<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question NiFi Authentication with LDAP Groups in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/NiFi-Authentication-with-LDAP-Groups/m-p/401100#M251070</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have setup NiFI 2.1.0, and am trying to figure out how to allow users in a NiFi Microsoft AD Group to authenticate to the GUI.&amp;nbsp; I have it setup so users can log in if I add their LDAP account.&amp;nbsp; But, I'd rather just have users in the group I created in AD be able to login instead of having to go in and add new users to NiFi each time.&lt;/P&gt;&lt;P&gt;Here are the configs I have setup for my authorizers.xml:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;    &amp;lt;userGroupProvider&amp;gt;
        &amp;lt;identifier&amp;gt;file-user-group-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileUserGroupProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Users File"&amp;gt;./conf/users.xml&amp;lt;/property&amp;gt;
        &amp;lt;property name="Initial User Identity 1"&amp;gt;ldapuser&amp;lt;/property&amp;gt;
    &amp;lt;/userGroupProvider&amp;gt;


    &amp;lt;userGroupProvider&amp;gt;
        &amp;lt;identifier&amp;gt;ldap-user-group-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.ldap.tenants.LdapUserGroupProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Authentication Strategy"&amp;gt;LDAPS&amp;lt;/property&amp;gt;

        &amp;lt;property name="Manager DN"&amp;gt;CN=NiFiUser,OU=Accounts,DC=my,DC=network,DC=com&amp;lt;/property&amp;gt;
        &amp;lt;property name="Manager Password"&amp;gt;PasswordHere&amp;lt;/property&amp;gt;

	&amp;lt;property name="TLS - Keystore"&amp;gt;./conf/keystore.p12&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Keystore Password"&amp;gt;KSPasswordHere&amp;lt;/property&amp;gt;
	&amp;lt;property name="TLS - Keystore Type"&amp;gt;PKCS12&amp;lt;/property&amp;gt;
	&amp;lt;property name="TLS - Truststore"&amp;gt;./conf/truststore.p12&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Truststore Password"&amp;gt;TSPasswordHere&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Truststore Type"&amp;gt;PKCS12&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Client Auth"&amp;gt;REQUIRED&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Protocol"&amp;gt;TLSv1.2&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Shutdown Gracefully"&amp;gt;&amp;lt;/property&amp;gt;

        &amp;lt;property name="Referral Strategy"&amp;gt;FOLLOW&amp;lt;/property&amp;gt;
        &amp;lt;property name="Connect Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;
        &amp;lt;property name="Read Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;

        &amp;lt;property name="Url"&amp;gt;ldaps://ldapserver.my.network.com:636&amp;lt;/property&amp;gt;
        &amp;lt;property name="Page Size"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Sync Interval"&amp;gt;30 mins&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Membership - Enforce Case Sensitivity"&amp;gt;false&amp;lt;/property&amp;gt;

        &amp;lt;property name="User Search Base"&amp;gt;DC=my,DC=network,DC=com&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Object Class"&amp;gt;person&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Search Scope"&amp;gt;SUBTREE&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Search Filter"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Identity Attribute"&amp;gt;sAMAccountName&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Group Name Attribute"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Group Name Attribute - Referenced Group Attribute"&amp;gt;&amp;lt;/property&amp;gt;

        &amp;lt;property name="Group Search Base"&amp;gt;OU=Groups,DC=my,DC=network,DC=com&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Object Class"&amp;gt;group&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Search Scope"&amp;gt;SUBTREE&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Search Filter"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Name Attribute"&amp;gt;sAMAccountName&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Member Attribute"&amp;gt;member&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Member Attribute - Referenced User Attribute"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;/userGroupProvider&amp;gt;


    &amp;lt;accessPolicyProvider&amp;gt;
        &amp;lt;identifier&amp;gt;file-access-policy-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAccessPolicyProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="User Group Provider"&amp;gt;file-user-group-provider&amp;lt;/property&amp;gt;
        &amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;
        &amp;lt;property name="Initial Admin Identity"&amp;gt;ldapuser&amp;lt;/property&amp;gt;
        &amp;lt;property name="Node Identity 1"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Node Group"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;/accessPolicyProvider&amp;gt;


