<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Cannot access the NiFi Registry from NiFi and view the buckets in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Cannot-access-the-NiFi-Registry-from-NiFi-and-view-the/m-p/412844#M253723</link>
    <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/135452"&gt;@casaui&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Your new issue is completely unrelated to your NiFi to NiFi-Registry MutualTLS authentication based issue in this community question.&amp;nbsp; I kindly ask that your start a new community question so that future users reading this question don't get confuse by multiple unrelated issues being discussed.&lt;BR /&gt;&lt;BR /&gt;If you found my assistance on this query helped you, please take a moment to click on "Accept as Solution" on the thread that helped guide you to resolution.&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;BR /&gt;Matt&lt;/P&gt;</description>
    <pubDate>Wed, 12 Nov 2025 16:39:57 GMT</pubDate>
    <dc:creator>MattWho</dc:creator>
    <dc:date>2025-11-12T16:39:57Z</dc:date>
    <item>
      <title>Cannot access the NiFi Registry from NiFi and view the buckets</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Cannot-access-the-NiFi-Registry-from-NiFi-and-view-the/m-p/412819#M253702</link>
      <description>&lt;P&gt;Hello dear community,&lt;/P&gt;&lt;P&gt;I haven’t been able to find a solution for the following setup:&lt;BR /&gt;I have Apache NiFi 2.5.0 and NiFi Registry 2.5.0 installed on the same EC2 instance (Linux 2023). Both NiFi and NiFi Registry are configured with SSL and served through an Application Load Balancer (ALB).&lt;BR /&gt;External access is only available via the ALB: &lt;A href="https://alb...com" target="_blank" rel="noopener"&gt;https://alb...com&lt;/A&gt;.&lt;BR /&gt;Internally, the services can be reached at:&lt;/P&gt;&lt;P&gt;NiFi: &lt;A href="https://nifi_ec2server.com:8443/nifi" target="_blank" rel="noopener"&gt;https://nifi_ec2server.com:8443/nifi&lt;/A&gt;&lt;/P&gt;&lt;P&gt;NiFi Registry: &lt;A href="https://nifi_ec2server.com:18443/nifi-registry" target="_blank" rel="noopener"&gt;https://nifi_ec2server.com:18443/nifi-registry&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Authentication is handled via Active Directory (LDAP).&lt;BR /&gt;Accessing NiFi through &lt;A href="https://alb.../nifi" target="_blank" rel="noopener"&gt;https://alb.../nifi&lt;/A&gt; works fine — I can log in as an LDAP user. The same applies to NiFi Registry under &lt;A href="https://alb.../nifi-registry" target="_blank" rel="noopener"&gt;https://alb.../nifi-registry&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;The problem:&lt;BR /&gt;As an LDAP user, I cannot access the NiFi Registry from within NiFi, and no buckets are displayed.&lt;BR /&gt;The error message is attached below.&lt;BR /&gt;[NiFi Registry Web Server-50] o.a.n.r.w.s.a.IdentityFilter Attempting to extract user credentials using X509IdentityProvider&lt;BR /&gt;[NiFi Registry Web Server-50] o.a.n.r.w.s.a.x.X509CertificateExtractor No client certificate found in request.&lt;BR /&gt;[NiFi Registry Web Server-50] o.a.n.r.w.s.a.IdentityFilter Attempting to extract user credentials using JwtIdentityProvider&lt;BR /&gt;[NiFi Registry Web Server-50] o.a.n.r.s.a.BearerAuthIdentityProvider HTTP Bearer Auth credentials not present. Not attempting to extract credentials for authentication.&lt;BR /&gt;[NiFi Registry Web Server-50] o.a.n.r.w.s.a.AnonymousIdentityFilter Set SecurityContextHolder to anonymous SecurityContext&lt;BR /&gt;[NiFi Registry Web Server-50] o.a.n.r.w.s.a.ResourceAuthorizationFilter Request filter authorization check is not required for this HTTP Method on this resource. Allowing request to proceed. An additional authorization check might be performed downstream of this filter.