<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Securing Nifi with SSL and using OIDC provider for users authentication in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Securing-Nifi-with-SSL-and-using-OIDC-provider-for-users/m-p/403667#M252151</link>
    <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/124166"&gt;@pavanshettyg5&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;What version of Apache NiFi are you using?&lt;BR /&gt;&lt;BR /&gt;The NiFi screenshot you shared implies authentication was successful, but you are having some form of authorization issue.&amp;nbsp; The second screenshot you shared from the logs is not providing much useful information.&lt;BR /&gt;&lt;BR /&gt;What is observed in both the nifi-user.log and nifi-app.log when you attempt to access the NiFi UI?&lt;BR /&gt;&lt;BR /&gt;You mention that you are using&lt;SPAN&gt;&amp;nbsp;"OIDC provider".&amp;nbsp; So when you access NiFi are you getting to the login prompt where you provide your OIDC credentials?&lt;BR /&gt;&lt;BR /&gt;What is seen in the logs at this time and when you submit your credentials?&lt;BR /&gt;&lt;BR /&gt;Does your NiFi truststore contain the complete trust chain (all root and intermediate public certs used to sign the server certificate) for your OIDC endpoint?&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Please help our community grow and thrive. If you found&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Accept as Solution&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;" on&amp;nbsp;&lt;STRONG&gt;one or more&lt;/STRONG&gt;&amp;nbsp;of them that helped.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;BR /&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 06 Mar 2025 14:05:11 GMT</pubDate>
    <dc:creator>MattWho</dc:creator>
    <dc:date>2025-03-06T14:05:11Z</dc:date>
    <item>
      <title>Securing Nifi with SSL and using OIDC provider for users authentication</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Securing-Nifi-with-SSL-and-using-OIDC-provider-for-users/m-p/403429#M252066</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Need your help and suggestion here as i went through many of the Nifi related article here , since my use case is different need your valuable suggestion .&lt;/P&gt;&lt;P&gt;1. i want to know how to use SSL\TLS to have https mode for nifi url&amp;nbsp;&lt;BR /&gt;2. in our organization already we are generating signed certificate with SAN entries as&lt;BR /&gt;&lt;SPAN&gt;&lt;STRONG&gt;nifi-dev.x.x.net [domain we try to access via browser]&lt;/STRONG&gt;&lt;BR /&gt;nifinode1.x.x.net&lt;BR /&gt;nifinode2.x.x.net&lt;BR /&gt;nifinode3.x.x.net&lt;BR /&gt;zookeepernode1.x.x.net&lt;BR /&gt;zookeepernode2.x.x.net&lt;BR /&gt;zookeepernode3.x.x.net&lt;BR /&gt;post request raised we get a file nifi.crt file with this what else certificates are required\Needed?&lt;BR /&gt;&lt;/SPAN&gt;3. as trial basis tried already creating keystore and truststore but seems some issue&amp;nbsp;&lt;BR /&gt;4.&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image (2).png" style="width: 738px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/44149i01BE91F1D076B3D6/image-size/large?v=v2&amp;amp;px=999" role="button" title="image (2).png" alt="image (2).png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;5.&amp;nbsp;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.jpeg" style="width: 999px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/44150i6B4BE6008FE326A9/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.jpeg" alt="image.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Mar 2025 11:27:14 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Securing-Nifi-with-SSL-and-using-OIDC-provider-for-users/m-p/403429#M252066</guid>
      <dc:creator>pavanshettyg5</dc:creator>