    &amp;lt;authorizer&amp;gt;
        &amp;lt;identifier&amp;gt;managed-authorizer&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.StandardManagedAuthorizer&amp;lt;/class&amp;gt;
        &amp;lt;property name="Access Policy Provider"&amp;gt;file-access-policy-provider&amp;lt;/property&amp;gt;
    &amp;lt;/authorizer&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;I've also tried it with setting the "Group Member Attribute" to 'cn' with the same result.&lt;/P&gt;&lt;P&gt;Here is my login-identity-providers.xml as well:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;    &amp;lt;provider&amp;gt;
        &amp;lt;identifier&amp;gt;ldap-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.ldap.LdapProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Authentication Strategy"&amp;gt;LDAPS&amp;lt;/property&amp;gt;

        &amp;lt;property name="Manager DN"&amp;gt;CN=NiFiUser,OU=Accounts,DC=my,DC=network,DC=com&amp;lt;/property&amp;gt;
        &amp;lt;property name="Manager Password"&amp;gt;PasswordHere&amp;lt;/property&amp;gt;

	&amp;lt;property name="TLS - Keystore"&amp;gt;./conf/keystore.p12&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Keystore Password"&amp;gt;KSPasswordHere&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Keystore Type"&amp;gt;PKCS12&amp;lt;/property&amp;gt;
	&amp;lt;property name="TLS - Truststore"&amp;gt;./conf/truststore.p12&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Truststore Password"&amp;gt;TSPasswordHere&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Truststore Type"&amp;gt;PKCS12&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Client Auth"&amp;gt;REQUIRED&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Protocol"&amp;gt;TLSv1.2&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Shutdown Gracefully"&amp;gt;&amp;lt;/property&amp;gt;
        
        &amp;lt;property name="Referral Strategy"&amp;gt;FOLLOW&amp;lt;/property&amp;gt;
        &amp;lt;property name="Connect Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;
        &amp;lt;property name="Read Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;

        &amp;lt;property name="Url"&amp;gt;ldaps://ldapserver.my.network.com:636&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Search Base"&amp;gt;DC=my,DC=network,DC=com&amp;lt;/property&amp;gt;
	&amp;lt;property name="User Search Filter"&amp;gt;sAMAccountName={0}&amp;lt;/property&amp;gt;

        &amp;lt;property name="Identity Strategy"&amp;gt;USE_USERNAME&amp;lt;/property&amp;gt;
        &amp;lt;property name="Authentication Expiration"&amp;gt;12 hours&amp;lt;/property&amp;gt;
    &amp;lt;/provider&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;After I configure these I am not really sure what else I would need to do as the documentation doesn't provide much instruction on what to expect after configuring these.&amp;nbsp; Are the AD groups supposed to be automatically added to NiFi?&amp;nbsp; Or do I need to add the group to NiFi manually?&amp;nbsp; I tried manually adding to just to see but the account I was using to test still couldn't login.&lt;/P&gt;&lt;P&gt;Thanks in advance for helping!&lt;/P&gt;</description>
    <pubDate>Tue, 28 Jan 2025 18:13:54 GMT</pubDate>
    <dc:creator>mslnrd</dc:creator>
    <dc:date>2025-01-28T18:13:54Z</dc:date>
    <item>
      <title>NiFi Authentication with LDAP Groups</title>
      <link>https://community.cloudera.com/t5/Support-Questions/NiFi-Authentication-with-LDAP-Groups/m-p/401100#M251070</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have setup NiFI 2.1.0, and am trying to figure out how to allow users in a NiFi Microsoft AD Group to authenticate to the GUI.&amp;nbsp; I have it setup so users can log in if I add their LDAP account.&amp;nbsp; But, I'd rather just have users in the group I created in AD be able to login instead of having to go in and add new users to NiFi each time.&lt;/P&gt;&lt;P&gt;Here are the configs I have setup for my authorizers.xml:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;    &amp;lt;userGroupProvider&amp;gt;
        &amp;lt;identifier&amp;gt;file-user-group-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileUserGroupProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Users File"&amp;gt;./conf/users.xml&amp;lt;/property&amp;gt;
        &amp;lt;property name="Initial User Identity 1"&amp;gt;ldapuser&amp;lt;/property&amp;gt;
    &amp;lt;/userGroupProvider&amp;gt;


    &amp;lt;userGroupProvider&amp;gt;
        &amp;lt;identifier&amp;gt;ldap-user-group-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.ldap.tenants.LdapUserGroupProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Authentication Strategy"&amp;gt;LDAPS&amp;lt;/property&amp;gt;

