with-existing-ca-certificates" target="_self"&gt;Securing NiFi with Existing CA Certificates&amp;nbsp;&lt;/A&gt;&lt;BR /&gt;Ensure that NiFi trusts the proxy making the request.&lt;/P&gt;&lt;LI-SPOILER&gt;nifi.security.whitelisted.proxy.hostnames=172\.24\.0\.3&lt;/LI-SPOILER&gt;&lt;P&gt;Check the SSL certificates used by NiFi and ensure the truststore is correctly configured.&lt;/P&gt;&lt;LI-SPOILER&gt;nifi.security.truststore=/path/to/truststore.jks&lt;BR /&gt;nifi.security.truststoreType=JKS&lt;BR /&gt;nifi.security.proxy.enabled=true&lt;/LI-SPOILER&gt;&lt;P&gt;Check NiFi permission&lt;/P&gt;&lt;LI-SPOILER&gt;chown -R nifi:nifi /path/to/truststore.jks&lt;BR /&gt;chmod 640 /path/to/truststore.jks&lt;/LI-SPOILER&gt;&lt;P&gt;# Import the proxy certificate into NiFi's truststore&lt;/P&gt;&lt;LI-SPOILER&gt;keytool -import -alias proxy-cert -file proxy.crt -keystore truststore.jks&lt;/LI-SPOILER&gt;&lt;P&gt;Verify truststore contains proxy certificate&lt;/P&gt;&lt;LI-SPOILER&gt;keytool -list -v -keystore truststore.jks&lt;/LI-SPOILER&gt;&lt;P&gt;Ensure that OIDC is properly set up in the nifi.properties file add the following properties&lt;/P&gt;&lt;LI-SPOILER&gt;nifi.security.user.oidc.redirect.url=https://&amp;lt;nifi-host&amp;gt;:8443/nifi-api/access/oidc/callback&lt;BR /&gt;nifi.security.user.login.identity.provider=oidc-provider&lt;/LI-SPOILER&gt;&lt;P&gt;Validate Kubernetes Ingress and Service as you are using Kubernetes ingress or a service, ensure headers and SSL information are properly forwarded.&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Shelton_0-1735899318260.png" style="width: 999px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/43316i49F425970921E92A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Shelton_0-1735899318260.png" alt="Shelton_0-1735899318260.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;Enable detailed logging in NiFi add this in the logback.xml to identify specific issues with headers or tokens&lt;/P&gt;&lt;LI-SPOILER&gt;org.apache.nifi.web.security.level=DEBUG&lt;/LI-SPOILER&gt;&lt;P&gt;Restart NiFi&lt;/P&gt;&lt;LI-SPOILER&gt;./bin/nifi.sh restart&lt;/LI-SPOILER&gt;&lt;P&gt;Testing with Curl to simulate an API call to validate the request flow&lt;/P&gt;&lt;LI-SPOILER&gt;curl -k -H "Authorization: Bearer &amp;lt;your-access-token&amp;gt;" &lt;A target="_blank" rel="noopener"&gt;https://&amp;lt;nifi-host&amp;gt;:8443/nifi-api/flow/current-user&lt;/A&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;BR /&gt;Please verify that the Kubernetes environment has the necessary DNS resolution, network connectivity, and the correct OpenID Connect metadata URL.&lt;BR /&gt;&lt;BR /&gt;Happy hadooping&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 10:22:06 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399540#M250508</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2025-01-03T10:22:06Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted proxy error Authentication Failed o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET https://172.24.0.3:8443/nifi-api/flow/current-user 2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399552#M250511</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/122979"&gt;@spiker&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Let's start by focusing on the following two shared log lines:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;2025-01-02 10:29:05,167 INFO [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Started 172.24.0.3 [&amp;lt;oncloudtemuser@sossourabh7687gmail.onmicrosoft.com&amp;gt;&amp;lt;CN=172.24.0.3, OU=NIFI, O=NIFI, L=HYDRABAD, ST=TELANGANA, C=IN&amp;gt;] GET https://172.24.0.3:8443/nifi-api/flow/current-user