      <dc:date>2025-03-03T11:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: Securing Nifi with SSL and using OIDC provider for users authentication</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Securing-Nifi-with-SSL-and-using-OIDC-provider-for-users/m-p/403640#M252139</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/124166"&gt;@pavanshettyg5&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;The TLS implementation for NiFi requires proper configuration of both keystore and truststore &lt;SPAN&gt;your organization's signed certificate with SAN entries&amp;nbsp;&lt;/SPAN&gt;to enable secure HTTPS access. Based on your description, you've received a signed certificate (&lt;STRONG&gt;nifi.crt&lt;/STRONG&gt;) but are experiencing issues with the complete TLS setup.&lt;BR /&gt;&amp;nbsp;&lt;STRONG&gt;Required Certificates &amp;amp; Files&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Certificate Authority (CA) Certificate: The root certificate from your signing authority&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Truststore&lt;/STRONG&gt;: Contains the Certificate Authority (CA) root/intermediate certificates that signed your NiFi certificate (for mutual TLS or cluster communication).&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Signed Certificate (nifi.crt): &lt;/STRONG&gt;Your domain certificate with the SAN entries&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Private Key: &lt;/STRONG&gt;The private key used to generate the CSR&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;1. Prepare Certificate Files&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="whitespace-pre-wrap break-words"&gt;Ensure you have:&lt;/P&gt;&lt;UL class=""&gt;&lt;LI&gt;The signed certificate (&lt;STRONG&gt;nifi.crt&lt;/STRONG&gt;)&lt;/LI&gt;&lt;LI&gt;Your private key&lt;/LI&gt;&lt;LI&gt;The CA certificate (request from your CA if not available)&lt;/LI&gt;&lt;/UL&gt;&lt;H4&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;Problem 1: Missing Private Key or Certificate Chain&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;If you only have&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;nifi.crt&lt;/STRONG&gt;, you&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;must&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;also have:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;private key&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(e.g.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;nifi.key&lt;/STRONG&gt;) generated during the CSR process.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;CA root/intermediate certificates&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(if your organization uses a private CA).&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H4&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;Problem 2: Improper Keystore/Truststore Format&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;NiFi uses Java KeyStores (JKS or PKCS12). Ensure your keystore/truststore is in the correct format.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;If your organization uses OpenSSL-based tools, convert the PEM files (&lt;STRONG&gt;nifi.crt&amp;nbsp;+&amp;nbsp;nifi.key&amp;nbsp;+ CA chain&lt;/STRONG&gt;) into a &lt;STRONG&gt;PKCS12/JKS&lt;/STRONG&gt; keystore.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H4&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;Problem 3: SAN Entries Not Recognized&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Verify the SAN entries in your certificate match the NiFi node hostnames (e.g.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;nifinode1.x.x.net).&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Use&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;openssl x509 -in nifi.crt -text -noout&amp;nbsp;&lt;/EM&gt;to check SANs.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;3. Step-by-Step Solution&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;&lt;H4&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;A. Prepare the Keystore&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Combine Certificate and Private Key&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;If you have&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;nifi.crt&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;nifi.key&lt;/STRONG&gt;, create a PKCS12 keystore:&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;LI-SPOILER&gt;openssl pkcs12 -export \&lt;BR /&gt;-in nifi.crt \&lt;BR /&gt;-inkey nifi.key \&lt;BR /&gt;-chain -CAfile ca_chain.crt \ # Include CA chain if needed&lt;BR /&gt;-name "nifi" \&lt;BR /&gt;-out nifi-keystore.p12&lt;BR /&gt;-password pass:keystorepassword&lt;/LI-SPOILER&gt;&lt;OL&gt;&lt;LI&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Use a password (e.g.,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;keystorePassword&lt;/STRONG&gt;).