        &amp;lt;property name="Manager DN"&amp;gt;CN=NiFiUser,OU=Accounts,DC=my,DC=network,DC=com&amp;lt;/property&amp;gt;
        &amp;lt;property name="Manager Password"&amp;gt;PasswordHere&amp;lt;/property&amp;gt;

	&amp;lt;property name="TLS - Keystore"&amp;gt;./conf/keystore.p12&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Keystore Password"&amp;gt;KSPasswordHere&amp;lt;/property&amp;gt;
	&amp;lt;property name="TLS - Keystore Type"&amp;gt;PKCS12&amp;lt;/property&amp;gt;
	&amp;lt;property name="TLS - Truststore"&amp;gt;./conf/truststore.p12&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Truststore Password"&amp;gt;TSPasswordHere&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Truststore Type"&amp;gt;PKCS12&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Client Auth"&amp;gt;REQUIRED&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Protocol"&amp;gt;TLSv1.2&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Shutdown Gracefully"&amp;gt;&amp;lt;/property&amp;gt;

        &amp;lt;property name="Referral Strategy"&amp;gt;FOLLOW&amp;lt;/property&amp;gt;
        &amp;lt;property name="Connect Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;
        &amp;lt;property name="Read Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;

        &amp;lt;property name="Url"&amp;gt;ldaps://ldapserver.my.network.com:636&amp;lt;/property&amp;gt;
        &amp;lt;property name="Page Size"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Sync Interval"&amp;gt;30 mins&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Membership - Enforce Case Sensitivity"&amp;gt;false&amp;lt;/property&amp;gt;

        &amp;lt;property name="User Search Base"&amp;gt;DC=my,DC=network,DC=com&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Object Class"&amp;gt;person&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Search Scope"&amp;gt;SUBTREE&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Search Filter"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Identity Attribute"&amp;gt;sAMAccountName&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Group Name Attribute"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Group Name Attribute - Referenced Group Attribute"&amp;gt;&amp;lt;/property&amp;gt;

        &amp;lt;property name="Group Search Base"&amp;gt;OU=Groups,DC=my,DC=network,DC=com&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Object Class"&amp;gt;group&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Search Scope"&amp;gt;SUBTREE&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Search Filter"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Name Attribute"&amp;gt;sAMAccountName&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Member Attribute"&amp;gt;member&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Member Attribute - Referenced User Attribute"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;/userGroupProvider&amp;gt;


    &amp;lt;accessPolicyProvider&amp;gt;
        &amp;lt;identifier&amp;gt;file-access-policy-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAccessPolicyProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="User Group Provider"&amp;gt;file-user-group-provider&amp;lt;/property&amp;gt;
        &amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;
        &amp;lt;property name="Initial Admin Identity"&amp;gt;ldapuser&amp;lt;/property&amp;gt;
        &amp;lt;property name="Node Identity 1"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Node Group"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;/accessPolicyProvider&amp;gt;


    &amp;lt;authorizer&amp;gt;
        &amp;lt;identifier&amp;gt;managed-authorizer&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.StandardManagedAuthorizer&amp;lt;/class&amp;gt;
        &amp;lt;property name="Access Policy Provider"&amp;gt;file-access-policy-provider&amp;lt;/property&amp;gt;
    &amp;lt;/authorizer&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;I've also tried it with setting the "Group Member Attribute" to 'cn' with the same result.&lt;/P&gt;&lt;P&gt;Here is my login-identity-providers.xml as well:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;    &amp;lt;provider&amp;gt;
        &amp;lt;identifier&amp;gt;ldap-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.ldap.LdapProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Authentication Strategy"&amp;gt;LDAPS&amp;lt;/property&amp;gt;

        &amp;lt;property name="Manager DN"&amp;gt;CN=NiFiUser,OU=Accounts,DC=my,DC=network,DC=com&amp;lt;/property&amp;gt;
        &amp;lt;property name="Manager Password"&amp;gt;PasswordHere&amp;lt;/property&amp;gt;

	&amp;lt;property name="TLS - Keystore"&amp;gt;./conf/keystore.p12&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Keystore Password"&amp;gt;KSPasswordHere&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Keystore Type"&amp;gt;PKCS12&amp;lt;/property&amp;gt;
	&amp;lt;property name="TLS - Truststore"&amp;gt;./conf/truststore.p12&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Truststore Password"&amp;gt;TSPasswordHere&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Truststore Type"&amp;gt;PKCS12&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Client Auth"&amp;gt;REQUIRED&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Protocol"&amp;gt;TLSv1.2&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Shutdown Gracefully"&amp;gt;&amp;lt;/property&amp;gt;
        