2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3:8443/nifi-api/flow/current-user [Untrusted proxy CN=172.24.0.3, OU=NIFI, O=NIFI, L=HYDRABAD, ST=TELANGANA, C=IN]&lt;/LI-CODE&gt;&lt;P&gt;In the first log line we see an authenticated user identity followed by the authenticated node identity for the node receiving access request:&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;oncloudtemuser@sossourabh7687gmail.onmicrosoft.com&amp;gt;&amp;lt;CN=172.24.0.3, OU=NIFI, O=NIFI, L=HYDRABAD, ST=TELANGANA, C=IN&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In a NiFi cluster setup nodes will proxy all requests on behalf of the authenticated user to the currently elected NiFi cluster coordinator.&amp;nbsp; This means that all nodes in a NiFi cluster must be authorized to proxy user requests.&amp;nbsp; Establishing the minimum required authorizations needed in a new NiFi setup is handle by the authorizers.xml.&amp;nbsp; In your case, you are using the file-access-policy-provider:&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;  &amp;lt;accessPolicyProvider&amp;gt;
        &amp;lt;identifier&amp;gt;file-access-policy-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAccessPolicyProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="User Group Provider"&amp;gt;composite-configurable-user-group-provider&amp;lt;/property&amp;gt;
        &amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;
        &amp;lt;property name="Initial Admin Identity"&amp;gt;oncloudtemuser@sossourabh7687gmail.onmicrosoft.com&amp;lt;/property&amp;gt;
        &amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Node Identity 1"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;/accessPolicyProvider&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;This provider will generated the authorizations.xml file ONLY if it does not already exists.&amp;nbsp; Once it exists all additional authorizations and modifications are made from within the NiFi UI.&amp;nbsp; If you edit the file-access-policy-provider, you'll need to delete the authorizations.xml on all nodes before restarting yoru NiFi.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So we see from above that you have you initial admin user identity defined, but have not defined your node(s) identities via "Node Identity 1", Node Identity 2", etc...&lt;BR /&gt;&lt;BR /&gt;Before you can define your node identity in the file-access-policy-provider for seeding the node required authorizations, the same case sensitive identical node identity must be returned by the the "composite-confgurable-user-group-provider".&amp;nbsp; Which means that "&lt;SPAN&gt;CN=172.24.0.3, OU=NIFI, O=NIFI, L=HYDRABAD, ST=TELANGANA, C=IN" must be returned by either the "file-user-group-provider" or the "aad-user-group-provider".&lt;BR /&gt;&lt;BR /&gt;I believe the file-user-group-provider is where you expect you node identities to be derived from:&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;   &amp;lt;userGroupProvider&amp;gt;
        &amp;lt;identifier&amp;gt;file-user-group-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileUserGroupProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Users File"&amp;gt;./conf/users.xml&amp;lt;/property&amp;gt;
        &amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Initial User Identity 1"&amp;gt;CN=172.24.0.3, OU=NIFI, O=NIFI, L=HYDRABAD, ST=TELANGANA, C=IN&amp;lt;/property&amp;gt;
        &amp;lt;property name="Initial User Identity 2"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;/userGroupProvider&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&lt;SPAN&gt;Just like the "file-access-policy-provider", the "file-user-group-provider" will ONLY generate the users.xml if it does not already exist.&amp;nbsp; So you will need to delete the users.xml on all your nodes before restarting after editing your authorizers.xml.&lt;BR /&gt;&lt;BR /&gt;NOTE: Be mindful of case sensitivity in your user identities.&lt;BR /&gt;&lt;BR /&gt;These modifications should get you past your UNTRUSTED PROXY issues when trying to access the NiFi with your authenticated user.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Please help our community thrive. If you found&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Accept as Solution&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;" on&amp;nbsp;&lt;STRONG&gt;one or more&lt;/STRONG&gt;&amp;nbsp;of them that helped.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;BR /&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 13:59:21 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399552#M250511</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2025-01-03T13:59:21Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted proxy error Authentication Failed o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET https://172.24.0.3:8443/nifi-api/flow/current-user 2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399558#M250512</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;/&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/20288"&gt;@Shelton&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;None of the solutions you provided are working. I am still encountering the same error mentioned earlier, along with the message in the UI.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="spiker_0-1735916579771.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/43322i937AAB6099905EDC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="spiker_0-1735916579771.png" alt="spiker_0-1735916579771.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Is there any possible solution for this?&lt;BR /&gt;Any help would be appreciated.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;spiker&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 15:09:21 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399558#M250512</guid>
      <dc:creator>spiker</dc:creator>
      <dc:date>2025-01-03T15:09:21Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted proxy error Authentication Failed o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET https://172.24.0.3:8443/nifi-api/flow/current-user 2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399559#M250513</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/122979"&gt;@spiker&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;With the edits to the authorizers.xml and verified newly generated users.xml and authorizations.xml files, are you still seeing the untrusted proxy WARN in the logs?&lt;BR /&gt;&lt;BR /&gt;What do you see now in the logs?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;SPAN&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 15:16:13 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399559#M250513</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2025-01-03T15:16:13Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted proxy error Authentication Failed o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET https://172.24.0.3:8443/nifi-api/flow/current-user 2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399560#M250514</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/122979"&gt;@spiker&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Can you share the logs?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 15:18:18 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399560#M250514</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2025-01-03T15:18:18Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted proxy error Authentication Failed o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET https://172.24.0.3:8443/nifi-api/flow/current-user 2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399562#M250515</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/20288"&gt;@Shelton&lt;/a&gt;&amp;nbsp;/&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;The log message are :-&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;2025-01-03 20:30:36,418 INFO [NiFi Web Server-164] o.a.n.w.s.NiFiAuthenticationFilter Authentication Started 172.24.0.3 [&amp;lt;oncloudtemuser@sossourabh7687gmail.onmicrosoft.com&amp;gt;&amp;lt;CN=172.24.0.3, OU=NIFI, O=NIFI, L=HYDRABAD, ST=TELANGANA, C=IN&amp;gt;] GET &lt;A href="https://172.24.0.3:8443/nifi-api/flow/current-user" target="_blank" rel="noopener"&gt;https://172.24.0.3:8443/nifi-api/flow/current-user&lt;/A&gt;&lt;BR /&gt;2025-01-03 20:30:36,419 WARN [NiFi Web Server-164] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET &lt;A href="https://172.24.0.3:8443/nifi-api/flow/current-user" target="_blank" rel="noopener"&gt;https://172.24.0.3:8443/nifi-api/flow/current-user&lt;/A&gt; [Untrusted proxy CN=172.24.0.3, OU=NIFI, O=NIFI, L=HYDRABAD, ST=TELANGANA, C=IN]&lt;BR /&gt;2025-01-03 20:30:36,423 ERROR [NiFi Web Server-51] o.a.nifi.web.api.config.ThrowableMapper An unexpected error has occurred: java.io.UncheckedIOException: Read Current User Entity failed. Returning Internal Server Error response.&lt;BR /&gt;java.io.UncheckedIOException: Read Current User Entity failed&lt;BR /&gt;at org.apache.nifi.web.api.FlowResource.readReplicatedCurrentUserEntity(FlowResource.java:453)&lt;BR /&gt;at org.apache.nifi.web.api.FlowResource.getCurrentUser(FlowResource.java:428)&lt;BR /&gt;at java.base/jdk.internal.reflect.DirectMethodHandleAccessor.invoke(DirectMethodHandleAccessor.java:104)&lt;BR /&gt;at java.base/java.lang.reflect.Method.invoke(Method.java:565)&lt;BR /&gt;at org.glassfish.jersey.server.model.internal.ResourceMethodInvocationHandlerFactory.lambda$static$0(ResourceMethodInvocationHandlerFactory.java:52)&lt;BR /&gt;at org.glassfish.jersey.server.model.internal.AbstractJavaResourceMethodDispatcher$1.run(AbstractJavaResourceMethodDispatcher.java:146)&lt;BR /&gt;at org.glassfish.jersey.server.model.internal.AbstractJavaResourceMethodDispatcher.invoke(AbstractJavaResourceMethodDispatcher.java:189)&lt;BR /&gt;at org.glassfish.jersey.server.model.internal.JavaResourceMethodDispatcherProvider$ResponseOutInvoker.doDispatch(JavaResourceMethodDispatcherProvider.java:176)&lt;BR /&gt;at org.glassfish.jersey.server.model.internal.AbstractJavaResourceMethodDispatcher.dispatch(AbstractJavaResourceMethodDispatcher.java:93)&lt;BR /&gt;at org.glassfish.jersey.server.model.ResourceMethodInvoker.invoke(ResourceMethodInvoker.java:478)&lt;BR /&gt;at org.glassfish.jersey.server.model.ResourceMethodInvoker.apply(ResourceMethodInvoker.java:400)&lt;BR /&gt;at org.glassfish.jersey.server.model.ResourceMethodInvoker.apply(ResourceMethodInvoker.java:81)&lt;BR /&gt;at org.glassfish.jersey.server.ServerRuntime$1.run(ServerRuntime.java:274)&lt;BR /&gt;at org.glassfish.jersey.internal.Errors$1.call(Errors.java:248)&lt;BR /&gt;at org.glassfish.jersey.internal.Errors$1.call(Errors.java:244)&lt;BR /&gt;at org.glassfish.jersey.internal.Errors.process(Errors.java:292)&lt;BR /&gt;at org.glassfish.jersey.internal.Errors.process(Errors.java:274)&lt;BR /&gt;at org.glassfish.jersey.internal.Errors.process(Errors.java:244)&lt;BR /&gt;at org.glassfish.jersey.process.internal.RequestScope.runInScope(RequestScope.java:266)&lt;BR /&gt;at org.glassfish.jersey.server.ServerRuntime.process(ServerRuntime.java:253)&lt;BR /&gt;at org.glassfish.jersey.server.ApplicationHandler.handle(ApplicationHandler.java:696)&lt;BR /&gt;at org.glassfish.jersey.servlet.WebComponent.serviceImpl(WebComponent.java:397)&lt;BR /&gt;at org.glassfish.jersey.servlet.WebComponent.service(WebComponent.java:349)&lt;BR /&gt;at org.glassfish.jersey.servlet.ServletContainer.service(ServletContainer.java:358)&lt;BR /&gt;at org.glassfish.jersey.servlet.ServletContainer.service(ServletContainer.java:312)&lt;BR /&gt;at org.glassfish.jersey.servlet.ServletContainer.service(ServletContainer.java:205)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlet.ServletHolder$NotAsync.service(ServletHolder.java:1379)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlet.ServletHolder.handle(ServletHolder.java:736)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlet.ServletHandler$ChainEnd.doFilter(ServletHandler.java:1619)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy.lambda$doFilterInternal$3(FilterChainProxy.java:231)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:365)&lt;BR /&gt;at org.springframework.security.web.access.intercept.AuthorizationFilter.doFilter(AuthorizationFilter.java:101)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)&lt;BR /&gt;at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:126)&lt;BR /&gt;at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:120)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)&lt;BR /&gt;at org.apache.nifi.web.security.log.AuthenticationUserFilter.doFilterInternal(AuthenticationUserFilter.java:57)&lt;BR /&gt;at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)&lt;BR /&gt;at org.springframework.security.web.authentication.AnonymousAuthenticationFilter.doFilter(AnonymousAuthenticationFilter.java:100)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)&lt;BR /&gt;at org.apache.nifi.web.security.oidc.client.web.OidcBearerTokenRefreshFilter.doFilterInternal(OidcBearerTokenRefreshFilter.java:135)&lt;BR /&gt;at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)&lt;BR /&gt;at org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter.doFilterInternal(OAuth2AuthorizationRequestRedirectFilter.java:198)&lt;BR /&gt;at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)&lt;BR /&gt;at org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter.doFilterInternal(OAuth2AuthorizationCodeGrantFilter.java:183)&lt;BR /&gt;at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)&lt;BR /&gt;at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:227)&lt;BR /&gt;at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:221)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)&lt;BR /&gt;at