&lt;BR /&gt;[NiFi Registry Web Server-50] o.a.n.r.s.a.r.ProxyChainAuthorizable Requested resource is /buckets&lt;BR /&gt;[NiFi Registry Web Server-50] o.a.n.r.s.a.r.ProxyChainAuthorizable Requested resource is /buckets/edfb5073-e6ee-4d86-add6-5d0e9e803f10&lt;BR /&gt;[NiFi Registry Web Server-50] o.a.n.r.s.a.r.PublicCheckingAuthorizable Requested resource is /buckets/edfb5073-e6ee-4d86-add6-5d0e9e803f10&lt;BR /&gt;[NiFi Registry Web Server-50] o.a.n.r.s.a.r.PublicCheckingAuthorizable Delegating to inheriting authorizable for /buckets/edfb5073-e6ee-4d86-add6-5d0e9e803f10&lt;/P&gt;&lt;P&gt;NiFi Registry is configured as follows:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;!-- Authorizer.xml--&amp;gt;&lt;BR /&gt;&amp;lt;?xml version="1.0" encoding="UTF-8" standalone="yes"?&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;authorizers&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;userGroupProvider&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;ldap-user-group-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.registry.security.ldap.tenants.LdapUserGroupProvider&amp;lt;/class&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;property name="Authentication Strategy"&amp;gt;SIMPLE&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Manager DN"&amp;gt;CN=LDAPUSER1234,OU=Service Users,OU=User Accounts,DC=corp1,DC=ad1,DC=xyz,DC=net&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Manager Password"&amp;gt;secret&amp;lt;/property&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;property name="Referral Strategy"&amp;gt;FOLLOW&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Connect Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Read Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Url"&amp;gt;ldaps://ldapserver.com:636&amp;lt;/property&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;property name="User Search Base"&amp;gt;OU=User Accounts,DC=corp1,DC=ad1,DC=xyz,DC=net&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Search Scope"&amp;gt;SUBTREE&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Object Class"&amp;gt;user&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Search Filter"&amp;gt;(&amp;amp;amp;(objectClass=user)(sAMAccountName=*))&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User From Name Filter"&amp;gt;(&amp;amp;amp;(objectClass=user)(sAMAccountName={0}))&amp;lt;/property&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;property name="Group Search Base"&amp;gt;OU=Groups,OU=User Accounts,DC=corp1,DC=ad1,DC=xyz,DC=net&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Object Class"&amp;gt;group&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Search Scope"&amp;gt;SUBTREE&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Member Attribute"&amp;gt;member&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Group Name Attribute"&amp;gt;cn&amp;lt;/property&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;property name="Group Search Filter"&amp;gt;(&amp;amp;amp;(objectClass=group)(member={0}))&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Group Name Attribute - Referenced User Attribute"&amp;gt;distinguishedName&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Sync Interval"&amp;gt;30 mins&amp;lt;/property&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;property name="Group Membership Searching"&amp;gt;limited&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Max Group Membership Search Level"&amp;gt;1&amp;lt;/property&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;property name="GUID Attribute"&amp;gt;objectGUID&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Authentication Expiration"&amp;gt;12 hours&amp;lt;/property&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;/userGroupProvider&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;accessPolicyProvider&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;file-access-policy-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.registry.security.authorization.file.FileAccessPolicyProvider&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Group Provider"&amp;gt;ldap-user-group-provider&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Users File"&amp;gt;./conf/users.