        &amp;lt;property name="Referral Strategy"&amp;gt;FOLLOW&amp;lt;/property&amp;gt;
        &amp;lt;property name="Connect Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;
        &amp;lt;property name="Read Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;

        &amp;lt;property name="Url"&amp;gt;ldaps://ldapserver.my.network.com:636&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Search Base"&amp;gt;DC=my,DC=network,DC=com&amp;lt;/property&amp;gt;
	&amp;lt;property name="User Search Filter"&amp;gt;sAMAccountName={0}&amp;lt;/property&amp;gt;

        &amp;lt;property name="Identity Strategy"&amp;gt;USE_USERNAME&amp;lt;/property&amp;gt;
        &amp;lt;property name="Authentication Expiration"&amp;gt;12 hours&amp;lt;/property&amp;gt;
    &amp;lt;/provider&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;After I configure these I am not really sure what else I would need to do as the documentation doesn't provide much instruction on what to expect after configuring these.&amp;nbsp; Are the AD groups supposed to be automatically added to NiFi?&amp;nbsp; Or do I need to add the group to NiFi manually?&amp;nbsp; I tried manually adding to just to see but the account I was using to test still couldn't login.&lt;/P&gt;&lt;P&gt;Thanks in advance for helping!&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2025 18:13:54 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/NiFi-Authentication-with-LDAP-Groups/m-p/401100#M251070</guid>
      <dc:creator>mslnrd</dc:creator>
      <dc:date>2025-01-28T18:13:54Z</dc:date>
    </item>
    <item>
      <title>Re: NiFi Authentication with LDAP Groups</title>
      <link>https://community.cloudera.com/t5/Support-Questions/NiFi-Authentication-with-LDAP-Groups/m-p/401121#M251077</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/106307"&gt;@mslnrd&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Authentication and authorization are two separate configurations.&amp;nbsp; A user must successfully authenticate before any authorization is checked.&lt;BR /&gt;&lt;BR /&gt;So from your description, you are getting the NiFi login in window and successfully authenticating using your AD sAMAccountName and password.&amp;nbsp; This means that the case sensitive username you entered at login is being passed on for authorization handled by the configured authorizer in the authorizers.xml.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The authorizers.xml is easiest to read from the bottom up starting with the authorizer.&lt;BR /&gt;Looking at what you shared, we see the "managed-authorizer" being used which has a dependency on the "file-access-policy-provider" (which persists all the configured authorizations in the authorizations.xml file).&amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Now looking at the "file-access-policy-provider", we see it has a dependency on the "file-user-group-provider" for understanding what groups an authenticated user belongs to.&lt;BR /&gt;&lt;BR /&gt;If we then look at the "file-user-group-provider", it simply allows you to manually define new user identities and associated them with manually defined group identities.&amp;nbsp; Which from you query sounds like what you have been doing thus far.&lt;BR /&gt;&lt;BR /&gt;We can also see that you have added the "ldap-user-group-provider" to the authorizers.xml; however, from reading the file as i described above we can see no path of reference from authorizer to this ldap-user-group-provider.&amp;nbsp; That means the authorizers is not using any users and groups this provider may be returning.&lt;BR /&gt;&lt;BR /&gt;Now fixing this configuration issue has two possible paths.&lt;BR /&gt;&lt;BR /&gt;1. You can reconfigure the "file-access-policy-provider" to use the "ldap-user-group-provider"&amp;nbsp;&lt;BR /&gt;2. You can configure the "file-access-policy-provider" to use a "&lt;A href="https://nifi.apache.org/docs/nifi-docs/html/administration-guide.html#composite-implementations" target="_blank"&gt;Composite-configurable-user-group-provider&lt;/A&gt;" (which can be configured to get group info form multiple user-group-providers).&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Note:
You'll need to use the "Composite-configurable-user-group-provider" if using the configurable file-user-group-provider as one of the providers.  The file-user-group-provider can NOT be configured in the "Composite-user-group-provider"&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;Option 2 allows more flexibility because you can authorize server client auth certificates which are not typically in AD/LDAP.&amp;nbsp; Such as authorizing NiFi nodes to talk to one another in cluster or authorizing one NiFi to connect to another NiFi via NiFi Site-To-Site capability.&lt;BR /&gt;&lt;BR /&gt;With Option 2, you need to be aware that multiple user group providers can NOT return the same user or group identity string.