org.springframework.security.oauth2.server.resource.web.authentication.BearerTokenAuthenticationFilter.doFilterInternal(BearerTokenAuthenticationFilter.java:145)&lt;BR /&gt;at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)&lt;BR /&gt;at org.apache.nifi.web.security.NiFiAuthenticationFilter.authenticate(NiFiAuthenticationFilter.java:94)&lt;BR /&gt;at org.apache.nifi.web.security.NiFiAuthenticationFilter.doFilter(NiFiAuthenticationFilter.java:56)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)&lt;BR /&gt;at org.apache.nifi.web.security.csrf.CsrfCookieFilter.doFilterInternal(CsrfCookieFilter.java:43)&lt;BR /&gt;at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)&lt;BR /&gt;at org.springframework.security.web.csrf.CsrfFilter.doFilterInternal(CsrfFilter.java:117)&lt;BR /&gt;at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)&lt;BR /&gt;at org.apache.nifi.web.security.logout.StandardLogoutFilter.doFilterInternal(StandardLogoutFilter.java:64)&lt;BR /&gt;at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)&lt;BR /&gt;at org.apache.nifi.web.security.csrf.SkipReplicatedCsrfFilter.doFilterInternal(SkipReplicatedCsrfFilter.java:59)&lt;BR /&gt;at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)&lt;BR /&gt;at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:62)&lt;BR /&gt;at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:233)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:191)&lt;BR /&gt;at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:362)&lt;BR /&gt;at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:278)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlet.FilterHolder.doFilter(FilterHolder.java:205)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1591)&lt;BR /&gt;at org.apache.nifi.web.filter.ExceptionFilter.doFilter(ExceptionFilter.java:44)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlet.FilterHolder.doFilter(FilterHolder.java:208)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1591)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlets.DoSFilter.doFilterChain(DoSFilter.java:462)&lt;BR /&gt;at org.apache.nifi.web.server.filter.DataTransferExcludedDoSFilter.doFilterChain(DataTransferExcludedDoSFilter.java:51)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlets.DoSFilter.doFilter(DoSFilter.java:317)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlets.DoSFilter.doFilter(DoSFilter.java:282)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlet.FilterHolder.doFilter(FilterHolder.java:205)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1591)&lt;BR /&gt;at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90)&lt;BR /&gt;at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75)&lt;BR /&gt;at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlet.FilterHolder.doFilter(FilterHolder.java:205)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1591)&lt;BR /&gt;at org.apache.nifi.web.server.log.RequestAuthenticationFilter.doFilterInternal(RequestAuthenticationFilter.java:59)&lt;BR /&gt;at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlet.FilterHolder.doFilter(FilterHolder.java:205)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1591)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlet.ServletHandler$MappedServlet.handle(ServletHandler.java:1552)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlet.ServletChannel.dispatch(ServletChannel.java:819)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlet.ServletChannel.handle(ServletChannel.java:436)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlet.ServletHandler.handle(ServletHandler.java:469)&lt;BR /&gt;at org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:575)&lt;BR /&gt;at org.eclipse.jetty.ee10.servlet.SessionHandler.handle(SessionHandler.java:717)&lt;BR /&gt;at org.eclipse.jetty.server.handler.ContextHandler.handle(ContextHandler.java:1060)&lt;BR /&gt;at org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:181)&lt;BR /&gt;at org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:181)&lt;BR /&gt;at org.eclipse.jetty.server.Server.handle(Server.java:182)&lt;BR /&gt;at org.eclipse.jetty.server.internal.HttpChannelState$HandlerInvoker.run(HttpChannelState.java:662)&lt;BR /&gt;at org.eclipse.jetty.util.thread.Invocable$ReadyTask.run(Invocable.java:175)&lt;BR /&gt;at org.eclipse.jetty.http2.server.internal.HttpStreamOverHTTP2$1.run(HttpStreamOverHTTP2.java:135)&lt;BR /&gt;at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.runTask(AdaptiveExecutionStrategy.java:480)&lt;BR /&gt;at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.consumeTask(AdaptiveExecutionStrategy.java:443)&lt;BR /&gt;at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:293)&lt;BR /&gt;at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:195)&lt;BR /&gt;at org.eclipse.jetty.http2.HTTP2Connection.produce(HTTP2Connection.java:209)&lt;BR /&gt;at org.eclipse.jetty.http2.HTTP2Connection.onFillable(HTTP2Connection.java:156)&lt;BR /&gt;at org.eclipse.jetty.http2.HTTP2Connection$FillableCallback.succeeded(HTTP2Connection.java:442)&lt;BR /&gt;at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:99)&lt;BR /&gt;at org.eclipse.jetty.io.ssl.SslConnection$SslEndPoint.onFillable(SslConnection.java:575)&lt;BR /&gt;at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:390)&lt;BR /&gt;at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:150)&lt;BR /&gt;at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:99)&lt;BR /&gt;at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)&lt;BR /&gt;at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.runTask(AdaptiveExecutionStrategy.java:480)&lt;BR /&gt;at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.consumeTask(AdaptiveExecutionStrategy.java:443)&lt;BR /&gt;at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:293)&lt;BR /&gt;at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.run(AdaptiveExecutionStrategy.java:201)&lt;BR /&gt;at org.eclipse.jetty.util.thread.ReservedThreadExecutor$ReservedThread.run(ReservedThreadExecutor.java:311)&lt;BR /&gt;at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:979)&lt;BR /&gt;at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1209)&lt;BR /&gt;at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1164)&lt;BR /&gt;at java.base/java.lang.Thread.run(Thread.java:1447)&lt;BR /&gt;Caused by: com.fasterxml.jackson.core.JsonParseException: Unrecognized token 'Authentication': was expecting (JSON String, Number, Array, Object or token 'null', 'true' or 'false')&lt;BR /&gt;at [Source: REDACTED (`StreamReadFeature.INCLUDE_SOURCE_IN_LOCATION` disabled); line: 1, column: 16]&lt;BR /&gt;at com.fasterxml.jackson.core.JsonParser._constructError(JsonParser.java:2584)&lt;BR /&gt;at com.fasterxml.jackson.core.JsonParser._constructReadException(JsonParser.java:2610)&lt;BR /&gt;at com.fasterxml.jackson.core.JsonParser._constructReadException(JsonParser.java:2618)&lt;BR /&gt;at com.fasterxml.jackson.core.base.ParserMinimalBase._reportError(ParserMinimalBase.java:825)&lt;BR /&gt;at com.fasterxml.jackson.core.json.UTF8StreamJsonParser._reportInvalidToken(UTF8StreamJsonParser.java:3662)&lt;BR /&gt;at com.fasterxml.jackson.core.json.UTF8StreamJsonParser._handleUnexpectedValue(UTF8StreamJsonParser.java:2749)&lt;BR /&gt;at com.fasterxml.jackson.core.json.UTF8StreamJsonParser._nextTokenNotInObject(UTF8StreamJsonParser.java:867)&lt;BR /&gt;at com.fasterxml.jackson.core.json.UTF8StreamJsonParser.nextToken(UTF8StreamJsonParser.java:753)&lt;BR /&gt;at com.fasterxml.jackson.databind.ObjectMapper._initForReading(ObjectMapper.java:5004)&lt;BR /&gt;at com.fasterxml.jackson.databind.ObjectMapper._readMapAndClose(ObjectMapper.java:4910)&lt;BR /&gt;at com.fasterxml.jackson.databind.ObjectMapper.readValue(ObjectMapper.java:3921)&lt;BR /&gt;at org.apache.nifi.web.api.FlowResource.readReplicatedCurrentUserEntity(FlowResource.java:451)&lt;BR /&gt;... 132 common frames omitted&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 15:33:47 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399562#M250515</guid>
      <dc:creator>spiker</dc:creator>
      <dc:date>2025-01-03T15:33:47Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted proxy error Authentication Failed o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET https://172.24.0.3:8443/nifi-api/flow/current-user 2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399563#M250516</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/122979"&gt;@spiker&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;What is currently written in your users.xml and authorizations.xml files in the Nifi conf directory?&lt;BR /&gt;&lt;BR /&gt;How many nodes in yoru NiFi cluster?&lt;BR /&gt;&lt;BR /&gt;What Apache NiFi version are you using?&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;BR /&gt;&lt;SPAN&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 15:37:51 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399563#M250516</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2025-01-03T15:37:51Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted proxy error Authentication Failed o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET https://172.24.0.3:8443/nifi-api/flow/current-user 2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399564#M250517</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;The nifi version I am using is&amp;nbsp;&lt;STRONG&gt;nifi-2.1.0.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;currently I am using 2 Node cluster.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;authorizations.xml&lt;BR /&gt;&amp;lt;?xml version="1.0" encoding="UTF-8" standalone="yes"?&amp;gt;&lt;BR /&gt;&amp;lt;authorizations&amp;gt;&lt;BR /&gt;&amp;lt;policies&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="f99bccd1-a30e-3e4a-98a2-dbc708edc67f" resource="/flow" action="R"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="9cc0191f-def9-4d5d-a553-74052a8bb43a"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="b8775bd4-704a-34c6-987b-84f2daf7a515" resource="/restricted-components" action="W"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="9cc0191f-def9-4d5d-a553-74052a8bb43a"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="627410be-1717-35b4-a06f-e9362b89e0b7" resource="/tenants" action="R"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="9cc0191f-def9-4d5d-a553-74052a8bb43a"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="15e4e0bd-cb28-34fd-8587-f8d15162cba5" resource="/tenants" action="W"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="9cc0191f-def9-4d5d-a553-74052a8bb43a"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="ff96062a-fa99-36dc-9942-0f6442ae7212" resource="/policies" action="R"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="9cc0191f-def9-4d5d-a553-74052a8bb43a"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="ad99ea98-3af6-3561-ae27-5bf09e1d969d" resource="/policies" action="W"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="9cc0191f-def9-4d5d-a553-74052a8bb43a"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="2e1015cb-0fed-3005-8e0d-722311f21a03" resource="/controller" action="R"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="9cc0191f-def9-4d5d-a553-74052a8bb43a"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;policy identifier="c6322e6c-4cc1-3bcc-91b3-2ed2111674cf" resource="/controller" action="W"&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="9cc0191f-def9-4d5d-a553-74052a8bb43a"/&amp;gt;&lt;BR /&gt;&amp;lt;/policy&amp;gt;&lt;BR /&gt;&amp;lt;/policies&amp;gt;&lt;BR /&gt;&amp;lt;/authorizations&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;users.xml&lt;BR /&gt;&lt;/SPAN&gt;&amp;lt;tenants&amp;gt;&lt;BR /&gt;&amp;lt;groups/&amp;gt;&lt;BR /&gt;&amp;lt;users&amp;gt;&lt;BR /&gt;&amp;lt;user identifier="42fb9315-4643-3735-9283-fb2720a523d7" identity="CN=172.24.0.3, OU=NIFI, O=NIFI, L=HYDRABAD, ST=TELANGANA, C=IN"/&amp;gt;&lt;BR /&gt;&amp;lt;/users&amp;gt;&lt;BR /&gt;&amp;lt;/tenants&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 15:48:06 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399564#M250517</guid>
      <dc:creator>spiker</dc:creator>
      <dc:date>2025-01-03T15:48:06Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted proxy error Authentication Failed o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET https://172.24.0.3:8443/nifi-api/flow/current-user 2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399571#M250522</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/122979"&gt;@spiker&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Can you also share your&amp;nbsp;nifi.properties?&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 18:15:34 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399571#M250522</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2025-01-03T18:15:34Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted proxy error Authentication Failed o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET https://172.24.0.3:8443/nifi-api/flow/current-user 2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399603#M250524</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/122979"&gt;@spiker&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Can you quickly do the below steps and revert&lt;/P&gt;&lt;P&gt;1. Stop NiFi&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;./bin/nifi.sh stop&lt;/LI-CODE&gt;&lt;P&gt;2. Backup configuration files&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;cp conf/authorizations.xml conf/authorizations.xml.backup
cp conf/users.xml conf/users.xml.backup&lt;/LI-CODE&gt;&lt;P&gt;3. Clear login identity provider cache&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;rm -rf ./state/local/login-identity-providers/&lt;/LI-CODE&gt;&lt;P&gt;4. Verify file permissions&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;chown -R nifi:nifi ./conf/