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Initial Admin Identity"&amp;gt;CN=ldap_employee,OU=User Accounts,DC=corp1,DC=ad1,DC=xyz,DC=net&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Initial Admin Read Only"&amp;gt;false&amp;lt;/property&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;/accessPolicyProvider&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;authorizer&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;managed-authorizer&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.registry.security.authorization.StandardManagedAuthorizer&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="Access Policy Provider"&amp;gt;file-access-policy-provider&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/authorizer&amp;gt;&lt;BR /&gt;&amp;lt;/authorizers&amp;gt;&lt;/P&gt;&lt;P&gt;######################################################################-----------------------------------------------------#####################################################################&lt;/P&gt;&lt;P&gt;&amp;lt;!-- identity-providers.xml --&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;?xml version="1.0" encoding="UTF-8" standalone="yes"?&amp;gt;&lt;BR /&gt;&amp;lt;identityProviders&amp;gt;&lt;BR /&gt;&amp;lt;provider&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;ldap-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.registry.security.ldap.LdapIdentityProvider&amp;lt;/class&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;property name="Authentication Strategy"&amp;gt;SIMPLE&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Manager DN"&amp;gt;CN=LDAPUSER1234,OU=Service Users,OU=User Accounts,DC=corp1,DC=ad1,DC=xyz,DC=net&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Manager Password"&amp;gt;secret&amp;lt;/property&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;property name="Referral Strategy"&amp;gt;FOLLOW&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Connect Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Read Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Url"&amp;gt;ldaps://ldapserver.com:636&amp;lt;/property&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;!-- Sucht in allen User-OU-Bereichen --&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Search Base"&amp;gt;OU=User Accounts,DC=corp1,DC=ad1,DC=xyz,DC=net&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Search Scope"&amp;gt;SUBTREE&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Identity Attribute"&amp;gt;sAMAccountName&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Object Class"&amp;gt;user&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Search Filter"&amp;gt;(&amp;amp;amp;(objectClass=user)(sAMAccountName={0}))&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Identity Strategy"&amp;gt;USE_DN&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Authentication Expiration"&amp;gt;12 hours&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/provider&amp;gt;&lt;BR /&gt;&amp;lt;/identityProviders&amp;gt;&lt;/P&gt;&lt;P&gt;######################################################################-----------------------------------------------------#####################################################################&lt;/P&gt;&lt;P&gt;# Licensed to the Apache Software Foundation (ASF) under one or more&lt;BR /&gt;# contributor license agreements. See the NOTICE file distributed with&lt;BR /&gt;# this work for additional information regarding copyright ownership.