&amp;nbsp; Since you have already added your users and groups manually via the file-user-group-provider, NiFi will error on startup complaining that multiple providers have returned the same identity.&amp;nbsp; So you will need to rename/remove the existing users.xml file and unset the "Initial User Identity 1" field in the file-user-group-provider only.&lt;/P&gt;&lt;P&gt;On Startup, NiFI will pull in user and groups via your ldap-user-group-provider configuration and you will still have the option to manually define additional non AD/LDAP user and group identities if needed via the NiFi UI.&lt;BR /&gt;&lt;BR /&gt;An example authorizers.xml setup of what is described above is found here in the NiFi Admin Guide:&lt;BR /&gt;&lt;A href="https://nifi.apache.org/docs/nifi-docs/html/administration-guide.html#composite-file-and-ldap-based-usersgroups" target="_blank"&gt;https://nifi.apache.org/docs/nifi-docs/html/administration-guide.html#composite-file-and-ldap-based-usersgroups&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Please help our community grow and thrive. If you found&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Accept as Solution&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;" on&amp;nbsp;&lt;STRONG&gt;one or more&lt;/STRONG&gt;&amp;nbsp;of them that helped.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;BR /&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 14:14:06 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/NiFi-Authentication-with-LDAP-Groups/m-p/401121#M251077</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2025-01-29T14:14:06Z</dc:date>
    </item>
    <item>
      <title>Re: NiFi Authentication with LDAP Groups</title>
      <link>https://community.cloudera.com/t5/Support-Questions/NiFi-Authentication-with-LDAP-Groups/m-p/401219#M251091</link>
      <description>&lt;P&gt;Thanks for the response! I went ahead and configured with option 2, and was able to get it working.&lt;/P&gt;&lt;P&gt;Thank you very much!&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2025 21:45:00 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/NiFi-Authentication-with-LDAP-Groups/m-p/401219#M251091</guid>
      <dc:creator>mslnrd</dc:creator>
      <dc:date>2025-01-30T21:45:00Z</dc:date>
    </item>
    <item>
      <title>Re: NiFi Authentication with LDAP Groups</title>
      <link>https://community.cloudera.com/t5/Support-Questions/NiFi-Authentication-with-LDAP-Groups/m-p/401247#M251095</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;While I am still on the topic, is there anywhere I can find what types of filters I can use in the "User Search Filter" or the Group one?&amp;nbsp; I am trying to widdle down the amount of objects that are populated from LDAP into my Users.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In my AD Server, users are in 2 different OU's.&amp;nbsp; So, for example, I'll have users in ou=Admin Accounts,ou=Domain Admins,dc=my,dc=network,dc=com but I'll also have users in ou=Regular Users,ou=Testers,dc=my,dc=network,dc=com.&amp;nbsp; And the only way to really pull both are to have my base search set to dc=my,dc=network,dc=com.&amp;nbsp; Doing this pulls computer accounts and all users, even users that would never need access (like service type accounts).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can filter out the computer accounts by using this filter:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(objectCategory=cn=Person,cn=Schema,cn=Configuration,dc=my,dc=network,dc=com)&lt;/LI-CODE&gt;&lt;P&gt;But I'd like to also filter out the accounts, or OU's that aren't needed.&amp;nbsp; Or, if possible just use the 2 NiFi groups I have in AD (Nifi Admins/Nifi Users) without having to populate all of my AD users, if that makes sense.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jan 2025 15:11:44 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/NiFi-Authentication-with-LDAP-Groups/m-p/401247#M251095</guid>
      <dc:creator>mslnrd</dc:creator>
      <dc:date>2025-01-31T15:11:44Z</dc:date>
    </item>
    <item>
      <title>Re: NiFi Authentication with LDAP Groups</title>
      <link>https://community.cloudera.com/t5/Support-Questions/NiFi-Authentication-with-LDAP-Groups/m-p/401254#M251096</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/106307"&gt;@mslnrd&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;While kind of related, to prevent confusing other community members, it would be better to start a new community question for this.&amp;nbsp; This question involves proper authorizers.xml configuration and the new question is specific to user-group-provider configuration.&amp;nbsp; Feel free to ping me in that new question so I get notified when it is created.&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jan 2025 16:27:45 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/NiFi-Authentication-with-LDAP-Groups/m-p/401254#M251096</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2025-01-31T16:27:45Z</dc:date>
    </item>
  </channel>
</rss>