chmod 660 conf/authorizations.xml
chmod 660 conf/users.xml&lt;/LI-CODE&gt;&lt;P&gt;5. Start NiFi&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;./bin/nifi.sh start&lt;/LI-CODE&gt;&lt;P&gt;6. Check Logs for Additional Details&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;tail -f logs/nifi-app.log&lt;/LI-CODE&gt;&lt;P&gt;If these steps don't resolve the issue, please check and share the full stack trace from nifi-app.log&lt;BR /&gt;&lt;BR /&gt;Happy hadooping&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jan 2025 14:13:53 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399603#M250524</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2025-01-04T14:13:53Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted proxy error Authentication Failed o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET https://172.24.0.3:8443/nifi-api/flow/current-user 2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399620#M250529</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/20288"&gt;@Shelton&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;The solution you are proposed is not working. Their is no error in the nifi-app.log, but the same error&amp;nbsp; I posted previously is appearing in the nifi-user.log. However, I started the NiFi in standalone mode, the OIDC authentication works perfectly fine. The problem arises when I start NiFi in cluster mode by connecting to zookeeper and modifying different properties in the nifi.properties file.&lt;BR /&gt;&lt;BR /&gt;The nifi-user.log error :-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;2025-01-03 20:30:36,418 INFO [NiFi Web Server-164] o.a.n.w.s.NiFiAuthenticationFilter Authentication Started 172.24.0.3 [&amp;lt;oncloudtemuser@sossourabh7687gmail.onmicrosoft.com&amp;gt;&amp;lt;CN=172.24.0.3, OU=NIFI, O=NIFI, L=HYDRABAD, ST=TELANGANA, C=IN&amp;gt;] GET https://172.24.0.3:8443/nifi-api/flow/current-user
2025-01-03 20:30:36,419 WARN [NiFi Web Server-164] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3:8443/nifi-api/flow/current-user [Untrusted proxy CN=172.24.0.3, OU=NIFI, O=NIFI, L=HYDRABAD, ST=TELANGANA, C=IN]
2025-01-03 20:30:36,423 ERROR [NiFi Web Server-51] o.a.nifi.web.api.config.ThrowableMapper An unexpected error has occurred: java.io.UncheckedIOException: Read Current User Entity failed. Returning Internal Server Error response.
java.io.UncheckedIOException: Read Current User Entity failed
at org.apache.nifi.web.api.FlowResource.readReplicatedCurrentUserEntity(FlowResource.java:453)
at org.apache.nifi.web.api.FlowResource.getCurrentUser(FlowResource.java:428)
at java.base/jdk.internal.reflect.DirectMethodHandleAccessor.invoke(DirectMethodHandleAccessor.java:104)
at java.base/java.lang.reflect.Method.invoke(Method.java:565)
at org.glassfish.jersey.server.model.internal.ResourceMethodInvocationHandlerFactory.lambda$static$0(ResourceMethodInvocationHandlerFactory.java:52)
at org.glassfish.jersey.server.model.internal.AbstractJavaResourceMethodDispatcher$1.run(AbstractJavaResourceMethodDispatcher.java:146)
at org.glassfish.jersey.server.model.internal.AbstractJavaResourceMethodDispatcher.invoke(AbstractJavaResourceMethodDispatcher.java:189)
at org.glassfish.jersey.server.model.internal.JavaResourceMethodDispatcherProvider$ResponseOutInvoker.doDispatch(JavaResourceMethodDispatcherProvider.java:176)
at org.glassfish.jersey.server.model.internal.AbstractJavaResourceMethodDispatcher.dispatch(AbstractJavaResourceMethodDispatcher.java:93)
at org.glassfish.jersey.server.model.ResourceMethodInvoker.invoke(ResourceMethodInvoker.java:478)
at org.glassfish.jersey.server.model.ResourceMethodInvoker.apply(ResourceMethodInvoker.java:400)
at org.glassfish.jersey.server.model.ResourceMethodInvoker.apply(ResourceMethodInvoker.java:81)
at org.glassfish.jersey.server.ServerRuntime$1.run(ServerRuntime.java:274)
at org.glassfish.jersey.internal.Errors$1.call(Errors.java:248)
at org.glassfish.jersey.internal.Errors$1.call(Errors.java:244)
at org.glassfish.jersey.internal.Errors.process(Errors.java:292)
at org.glassfish.jersey.internal.Errors.process(Errors.java:274)
at org.glassfish.jersey.internal.Errors.process(Errors.java:244)
at org.glassfish.jersey.process.internal.RequestScope.runInScope(RequestScope.java:266)
at org.glassfish.jersey.server.ServerRuntime.process(ServerRuntime.java:253)
at org.glassfish.jersey.server.ApplicationHandler.handle(ApplicationHandler.java:696)
at org.glassfish.jersey.servlet.WebComponent.serviceImpl(WebComponent.java:397)
at org.glassfish.jersey.servlet.WebComponent.service(WebComponent.java:349)
at org.glassfish.jersey.servlet.ServletContainer.service(ServletContainer.java:358)
at org.glassfish.jersey.servlet.ServletContainer.service(ServletContainer.java:312)
at org.glassfish.jersey.servlet.ServletContainer.service(ServletContainer.java:205)
at org.eclipse.jetty.ee10.servlet.ServletHolder$NotAsync.service(ServletHolder.java:1379)
at org.eclipse.jetty.ee10.servlet.ServletHolder.handle(ServletHolder.java:736)
at org.eclipse.jetty.ee10.servlet.ServletHandler$ChainEnd.doFilter(ServletHandler.java:1619)
at org.springframework.security.web.FilterChainProxy.lambda$doFilterInternal$3(FilterChainProxy.java:231)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:365)
at org.springframework.security.web.access.intercept.AuthorizationFilter.doFilter(AuthorizationFilter.java:101)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:126)
at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:120)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.apache.nifi.web.security.log.AuthenticationUserFilter.doFilterInternal(AuthenticationUserFilter.java:57)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.authentication.AnonymousAuthenticationFilter.doFilter(AnonymousAuthenticationFilter.java:100)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.apache.nifi.web.security.oidc.client.web.OidcBearerTokenRefreshFilter.doFilterInternal(OidcBearerTokenRefreshFilter.java:135)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter.doFilterInternal(OAuth2AuthorizationRequestRedirectFilter.java:198)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter.doFilterInternal(OAuth2AuthorizationCodeGrantFilter.java:183)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:227)
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:221)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.oauth2.server.resource.web.authentication.BearerTokenAuthenticationFilter.doFilterInternal(BearerTokenAuthenticationFilter.java:145)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.apache.nifi.web.security.NiFiAuthenticationFilter.authenticate(NiFiAuthenticationFilter.java:94)
at org.apache.nifi.web.security.NiFiAuthenticationFilter.doFilter(NiFiAuthenticationFilter.java:56)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.apache.nifi.web.security.csrf.CsrfCookieFilter.doFilterInternal(CsrfCookieFilter.java:43)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.csrf.CsrfFilter.doFilterInternal(CsrfFilter.java:117)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.apache.nifi.web.security.logout.StandardLogoutFilter.doFilterInternal(StandardLogoutFilter.java:64)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.apache.nifi.web.security.csrf.SkipReplicatedCsrfFilter.doFilterInternal(SkipReplicatedCsrfFilter.java:59)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:62)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:233)
at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:191)
at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:362)
at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:278)
at org.eclipse.jetty.ee10.servlet.FilterHolder.doFilter(FilterHolder.java:205)
at org.eclipse.jetty.ee10.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1591)
at org.apache.nifi.web.filter.ExceptionFilter.doFilter(ExceptionFilter.java:44)
at org.eclipse.jetty.ee10.servlet.FilterHolder.doFilter(FilterHolder.java:208)
at org.eclipse.jetty.ee10.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1591)
at org.eclipse.jetty.ee10.servlets.DoSFilter.doFilterChain(DoSFilter.java:462)
at org.apache.nifi.web.server.filter.DataTransferExcludedDoSFilter.doFilterChain(DataTransferExcludedDoSFilter.java:51)
at org.eclipse.jetty.ee10.servlets.DoSFilter.doFilter(DoSFilter.java:317)
at org.eclipse.jetty.ee10.servlets.DoSFilter.doFilter(DoSFilter.java:282)
at org.eclipse.jetty.ee10.servlet.FilterHolder.doFilter(FilterHolder.java:205)
at org.eclipse.jetty.ee10.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1591)
at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90)
at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.eclipse.jetty.ee10.servlet.FilterHolder.doFilter(FilterHolder.java:205)
at org.eclipse.jetty.ee10.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1591)
at org.apache.nifi.web.server.log.RequestAuthenticationFilter.doFilterInternal(RequestAuthenticationFilter.java:59)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.eclipse.jetty.ee10.servlet.FilterHolder.doFilter(FilterHolder.java:205)
at org.eclipse.jetty.ee10.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1591)
at org.eclipse.jetty.ee10.servlet.ServletHandler$MappedServlet.handle(ServletHandler.java:1552)
at org.eclipse.jetty.ee10.servlet.ServletChannel.dispatch(ServletChannel.java:819)
at org.eclipse.jetty.ee10.servlet.ServletChannel.handle(ServletChannel.java:436)
at org.eclipse.jetty.ee10.servlet.ServletHandler.handle(ServletHandler.java:469)
at org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:575)
at org.eclipse.jetty.ee10.servlet.SessionHandler.handle(SessionHandler.java:717)
at org.eclipse.jetty.server.handler.ContextHandler.handle(ContextHandler.java:1060)
at org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:181)
at org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:181)
at org.eclipse.jetty.server.Server.handle(Server.java:182)
at org.eclipse.jetty.server.internal.HttpChannelState$HandlerInvoker.run(HttpChannelState.java:662)
at org.eclipse.jetty.util.thread.Invocable$ReadyTask.run(Invocable.java:175)
at org.eclipse.jetty.http2.server.internal.HttpStreamOverHTTP2$1.run(HttpStreamOverHTTP2.java:135)
at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.runTask(AdaptiveExecutionStrategy.java:480)
at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.consumeTask(AdaptiveExecutionStrategy.java:443)
at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:293)
at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:195)
at org.eclipse.jetty.http2.HTTP2Connection.produce(HTTP2Connection.java:209)
at org.eclipse.jetty.http2.HTTP2Connection.onFillable(HTTP2Connection.java:156)
at org.eclipse.jetty.http2.HTTP2Connection$FillableCallback.succeeded(HTTP2Connection.java:442)
at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:99)
at org.eclipse.jetty.io.ssl.SslConnection$SslEndPoint.onFillable(SslConnection.java:575)
at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:390)
at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:150)
at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:99)
at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.runTask(AdaptiveExecutionStrategy.java:480)
at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.consumeTask(AdaptiveExecutionStrategy.java:443)
at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:293)
at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.run(AdaptiveExecutionStrategy.java:201)
at org.eclipse.jetty.util.thread.ReservedThreadExecutor$ReservedThread.run(ReservedThreadExecutor.java:311)
at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:979)
at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1209)
at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1164)
at java.base/java.lang.Thread.run(Thread.java:1447)
Caused by: com.fasterxml.jackson.core.JsonParseException: Unrecognized token 'Authentication': was expecting (JSON String, Number, Array, Object or token 'null', 'true' or 'false')
at [Source: REDACTED (`StreamReadFeature.INCLUDE_SOURCE_IN_LOCATION` disabled); line: 1, column: 16]
at com.fasterxml.jackson.core.JsonParser._constructError(JsonParser.java:2584)
at com.fasterxml.jackson.core.JsonParser._constructReadException(JsonParser.java:2610)
at com.fasterxml.jackson.core.JsonParser._constructReadException(JsonParser.java:2618)
at com.fasterxml.jackson.core.base.ParserMinimalBase._reportError(ParserMinimalBase.java:825)
at com.fasterxml.jackson.core.json.UTF8StreamJsonParser._reportInvalidToken(UTF8StreamJsonParser.java:3662)
at com.fasterxml.jackson.core.json.UTF8StreamJsonParser._handleUnexpectedValue(UTF8StreamJsonParser.java:2749)
at com.fasterxml.jackson.core.json.UTF8StreamJsonParser._nextTokenNotInObject(UTF8StreamJsonParser.java:867)
at com.fasterxml.jackson.core.json.UTF8StreamJsonParser.nextToken(UTF8StreamJsonParser.java:753)
at com.fasterxml.jackson.databind.ObjectMapper._initForReading(ObjectMapper.java:5004)
at com.fasterxml.jackson.databind.ObjectMapper._readMapAndClose(ObjectMapper.java:4910)
at com.fasterxml.jackson.databind.ObjectMapper.readValue(ObjectMapper.java:3921)
at org.apache.nifi.web.api.FlowResource.readReplicatedCurrentUserEntity(FlowResource.java:451)
... 132 common frames omitted&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nifi.properties file:-&lt;/P&gt;&lt;LI-CODE lang="java"&gt;# Licensed to the Apache Software Foundation (ASF) under one or more
# contributor license agreements.  See the NOTICE file distributed with
# this work for additional information regarding copyright ownership.
# The ASF licenses this file to You under the Apache License, Version 2.0
# (the "License"); you may not use this file except in compliance with
# the License.  You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