&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;STRONG&gt;2. Convert to JKS (if required)&amp;nbsp;Java Keystore from PKCS12&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;LI-SPOILER&gt;keytool -importkeystore \&lt;BR /&gt;-srckeystore nifi-keystore.p12 \&lt;BR /&gt;-srcstoretype PKCS12 \&lt;BR /&gt;-destkeystore nifi-keystore.jks \&lt;BR /&gt;-deststoretype JKS&lt;/LI-SPOILER&gt;&lt;H4&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;B. Prepare the Truststore&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Import CA Certificates&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;If your organization uses a private CA, add its root/intermediate certificates to the truststore&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;LI-SPOILER&gt;keytool -import -trustcacerts \&lt;BR /&gt;-alias ca-root \&lt;BR /&gt;-file ca_root.crt \&lt;BR /&gt;-keystore nifi-truststore.jks&lt;/LI-SPOILER&gt;&lt;H4&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;C. Configure NiFi&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Update&amp;nbsp;&lt;/STRONG&gt;nifi.properties&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;P&gt;# HTTPS Settings&lt;BR /&gt;nifi.web.https.host=0.0.0.0&lt;BR /&gt;nifi.web.https.port=9443&lt;BR /&gt;nifi.web.https.network.interface.default=&lt;/P&gt;&lt;P&gt;# Security Properties #&lt;BR /&gt;nifi.security.keystore=/path/to/keystore.jks nifi.security.keystoreType=JKS nifi.security.keystorePasswd=keystorepassword nifi.security.keyPasswd=keystorepassword nifi.security.truststore=/path/to/truststore.jks nifi.security.truststoreType=JKS nifi.security.truststorePasswd=truststorepassword&lt;/P&gt;&lt;P&gt;# Truststore (required for cluster nodes/ZooKeeper)&lt;BR /&gt;nifi.security.truststore=./nifi-truststore.jks&lt;BR /&gt;nifi.security.truststoreType=JKS&lt;BR /&gt;nifi.security.truststorePasswd=truststorePassword&lt;/P&gt;&lt;P&gt;# Enable TLS for cluster nodes&lt;BR /&gt;nifi.cluster.protocol.is.secure=true&lt;BR /&gt;nifi.web.http.port=&lt;BR /&gt;nifi.web.https.port=9443&lt;BR /&gt;nifi.zookeeper.connect.string=zookeepernode1.x.x.net:2181,zookeepernode2.x.x.net:2181,zookeepernode3.x.x.net:2181&lt;BR /&gt;nifi.zookeeper.client.secure=true&lt;/P&gt;&lt;/LI-SPOILER&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;STRONG&gt;2. Update&lt;/STRONG&gt;authorizers.xml&amp;nbsp;&lt;SPAN&gt;(for mutual TLS):&amp;nbsp;&lt;/SPAN&gt;&lt;FONT size="3"&gt;Configure for Cluster Communication&lt;/FONT&gt;&lt;/P&gt;&lt;P class="whitespace-pre-wrap break-words"&gt;Configure &lt;STRONG&gt;authorizers.xml &lt;/STRONG&gt;and &lt;STRONG&gt;nifi-registry.properties &lt;/STRONG&gt;for secure cluster communication using the same certificates.&lt;/P&gt;&lt;LI-SPOILER&gt;&amp;lt;property name="Initial Admin Identity"&amp;gt;CN=admin, OU=YourOrg&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Node Identity 1"&amp;gt;CN=nifinode1.x.x.net, OU=YourOrg&amp;lt;/property&amp;gt;&lt;/LI-SPOILER&gt;&lt;H4&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;D. Validate the Setup&lt;BR /&gt;&lt;/STRONG&gt;After configuration&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Test Keystore/Truststore&lt;/STRONG&gt;:&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;LI-SPOILER&gt;&lt;P&gt;&lt;FONT size="3"&gt;# Verify keystore contents&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;keytool -list -v -keystore keystore.jks -storepass keystorepassword&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;# Verify truststore contents&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;keytool -list -v -keystore truststore.jks -storepass truststorepassword&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;# Test SSL configuration&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;openssl s_client -connect nifi-dev.x.x.net:9443 -showcerts&lt;/FONT&gt;&lt;/P&gt;&lt;/LI-SPOILER&gt;&lt;H3&gt;&lt;FONT size="4"&gt;Troubleshooting Common Issues&lt;/FONT&gt;&lt;/H3&gt;&lt;OL class=""&gt;&lt;LI&gt;&lt;STRONG&gt;Certificate Chain Issues&lt;/STRONG&gt;: Ensure your keystore includes the full certificate chain&lt;DIV class="relative flex flex-col rounded-lg"&gt;&lt;DIV&gt;&lt;DIV class="prismjs code-block__code !my-0 !rounded-lg !text-sm !leading-relaxed"&gt;&lt;DIV&gt;&lt;LI-SPOILER&gt;# Concatenate certificates if needed&lt;BR /&gt;cat nifi.crt intermediate.crt root.crt &amp;gt; fullchain.crt&lt;/LI-SPOILER&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;SAN Validation&lt;/STRONG&gt;: Verify certificate has correct SAN entries&lt;DIV class="relative flex flex-col rounded-lg"&gt;&lt;DIV class="pointer-events-none sticky my-0.5 ml-0.5 