# Core Properties #
nifi.flow.configuration.file=./conf/flow.json.gz
nifi.flow.configuration.archive.enabled=true
nifi.flow.configuration.archive.dir=./conf/archive/
nifi.flow.configuration.archive.max.time=10 days
nifi.flow.configuration.archive.max.storage=500 MB
nifi.flow.configuration.archive.max.count=
nifi.flowcontroller.autoResumeState=true
nifi.flowcontroller.graceful.shutdown.period=20 secs
nifi.flowservice.writedelay.interval=500 ms
nifi.administrative.yield.duration=30 sec
# If a component has no work to do (is "bored"), how long should we wait before checking again for work?
nifi.bored.yield.duration=10 millis
nifi.queue.backpressure.count=10000
nifi.queue.backpressure.size=1 GB

nifi.authorizer.configuration.file=./conf/authorizers.xml
nifi.login.identity.provider.configuration.file=./conf/login-identity-providers.xml
nifi.ui.banner.text=
nifi.nar.library.directory=./lib
nifi.nar.library.autoload.directory=./extensions
nifi.nar.working.directory=./work/nar/
nifi.nar.unpack.uber.jar=false
nifi.upload.working.directory=./work/uploads

#####################
# Python Extensions #
#####################
# Uncomment in order to enable Python Extensions.
#nifi.python.command=python3
nifi.python.framework.source.directory=./python/framework
nifi.python.extensions.source.directory.default=./python/extensions
nifi.python.working.directory=./work/python
nifi.python.max.processes=100
nifi.python.max.processes.per.extension.type=10

####################
# State Management #
####################
nifi.state.management.configuration.file=./conf/state-management.xml
# The ID of the local state provider
nifi.state.management.provider.local=local-provider
# The ID of the cluster-wide state provider. This will be ignored if NiFi is not clustered but must be populated if running in a cluster.
nifi.state.management.provider.cluster=zk-provider
# The Previous Cluster State Provider from which the framework will load Cluster State when the current Cluster Provider has no entries
nifi.state.management.provider.cluster.previous=
# Specifies whether or not this instance of NiFi should run an embedded ZooKeeper server
nifi.state.management.embedded.zookeeper.start=false
# Properties file that provides the ZooKeeper properties to use if &amp;lt;nifi.state.management.embedded.zookeeper.start&amp;gt; is set to true
nifi.state.management.embedded.zookeeper.properties=./conf/zookeeper.properties

# Database Settings
nifi.database.directory=./database_repository

# FlowFile Repository
nifi.flowfile.repository.implementation=org.apache.nifi.controller.repository.WriteAheadFlowFileRepository
nifi.flowfile.repository.wal.implementation=org.apache.nifi.wali.SequentialAccessWriteAheadLog
nifi.flowfile.repository.directory=./flowfile_repository
nifi.flowfile.repository.checkpoint.interval=20 secs
nifi.flowfile.repository.always.sync=false
nifi.flowfile.repository.retain.orphaned.flowfiles=false

nifi.swap.manager.implementation=org.apache.nifi.controller.FileSystemSwapManager
nifi.queue.swap.threshold=20000

# Content Repository
nifi.content.repository.implementation=org.apache.nifi.controller.repository.FileSystemRepository
nifi.content.claim.max.appendable.size=50 KB
nifi.content.repository.directory.default=./content_repository
nifi.content.repository.archive.max.retention.period=1 hours
nifi.content.repository.archive.max.usage.percentage=70%
nifi.content.repository.archive.enabled=true
nifi.content.repository.always.sync=false

# Provenance Repository Properties
nifi.provenance.repository.implementation=org.apache.nifi.provenance.VolatileProvenanceRepository

# Persistent Provenance Repository Properties
nifi.provenance.repository.directory.default=./provenance_repository
nifi.provenance.repository.max.storage.time=30 days
nifi.provenance.repository.max.storage.size=100 MB
nifi.provenance.repository.rollover.time=30 secs
nifi.provenance.repository.rollover.size=100 MB
nifi.provenance.repository.query.threads=2
nifi.provenance.repository.index.threads=2
nifi.provenance.repository.compress.on.rollover=true
nifi.provenance.repository.always.sync=false
# Comma-separated list of fields. Fields that are not indexed will not be searchable. Valid fields are:
# EventType, FlowFileUUID, Filename, TransitURI, ProcessorID, AlternateIdentifierURI, Relationship, Details
nifi.provenance.repository.indexed.fields=EventType, FlowFileUUID, Filename, ProcessorID, Relationship
# FlowFile Attributes that should be indexed and made searchable.  Some examples to consider are filename, uuid, mime.type
nifi.provenance.repository.indexed.attributes=
# Large values for the shard size will result in more Java heap usage when searching the Provenance Repository
# but should provide better performance
nifi.provenance.repository.index.shard.size=500 MB
# Indicates the maximum length that a FlowFile attribute can be when retrieving a Provenance Event from
# the repository. If the length of any attribute exceeds this value, it will be truncated when the event is retrieved.
nifi.provenance.repository.max.attribute.length=65536
nifi.provenance.repository.concurrent.merge.threads=2


# Volatile Provenance Respository Properties
nifi.provenance.repository.buffer.size=100000

# Component and Node Status History Repository
nifi.components.status.repository.implementation=org.apache.nifi.controller.status.history.VolatileComponentStatusRepository

# Volatile Status History Repository Properties
nifi.components.status.repository.buffer.size=1440
nifi.components.status.snapshot.frequency=1 min

# QuestDB Status History Repository Properties
nifi.status.repository.questdb.persist.node.days=14
nifi.status.repository.questdb.persist.component.days=3
nifi.status.repository.questdb.persist.location=./status_repository

# NAR Persistence Properties
nifi.nar.persistence.provider.implementation=org.apache.nifi.nar.StandardNarPersistenceProvider
nifi.nar.persistence.provider.properties.directory=./nar_repository

# Asset Management
nifi.asset.manager.implementation=org.apache.nifi.asset.StandardAssetManager
nifi.asset.manager.properties.directory=./assets

# Site to Site properties
nifi.remote.input.host=172.24.0.3
nifi.remote.input.secure=true
nifi.remote.input.socket.port=10000
nifi.remote.input.http.enabled=false
nifi.remote.input.http.transaction.ttl=30 sec
nifi.remote.contents.cache.expiration=30 secs

nifi.web.http.host=
nifi.web.http.port=
nifi.web.http.network.interface.default=

#############################################

nifi.web.https.host=172.24.0.3
nifi.web.https.port=8443
nifi.web.https.network.interface.default=
nifi.web.https.application.protocols=h2 http/1.1
nifi.web.jetty.working.directory=./work/jetty
nifi.web.jetty.threads=200
nifi.web.max.header.size=16 KB
nifi.web.proxy.context.path=
nifi.web.proxy.host=
nifi.web.max.content.size=
nifi.web.max.requests.per.second=30000
nifi.web.max.access.token.requests.per.second=25
nifi.web.request.timeout=60 secs
nifi.web.request.ip.whitelist=
nifi.web.should.send.server.version=true
nifi.web.request.log.format=%{client}a - %u %t "%r" %s %O "%{Referer}i" "%{User-Agent}i"

# Filter JMX MBeans available through the System Diagnostics REST API
nifi.web.jmx.metrics.allowed.filter.pattern=

# Include or Exclude TLS Cipher Suites for HTTPS
nifi.web.https.ciphersuites.include=
nifi.web.https.ciphersuites.exclude=

# security properties #
nifi.sensitive.props.key=/02b3ljnw7Lh/Yq5NMrChoib6xdgv1Y1
nifi.sensitive.props.algorithm=NIFI_PBKDF2_AES_GCM_256

nifi.security.autoreload.enabled=false
nifi.security.autoreload.interval=10 secs
nifi.security.keystore=/opt/nifi-2.1.0/certs/nifi_keystore.p12
nifi.security.keystore.certificate=
nifi.security.keystore.privateKey=
nifi.security.keystoreType=PKCS12
nifi.security.keystorePasswd=065ad6b41cf772b6a47f96cff82698f6
nifi.security.keyPasswd=065ad6b41cf772b6a47f96cff82698f6
nifi.security.truststore=/opt/nifi-2.1.0/certs/nifi_truststore.p12
nifi.security.truststore.certificate=
nifi.security.truststoreType=PKCS12
nifi.security.truststorePasswd=61cac7c7fff3ab70e3fe4365192cd966

nifi.security.user.authorizer=managed-authorizer
nifi.security.allow.anonymous.authentication=false
nifi.security.user.login.identity.provider=oidc-provider
nifi.security.user.jws.key.rotation.period=PT1H
nifi.security.ocsp.responder.url=
nifi.security.ocsp.responder.certificate=

# OpenId Connect SSO Properties #
nifi.security.user.oidc.discovery.url=https://login.microsoftonline.com/XXXXXXXXXXXXXXXXXXXXXXX/v2.0/.well-known/openid-configuration
nifi.security.user.oidc.connect.timeout=10 secs
nifi.security.user.oidc.read.timeout=10 secs
nifi.security.user.oidc.client.id=XXXXXXXXXXXXXXXX
nifi.security.user.oidc.client.secret=XXXXXXXXXXXXXXXXXXXXX
nifi.security.user.oidc.preferred.jwsalgorithm=
nifi.security.user.oidc.additional.scopes=profile
nifi.security.user.oidc.claim.identifying.user=email
nifi.security.user.oidc.fallback.claims.identifying.user=upn
nifi.security.user.oidc.claim.groups=groups
nifi.security.user.oidc.truststore.strategy=JDK
nifi.security.user.oidc.token.refresh.window=60 secs

# SAML Properties #
nifi.security.user.saml.idp.metadata.url=
nifi.security.user.saml.sp.entity.id=
nifi.security.user.saml.identity.attribute.name=
nifi.security.user.saml.group.attribute.name=
nifi.security.user.saml.request.signing.enabled=false
nifi.security.user.saml.want.assertions.signed=true
nifi.security.user.saml.signature.algorithm=http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
nifi.security.user.saml.authentication.expiration=12 hours
nifi.security.user.saml.single.logout.enabled=false
nifi.security.user.saml.http.client.truststore.strategy=JDK
nifi.security.user.saml.http.client.connect.timeout=30 secs
nifi.security.user.saml.http.client.read.timeout=30 secs


nifi.cluster.protocol.heartbeat.interval=5 sec
nifi.cluster.protocol.heartbeat.missable.max=8
nifi.cluster.protocol.is.secure=true

# cluster node properties (only configure for cluster nodes) #
nifi.cluster.is.node=true
nifi.cluster.leader.election.implementation=CuratorLeaderElectionManager
nifi.cluster.node.address=172.24.0.3
nifi.cluster.node.protocol.port=8082
nifi.cluster.node.protocol.max.threads=50
nifi.cluster.node.event.history.size=25
nifi.cluster.node.connection.timeout=60 secs
nifi.cluster.node.read.timeout=60 secs
nifi.cluster.node.max.concurrent.requests=100
nifi.cluster.firewall.file=
nifi.cluster.flow.election.max.wait.time=1 mins
nifi.cluster.flow.election.max.candidates=1

# cluster load balancing properties #
nifi.cluster.load.balance.host=172.24.0.3
nifi.cluster.load.balance.port=6342
nifi.cluster.load.balance.connections.per.node=1
nifi.cluster.load.balance.max.thread.count=8
nifi.cluster.load.balance.comms.timeout=30 sec

# zookeeper properties, used for cluster management #
nifi.zookeeper.connect.string=zookeeper:2181
nifi.zookeeper.connect.timeout=30 secs
nifi.zookeeper.session.timeout=30 secs
nifi.zookeeper.root.node=/nifi
nifi.zookeeper.client.secure=false
nifi.zookeeper.security.keystore=
nifi.zookeeper.security.keystoreType=
nifi.zookeeper.security.keystorePasswd=
nifi.zookeeper.security.truststore=
nifi.zookeeper.security.truststoreType=
nifi.zookeeper.security.truststorePasswd=
nifi.zookeeper.jute.maxbuffer=

nifi.zookeeper.auth.type=
nifi.zookeeper.kerberos.removeHostFromPrincipal=
nifi.zookeeper.kerberos.removeRealmFromPrincipal=

# kerberos #
nifi.kerberos.krb5.file=/etc/krb5.conf

# kerberos service principal #
nifi.kerberos.service.principal=
nifi.kerberos.service.keytab.location=

# analytics properties #
nifi.analytics.predict.enabled=false
nifi.analytics.predict.interval=3 mins
nifi.analytics.query.interval=5 mins
nifi.analytics.connection.model.implementation=org.apache.nifi.controller.status.analytics.models.OrdinaryLeastSquares
nifi.analytics.connection.model.score.name=rSquared
nifi.analytics.connection.model.score.threshold=.90