flex items-center justify-end px-1.5 py-1 mix-blend-luminosity top-0"&gt;&lt;DIV class="from-bg-300/90 to-bg-300/70 pointer-events-auto rounded-md bg-gradient-to-b p-0.5 backdrop-blur-md"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;LI-SPOILER&gt;openssl x509 -in nifi.crt -text -noout | grep -A1 "Subject Alternative Name"&lt;/LI-SPOILER&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Java Compatibility&lt;/STRONG&gt;: Ensure Java version compatibility with TLS&lt;DIV class="relative flex flex-col rounded-lg"&gt;&lt;DIV class="pointer-events-none sticky my-0.5 ml-0.5 flex items-center justify-end px-1.5 py-1 mix-blend-luminosity top-0"&gt;&lt;DIV class="from-bg-300/90 to-bg-300/70 pointer-events-auto rounded-md bg-gradient-to-b p-0.5 backdrop-blur-md"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;LI-SPOILER&gt;# Add to bootstrap.conf if using older Java versions java.arg.16=-Dhttps.protocols=TLSv1.2&lt;/LI-SPOILER&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Cluster Communication&lt;/STRONG&gt;: Set proper node identities for cluster&lt;DIV class="relative flex flex-col rounded-lg"&gt;&lt;DIV class="pointer-events-none sticky my-0.5 ml-0.5 flex items-center justify-end px-1.5 py-1 mix-blend-luminosity top-0"&gt;&lt;DIV class="from-bg-300/90 to-bg-300/70 pointer-events-auto rounded-md bg-gradient-to-b p-0.5 backdrop-blur-md"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;LI-SPOILER&gt;# In nifi.properties&lt;BR /&gt;nifi.cluster.node.address=nifinode1.x.x.net&lt;BR /&gt;nifi.cluster.node.protocol.port=11443&lt;BR /&gt;nifi.remote.input.secure=true&lt;/LI-SPOILER&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;ZooKeeper Security&lt;/STRONG&gt;: Only if using secure ZooKeeper connections&lt;DIV class="relative flex flex-col rounded-lg"&gt;&lt;DIV class="pointer-events-none sticky my-0.5 ml-0.5 flex items-center justify-end px-1.5 py-1 mix-blend-luminosity top-0"&gt;&lt;DIV class="from-bg-300/90 to-bg-300/70 pointer-events-auto rounded-md bg-gradient-to-b p-0.5 backdrop-blur-md"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;LI-SPOILER&gt;# In zookeeper.properties&lt;BR /&gt;secureClientPort=2281 serverCnxnFactory=org.apache.zookeeper.server.NettyServerCnxnFactory ssl.keyStore.location=/path/to/keystore.jks ssl.keyStore.password=keystorepassword ssl.trustStore.location=/path/to/truststore.jks ssl.trustStore.password=truststorepassword&lt;/LI-SPOILER&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Verify HTTPS Access&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Access&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;A href="https://nifi-dev.x.x.net:9443/nifi" target="_blank" rel="noopener"&gt;https://nifi-dev.x.x.net:9443/nifi&lt;/A&gt;&lt;/EM&gt;&amp;nbsp;&lt;/STRONG&gt;in a browser.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Use&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;curl -vk &lt;A href="https://nifi-dev.x.x.net:9443/nifi" target="_blank" rel="noopener"&gt;https://nifi-dev.x.x.net:9443/nifi&lt;/A&gt;&lt;/STRONG&gt;&amp;nbsp;&lt;/EM&gt;to debug TLS handshake errors.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;H3&gt;&lt;FONT size="4"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;2. &lt;STRONG&gt;Troubleshooting&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;"SSL Peer Unauthenticated"&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Ensure the truststore contains the CA certificate that signed the NiFi certificate.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;"Certificate Doesn't Match Hostname"&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Verify SAN entries in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;nifi.crt&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;include all NiFi node hostnames.