# kubernetes #
nifi.cluster.leader.election.kubernetes.lease.prefix=

# flow analysis properties
nifi.registry.check.for.rule.violations.before.commit=

# runtime monitoring properties
nifi.monitor.long.running.task.schedule=
nifi.monitor.long.running.task.threshold=

# Enable automatic diagnostic at shutdown.
nifi.diagnostics.on.shutdown.enabled=false

# Include verbose diagnostic information.
nifi.diagnostics.on.shutdown.verbose=false

# The location of the diagnostics folder.
nifi.diagnostics.on.shutdown.directory=./diagnostics

# The maximum number of files permitted in the directory. If the limit is exceeded, the oldest files are deleted.
nifi.diagnostics.on.shutdown.max.filecount=10

# The diagnostics folder's maximum permitted size in bytes. If the limit is exceeded, the oldest files are deleted.
nifi.diagnostics.on.shutdown.max.directory.size=10 MB

nifi.performance.tracking.percentage=0&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 04:28:15 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399620#M250529</guid>
      <dc:creator>spiker</dc:creator>
      <dc:date>2025-01-06T04:28:15Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted proxy error Authentication Failed o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET https://172.24.0.3:8443/nifi-api/flow/current-user 2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399651#M250531</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/122979"&gt;@spiker&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;According to the below zk parameter you have set it to false meaning you are using external and not embedded zk is that the case?&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;# Specifies whether or not this instance of NiFi should run an embedded ZooKeeper server&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nifi.state.management.embedded.zookeeper.start=false&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;Yet the below zk config seems contradictory&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;# zookeeper properties, used for cluster management #&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nifi.zookeeper.connect.string=zookeeper:2181 # Zookeeper should resolve to correct host(s) for the Zookeeper ensemble&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;Check this documentation for setting &lt;A href="https://opstree.com/blog/2023/11/21/nifi-cluster-setup-with-external-zookeeper/" target="_self"&gt;external zookeepers&lt;/A&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;If you are using embedded zk the adjust the following entries in your nifi.properties&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nifi.state.management.embedded.zookeeper.start=true
nifi.zookeeper.connect.string=IP01:2181,IP02:2181,IP03:2181
nifi.zookeeper.auth.type=default
nifi.remote.input.host=IP01   # Localhost ip
nifi.remote.input.secure=false
nifi.remote.input.socket.port=9998
nifi.remote.input.http.enabled=true    # set true if you want http
nifi.cluster.is.node=true
nifi.cluster.node.address=IP01 # Localhost ip
nifi.cluster.node.protocol.port=7474
nifi.web.http.host=IP01   # Localhost ip. use either https or http
nifi.web.http.port=8443
nifi.cluster.load.balance.port=6342&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;zookeeper.properties&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;This file contains additional info to be used by zookeeper to know about the servers.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;server.1=IP01:2888:3888
server.2=IP02:2888:3888
server.3=IP03:2888:3888
clientPort=2181&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;In order to maintain the nifi state across instances,you need to modify the state-management.xml and provide a new state provider pointing to zookeeper.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;cluster-provider&amp;gt;
&amp;lt;id&amp;gt;zk-provider&amp;lt;/id&amp;gt; &amp;lt;class&amp;gt;org.apache.nifi.controller.state.providers.zookeeper.ZooKeeperStateProvider&amp;lt;/class&amp;gt;
&amp;lt;property name="Connect String"&amp;gt;ip1:2181,ip2:2181,ip3:2181&amp;lt;/property&amp;gt;
&amp;lt;property name="Root Node"&amp;gt;/nifi&amp;lt;/property&amp;gt;
&amp;lt;property name="Session Timeout"&amp;gt;10 seconds&amp;lt;/property&amp;gt;
&amp;lt;property name="Access Control"&amp;gt;Open&amp;lt;/property&amp;gt;
&amp;lt;/cluster-provider&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;Here the Access Control has been set to &lt;STRONG&gt;open&lt;/STRONG&gt; to be able to login without an username/pass but you should configure your to use your &lt;STRONG&gt;oidc-provider &lt;/STRONG&gt;I would assume .&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;OpenId Connect SSO Properties&lt;/STRONG&gt;&amp;nbsp;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;Does the user email exist in the OIDC token and is accessible check the Azure AD and confirm the token contains the expected email and upn&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nifi.security.user.oidc.claim.identifying.user={email}
nifi.security.user.oidc.fallback.claims.identifying.user=upn&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;Can you ensure the OPENID discovery URL is reachable from the NiFi nodes and resolves correctly run the below curl to confirm connectivity&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;curl -v https://login.microsoftonline.com/XXXXXXXXXXXXXXXXXXXXXXX/v2.0/.well-known/openid-configuration&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Validate HTTPS and OIDC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;curl -vk https://&amp;lt;nifi-node&amp;gt;:8443/nifi-api/
curl -vk https://&amp;lt;nifi-node&amp;gt;:8443/nifi-api/access/oidc/callback&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;Clear Cache&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;Stop NiFi on all nodes and clear state directory ./conf/state-management.xml and restart the cluster&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;Hope that helps&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;Happy hadooping&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 08:32:25 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399651#M250531</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2025-01-06T08:32:25Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted proxy error Authentication Failed o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET https://172.24.0.3:8443/nifi-api/flow/current-user 2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399700#M250532</link>
      <description>&lt;P&gt;After extensive research on OIDC with NIFI and Azure, I have successfully implemented the solution. I hope this guide can help anyone facing similar challenges.&lt;/P&gt;&lt;P&gt;&lt;FONT color="#993300"&gt;This guide assumes that you already have the &lt;FONT color="#0000FF"&gt;&lt;U&gt;nifi_keystore.p12&lt;/U&gt;&lt;/FONT&gt; and &lt;FONT color="#0000FF"&gt;&lt;U&gt;nifi_truststore.p12&lt;/U&gt;&lt;/FONT&gt; files generated.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;First, enable NiFi with the SSL certificate and start NiFi in Cluster mode. you need to make NiFi aware of the each Node Identity. Hear is a step-by-step guide on how to obtain the identity of a particular node.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;step 1:-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="java"&gt;cat /path/to/nifi.properties | grep nifi.security.keystorePasswd&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;output -&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; nifi.security.keystorePasswd&lt;/SPAN&gt;&lt;SPAN&gt;=065ad6b41cf772b6a47f96cff82698f6&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;step2:-&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="java"&gt;keytool -list -v -keystore /path/to/nifi_keystore.p12 -storepass &amp;lt;storepassword&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;output:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Keystore type: PKCS12
Keystore provider: SUN

Your keystore contains 1 entry

Alias name: nifi
Creation date: Jan 6, 2025
Entry type: PrivateKeyEntry
Certificate chain length: 2
Certificate[1]:
Owner: CN=172.18.0.3, OU=NIFI, O=NIFI, L=HYD, ST=Some-State, C=IN
Issuer: CN=abc, O=Internet Widgits Pty Ltd, ST=Some-State, C=IN
Serial number: 18333f71cd8846ca98c118c6347784a2275bc72a
Valid from: Mon Jan 06 17:53:52 IST 2025 until: Thu May 21 17:53:52 IST 2026
Certificate fingerprints:
         SHA1: 9F:49:45:B5:B7:22:7E:FB:0C:E0:83:C2:B3:C3:CD:72:72:0A:6E:F9
         SHA256: 65:B6:BE:2B:7D:A9:79:12:E1:02:05:F3:52:04:08:14:79:76:13:96:C0:27:9E:33:C1:2D:6D:91:5F:2A:DD:70
Signature algorithm name: SHA256withRSA
Subject Public Key Algorithm: 2048-bit RSA key&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;check the &lt;STRONG&gt;owner&lt;/STRONG&gt; of the above output.&amp;nbsp;&lt;BR /&gt;you node identity is :- &lt;STRONG&gt;CN=172.18.0.3, OU=NIFI, O=NIFI, L=HYD, ST=Some-State, C=IN&lt;BR /&gt;It&lt;/STRONG&gt; should be exactly same as the above.&lt;BR /&gt;&lt;BR /&gt;Know It's time to configure &lt;STRONG&gt;authorizers.xml.&lt;BR /&gt;&lt;/STRONG&gt;In the authorizers.xml file, we will configure node identity awareness within the userGroupProvider and accessPolicyProvider.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;authorizers&amp;gt;
    &amp;lt;userGroupProvider&amp;gt;
        &amp;lt;identifier&amp;gt;file-user-group-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileUserGroupProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Users File"&amp;gt;./conf/users.xml&amp;lt;/property&amp;gt;
        &amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Initial User Identity 1"&amp;gt;CN=172.18.0.3, OU=NIFI, O=NIFI, L=HYD, ST=Some-State, C=IN&amp;lt;/property&amp;gt;
    &amp;lt;/userGroupProvider&amp;gt;

    &amp;lt;userGroupProvider&amp;gt;
        &amp;lt;identifier&amp;gt;aad-user-group-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.azure.AzureGraphUserGroupProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Refresh Delay"&amp;gt;5 mins&amp;lt;/property&amp;gt;
        &amp;lt;property name="Authority Endpoint"&amp;gt;${MICROSOFT_LOGIN_IDENTITY_PROVIDER_URL}&amp;lt;/property&amp;gt; 
        &amp;lt;property name="Directory ID"&amp;gt;${MICROSOFT_TENENT_ID}&amp;lt;/property&amp;gt;
        &amp;lt;property name="Application ID"&amp;gt;${MICROSOFT_APP_REGISTRATION_OBJECT_ID}&amp;lt;/property&amp;gt;
        &amp;lt;property name="Client Secret"&amp;gt;${MICROSOFT_APP_CLIENT_SECRET}&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Filter Prefix"&amp;gt;${MICROSOFT_GROUP_FILTER}&amp;lt;/property&amp;gt;
        &amp;lt;property name="Page Size"&amp;gt;100&amp;lt;/property&amp;gt;
    &amp;lt;/userGroupProvider&amp;gt;