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Keystore Password Mismatch&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Ensure&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;nifi.security.keystorePasswd&amp;nbsp;&lt;/STRONG&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;nifi.security.keyPasswd&amp;nbsp;&lt;/STRONG&gt;match in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;nifi.properties&lt;/STRONG&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;&lt;FONT size="4"&gt;Additional Recommendations&lt;/FONT&gt;&lt;/H3&gt;&lt;OL class=""&gt;&lt;LI&gt;Use strong, unique passwords for keystores and truststores&lt;/LI&gt;&lt;LI&gt;Implement proper certificate rotation procedures&lt;/LI&gt;&lt;LI&gt;Consider automating certificate management with tools like cert-manager&lt;/LI&gt;&lt;LI&gt;Implement client certificate authentication for additional security&lt;/LI&gt;&lt;LI&gt;Ensure proper DNS resolution for all SAN entries&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;By following the above steps, you’ll enable HTTPS for NiFi with proper SAN support and resolve keystore/truststore issues&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;Happy hadooping&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2025 21:36:02 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Securing-Nifi-with-SSL-and-using-OIDC-provider-for-users/m-p/403640#M252139</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2025-03-05T21:36:02Z</dc:date>
    </item>
    <item>
      <title>Re: Securing Nifi with SSL and using OIDC provider for users authentication</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Securing-Nifi-with-SSL-and-using-OIDC-provider-for-users/m-p/403667#M252151</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/124166"&gt;@pavanshettyg5&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;What version of Apache NiFi are you using?&lt;BR /&gt;&lt;BR /&gt;The NiFi screenshot you shared implies authentication was successful, but you are having some form of authorization issue.&amp;nbsp; The second screenshot you shared from the logs is not providing much useful information.&lt;BR /&gt;&lt;BR /&gt;What is observed in both the nifi-user.log and nifi-app.log when you attempt to access the NiFi UI?&lt;BR /&gt;&lt;BR /&gt;You mention that you are using&lt;SPAN&gt;&amp;nbsp;"OIDC provider".&amp;nbsp; So when you access NiFi are you getting to the login prompt where you provide your OIDC credentials?&lt;BR /&gt;&lt;BR /&gt;What is seen in the logs at this time and when you submit your credentials?&lt;BR /&gt;&lt;BR /&gt;Does your NiFi truststore contain the complete trust chain (all root and intermediate public certs used to sign the server certificate) for your OIDC endpoint?&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Please help our community grow and thrive. If you found&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Accept as Solution&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;" on&amp;nbsp;&lt;STRONG&gt;one or more&lt;/STRONG&gt;&amp;nbsp;of them that helped.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;BR /&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2025 14:05:11 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Securing-Nifi-with-SSL-and-using-OIDC-provider-for-users/m-p/403667#M252151</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2025-03-06T14:05:11Z</dc:date>
    </item>
    <item>
      <title>Re: Securing Nifi with SSL and using OIDC provider for users authentication</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Securing-Nifi-with-SSL-and-using-OIDC-provider-for-users/m-p/403706#M252169</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/20288"&gt;@Shelton&lt;/a&gt;&amp;nbsp;Thanks so much for detailed information&lt;BR /&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp; thanks much for the reply and apologies for short info.&amp;nbsp;&lt;BR /&gt;based on above information was able to create SSL certificates and generate Keystore and trustore in jks format . initially i was not configured CA file into truststore so faced some issue&lt;BR /&gt;2. then i did not added nifi nodes entries as intial identity in autherizers.xml file so above issue occured . i followed cloudera blogs where you had informed&amp;nbsp;&lt;A href="https://community.cloudera.com/t5/Support-Questions/insufficient-permissions-untrusted-proxy/m-p/366443#M239582" target="_blank"&gt;https://community.cloudera.com/t5/Support-Questions/insufficient-permissions-untrusted-proxy/m-p/366443#M239582&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;based on these i was able to resolve and 3 node cluster with external zookeeper was able to up.&amp;nbsp;&lt;BR /&gt;i appreciate your kind help and your time here . much thanks to both &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 14:36:53 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Securing-Nifi-with-SSL-and-using-OIDC-provider-for-users/m-p/403706#M252169</guid>
      <dc:creator>pavanshettyg5</dc:creator>
      <dc:date>2025-03-07T14:36:53Z</dc:date>
    </item>
  </channel>
</rss>