    &amp;lt;userGroupProvider&amp;gt;
        &amp;lt;identifier&amp;gt;composite-configurable-user-group-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.CompositeConfigurableUserGroupProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Configurable User Group Provider"&amp;gt;file-user-group-provider&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Group Provider 1"&amp;gt;aad-user-group-provider&amp;lt;/property&amp;gt;
    &amp;lt;/userGroupProvider&amp;gt;

    &amp;lt;accessPolicyProvider&amp;gt;
        &amp;lt;identifier&amp;gt;file-access-policy-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAccessPolicyProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="User Group Provider"&amp;gt;composite-configurable-user-group-provider&amp;lt;/property&amp;gt;
        &amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;     
        &amp;lt;property name="Initial Admin Identity"&amp;gt;${INITIAL_ADMIN_IDENTITY_EMAIL}&amp;lt;/property&amp;gt;
        &amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Node Identity 1"&amp;gt;CN=172.18.0.3, OU=NIFI, O=NIFI, L=HYD, ST=Some-State, C=IN&amp;lt;/property&amp;gt;
    &amp;lt;/accessPolicyProvider&amp;gt;

    &amp;lt;authorizer&amp;gt;
        &amp;lt;identifier&amp;gt;managed-authorizer&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.StandardManagedAuthorizer&amp;lt;/class&amp;gt;
        &amp;lt;property name="Access Policy Provider"&amp;gt;file-access-policy-provider&amp;lt;/property&amp;gt;
    &amp;lt;/authorizer&amp;gt;
&amp;lt;/authorizers&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;userGroupProvider:-&lt;/P&gt;&lt;P&gt;Add you Node Identity in&amp;nbsp; the property&amp;nbsp; &lt;STRONG&gt;"Initial User Identity 1 "&lt;/STRONG&gt;.&lt;BR /&gt;&lt;SPAN&gt;similarly , you can add multiple Node Identity by adding &lt;STRONG&gt;"Initial User Identity 2",&amp;nbsp;"Initial User Identity 3" ...&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;userGroupProvider&amp;gt;
        &amp;lt;identifier&amp;gt;file-user-group-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileUserGroupProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Users File"&amp;gt;./conf/users.xml&amp;lt;/property&amp;gt;
        &amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Initial User Identity 1"&amp;gt;CN=172.18.0.3, OU=NIFI, O=NIFI, L=HYD, ST=Some-State, C=IN&amp;lt;/property&amp;gt;
    &amp;lt;/userGroupProvider&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;accessPolicyProvider:-&lt;BR /&gt;Similar to the above we are going to fill the same details in the property &lt;STRONG&gt;"Node Identity 1", "Node Identity 2", "Node Identity 3" ...&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;accessPolicyProvider&amp;gt;
        &amp;lt;identifier&amp;gt;file-access-policy-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAccessPolicyProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="User Group Provider"&amp;gt;composite-configurable-user-group-provider&amp;lt;/property&amp;gt;
        &amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;     
        &amp;lt;property name="Initial Admin Identity"&amp;gt;${INITIAL_ADMIN_IDENTITY_EMAIL}&amp;lt;/property&amp;gt;
        &amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Node Identity 1"&amp;gt;CN=172.18.0.3, OU=NIFI, O=NIFI, L=HYD, ST=Some-State, C=IN&amp;lt;/property&amp;gt;
    &amp;lt;/accessPolicyProvider&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;state-management.xml&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;?xml version="1.0" encoding="UTF-8" standalone="yes"?&amp;gt;
&amp;lt;stateManagement&amp;gt;
    &amp;lt;local-provider&amp;gt;
        &amp;lt;id&amp;gt;local-provider&amp;lt;/id&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.controller.state.providers.local.WriteAheadLocalStateProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Directory"&amp;gt;./state/local&amp;lt;/property&amp;gt;
        &amp;lt;property name="Always Sync"&amp;gt;false&amp;lt;/property&amp;gt;
        &amp;lt;property name="Partitions"&amp;gt;16&amp;lt;/property&amp;gt;
        &amp;lt;property name="Checkpoint Interval"&amp;gt;2 mins&amp;lt;/property&amp;gt;
    &amp;lt;/local-provider&amp;gt;
    &amp;lt;cluster-provider&amp;gt;
        &amp;lt;id&amp;gt;zk-provider&amp;lt;/id&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.controller.state.providers.zookeeper.ZooKeeperStateProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Connect String"&amp;gt;${ZOOKEEPER_CONNECTION_STRING}&amp;lt;/property&amp;gt;
        &amp;lt;property name="Root Node"&amp;gt;/nifi&amp;lt;/property&amp;gt;
        &amp;lt;property name="Session Timeout"&amp;gt;${ZOOKEEPER_SESSION_TIMEOUT}&amp;lt;/property&amp;gt;
        &amp;lt;property name="Access Control"&amp;gt;Open&amp;lt;/property&amp;gt;
    &amp;lt;/cluster-provider&amp;gt;
    &amp;lt;cluster-provider&amp;gt;
        &amp;lt;id&amp;gt;kubernetes-provider&amp;lt;/id&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.kubernetes.state.provider.KubernetesConfigMapStateProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="ConfigMap Name Prefix"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;/cluster-provider&amp;gt;
&amp;lt;/stateManagement&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nifi.properties :-&lt;/P&gt;&lt;P&gt;Important Properties that need to set in the &lt;STRONG&gt;nifi.properties&lt;/STRONG&gt; file ( OIDC ) :-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nifi.security.keystore=/path-to/nifi_keystore.p12
nifi.security.keystoreType=PKCS12
nifi.security.keystorePasswd=&amp;lt;keystore-password&amp;gt;
nifi.security.keyPasswd=&amp;lt;keystore-password&amp;gt;
nifi.security.truststore=/path-to/nifi_truststore.p12
nifi.security.truststoreType=PKCS12
nifi.security.truststorePasswd=&amp;lt;truststore-password&amp;gt;

nifi.security.user.authorizer=managed-authorizer
nifi.security.allow.anonymous.authentication=false
nifi.security.user.login.identity.provider=oidc-provider

nifi.security.user.oidc.discovery.url=https://login.microsoftonline.com/&amp;lt;tenant-id&amp;gt;/v2.0/.well-known/openid-configuration
nifi.security.user.oidc.connect.timeout=10 secs
nifi.security.user.oidc.read.timeout=10 secs
nifi.security.user.oidc.client.id=&amp;lt;client-id&amp;gt;
nifi.security.user.oidc.client.secret=&amp;lt;client-secret&amp;gt;
nifi.security.user.oidc.preferred.jwsalgorithm=
nifi.security.user.oidc.additional.scopes=profile
nifi.security.user.oidc.claim.identifying.user=email
nifi.security.user.oidc.fallback.claims.identifying.user=upn
nifi.security.user.oidc.claim.groups=groups
nifi.security.user.oidc.truststore.strategy=JDK
nifi.security.user.oidc.token.refresh.window=60 secs

nifi.security.identity.mapping.pattern.dn=&amp;lt;node-identity-pattern-regx&amp;gt;
# example nifi.security.identity.mapping.pattern.dn=CN=(.*?), OU=(.*?), O=(.*?), L=(.*?), ST=(.*?), C=(.*?)$
nifi.security.identity.mapping.value.dn=$1&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the end, I would like to thank&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/20288"&gt;@Shelton&lt;/a&gt;&amp;nbsp; and&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp; for helping me resolve this issue.&lt;BR /&gt;cheers!&lt;/P&gt;&lt;P&gt;spiker&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 16:09:17 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399700#M250532</guid>
      <dc:creator>spiker</dc:creator>
      <dc:date>2025-01-06T16:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted proxy error Authentication Failed o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed GET https://172.24.0.3:8443/nifi-api/flow/current-user 2025-01-02 10:29:05,173 WARN [NiFi Web Server-52] o.a.n.w.s.NiFiAuthenticationFilter Authentication Failed 172.24.0.3 GET https://172.24.0.3</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399701#M250533</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/20288"&gt;@Shelton&lt;/a&gt;&amp;nbsp;/ &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;, My NIFI is behind corporate proxy, because of that In production, NIFI is not able to hit the azure OIDC discovery url.&lt;BR /&gt;could you please help me on it ?&lt;BR /&gt;Thanks,&lt;/P&gt;&lt;P&gt;spiker&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 16:15:31 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Untrusted-proxy-error-Authentication-Failed-o-a-n-w-s/m-p/399701#M250533</guid>
      <dc:creator>spiker</dc:creator>
      <dc:date>2025-01-06T16:15:31Z</dc:date>
    </item>
  </channel>
</rss>