&lt;BR /&gt;# The ASF licenses this file to You under the Apache License, Version 2.0&lt;BR /&gt;# (the "License"); you may not use this file except in compliance with&lt;BR /&gt;# the License. You may obtain a copy of the License at&lt;BR /&gt;#&lt;BR /&gt;# &lt;A href="http://www.apache.org/licenses/LICENSE-2.0" target="_blank" rel="noopener"&gt;http://www.apache.org/licenses/LICENSE-2.0&lt;/A&gt;&lt;BR /&gt;#&lt;BR /&gt;# Unless required by applicable law or agreed to in writing, software&lt;BR /&gt;# distributed under the License is distributed on an "AS IS" BASIS,&lt;BR /&gt;# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.&lt;BR /&gt;# See the License for the specific language governing permissions and&lt;BR /&gt;# limitations under the License.&lt;/P&gt;&lt;P&gt;# web properties #&lt;BR /&gt;nifi.registry.web.war.directory=./lib&lt;BR /&gt;nifi.registry.web.https.host=nifi_ec2server.com&lt;BR /&gt;nifi.registry.web.https.port=18443&lt;BR /&gt;nifi.registry.web.https.network.interface.default=&lt;BR /&gt;nifi.registry.web.https.application.protocols=h2 http/1.1&lt;BR /&gt;nifi.registry.web.jetty.working.directory=./work/jetty&lt;BR /&gt;nifi.registry.web.jetty.threads=200&lt;BR /&gt;nifi.registry.web.should.send.server.version=true&lt;/P&gt;&lt;P&gt;# External URL via ALB (important for redirects)&lt;BR /&gt;nifi.registry.web.proxy.host=nifi_alb_server.com&lt;/P&gt;&lt;P&gt;# security properties #&lt;BR /&gt;nifi.registry.security.keystore=./conf/keystore_new.jks&lt;BR /&gt;nifi.registry.security.keystoreType=JKS&lt;BR /&gt;nifi.registry.security.keystorePasswd=secret&lt;BR /&gt;nifi.registry.security.keyPasswd=secret&lt;BR /&gt;nifi.registry.security.truststore=./conf/truststore.jks&lt;BR /&gt;nifi.registry.security.truststoreType=JKS&lt;BR /&gt;nifi.registry.security.truststorePasswd=secret&lt;BR /&gt;nifi.registry.security.authorizers.configuration.file=./conf/authorizers.xml&lt;BR /&gt;nifi.registry.security.authorizer=managed-authorizer&lt;BR /&gt;nifi.registry.security.identity.providers.configuration.file=./conf/identity-providers.xml&lt;BR /&gt;nifi.registry.security.identity.provider=ldap-provider&lt;BR /&gt;nifi.registry.security.user.login.identity.provider=ldap-provider&lt;BR /&gt;nifi.registry.security.user.group.provider=ldap-user-group-provider&lt;BR /&gt;nifi.registry.security.authorization.provider=file-access-policy-provider&lt;/P&gt;&lt;P&gt;nifi.registry.security.needClientAuth=false&lt;/P&gt;&lt;P&gt;# --------------------------------------------------&lt;BR /&gt;# LDAP Configuration&lt;BR /&gt;# --------------------------------------------------&lt;BR /&gt;ldap-provider.url=ldaps://ldapserver.com:636&lt;BR /&gt;ldap-provider.user.search.base=OU=User Accounts,DC=corp1,DC=ad1,DC=xyz,DC=net&lt;BR /&gt;ldap-provider.user.search.filter=(&amp;amp;amp;(objectClass=user)(sAMAccountName=*))&lt;BR /&gt;ldap-provider.group.search.base=OU=User Accounts,DC=corp1,DC=ad1,DC=xyz,DC=net&lt;BR /&gt;ldap-provider.group.search.filter=(&amp;amp;amp;(objectClass=group)(member={0}))&lt;BR /&gt;ldap-provider.bind.user=CN=LDAPUSER1234,OU=Service Users,OU=User Accounts,DC=corp1,DC=ad1,DC=xyz,DC=net&lt;BR /&gt;ldap-provider.bind.password=secret&lt;/P&gt;&lt;P&gt;# nifi.registry.security.user.login.identity.provider=ldap-provider&lt;/P&gt;&lt;P&gt;# providers properties #&lt;BR /&gt;nifi.registry.providers.configuration.file=./conf/providers.xml&lt;/P&gt;&lt;P&gt;# registry alias properties #&lt;BR /&gt;nifi.registry.registry.alias.configuration.file=./conf/registry-aliases.xml&lt;/P&gt;&lt;P&gt;# extensions working dir #&lt;BR /&gt;nifi.registry.extensions.working.directory=./work/extensions&lt;/P&gt;&lt;P&gt;# legacy database properties, used to migrate data from original DB to new DB below&lt;BR /&gt;# NOTE: Users upgrading from 0.1.0 should leave these populated, but new installs after 0.1.0 should leave these empty&lt;BR /&gt;nifi.registry.db.directory=&lt;BR /&gt;nifi.registry.db.url.append=&lt;/P&gt;&lt;P&gt;# database properties&lt;BR /&gt;nifi.registry.db.url=jdbc:h2:./database/nifi-registry-primary;AUTOCOMMIT=OFF;DB_CLOSE_ON_EXIT=FALSE;LOCK_MODE=3;LOCK_TIMEOUT=25000;WRITE_DELAY=0;AUTO_SERVER=FALSE&lt;BR /&gt;nifi.registry.db.driver.class=org.h2.Driver&lt;BR /&gt;nifi.registry.db.driver.directory=&lt;BR /&gt;nifi.registry.db.username=nifireg&lt;BR /&gt;nifi.registry.db.password=nifireg&lt;BR /&gt;nifi.registry.db.maxConnections=5&lt;BR /&gt;nifi.registry.db.sql.debug=false&lt;/P&gt;&lt;P&gt;# extension directories #&lt;BR /&gt;# Each property beginning with "nifi.registry.extension.dir." will be treated as location for an extension,&lt;BR /&gt;# and a class loader will be created for each location, with the system class loader as the parent&lt;BR /&gt;#&lt;BR /&gt;#nifi.registry.extension.dir.1=/path/to/extension1&lt;BR /&gt;#nifi.registry.extension.dir.2=/path/to/extension2&lt;/P&gt;&lt;P&gt;nifi.registry.extension.dir.aws=./ext/aws/lib&lt;/P&gt;&lt;P&gt;# Identity Mapping Properties #&lt;BR /&gt;# These properties allow normalizing user identities such that identities coming from different identity providers&lt;BR /&gt;# (certificates, LDAP, Kerberos) can be treated the same internally in NiFi. The following example demonstrates normalizing&lt;BR /&gt;# DNs from certificates and principals from Kerberos into a common identity string:&lt;BR /&gt;#&lt;BR /&gt;# nifi.registry.security.identity.mapping.pattern.dn=^CN=(.*?), OU=(.*?), O=(.*?), L=(.*?), ST=(.*?), C=(.*?)$&lt;BR /&gt;# nifi.registry.security.identity.mapping.value.dn=$1@$2&lt;BR /&gt;# nifi.registry.security.identity.mapping.transform.dn=NONE&lt;/P&gt;&lt;P&gt;nifi.registry.security.identity.mapping.pattern.dn=^CN=(.*?),.*$&lt;BR /&gt;nifi.registry.security.identity.mapping.value.dn=$1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;# nifi.registry.security.identity.mapping.pattern.kerb=^(.*?)/instance@(.*?)$&lt;BR /&gt;# nifi.registry.security.identity.mapping.value.kerb=$1@$2&lt;BR /&gt;# nifi.registry.security.identity.mapping.transform.kerb=UPPER&lt;/P&gt;&lt;P&gt;# Group Mapping Properties #&lt;BR /&gt;# These properties allow normalizing group names coming from external sources like LDAP. The following example&lt;BR /&gt;# lowercases any group name.&lt;BR /&gt;#&lt;BR /&gt;# nifi.registry.security.group.mapping.pattern.anygroup=^(.*)$&lt;BR /&gt;# nifi.registry.security.group.mapping.value.anygroup=$1&lt;BR /&gt;# nifi.registry.security.group.mapping.transform.anygroup=LOWER&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;# kerberos properties #&lt;BR /&gt;# nifi.registry.kerberos.krb5.file=&lt;BR /&gt;# nifi.registry.kerberos.spnego.principal=&lt;BR /&gt;# nifi.registry.kerberos.spnego.keytab.location=&lt;BR /&gt;# nifi.registry.kerberos.spnego.authentication.expiration=12 hours&lt;/P&gt;&lt;P&gt;# OIDC #&lt;BR /&gt;# nifi.registry.security.user.oidc.discovery.url=&lt;BR /&gt;# nifi.registry.security.user.oidc.connect.timeout=&lt;BR /&gt;# nifi.registry.security.user.oidc.read.timeout=&lt;BR /&gt;# nifi.registry.security.user.oidc.client.id=&lt;BR /&gt;# nifi.registry.security.user.oidc.client.secret=&lt;BR /&gt;# nifi.registry.security.user.oidc.preferred.jwsalgorithm=&lt;BR /&gt;# nifi.registry.security.user.oidc.additional.scopes=${nifi.registry.security.user.oidc.additional.scopes}&lt;BR /&gt;# nifi.registry.security.user.oidc.claim.identifying.user=${nifi.registry.security.user.oidc.claim.identifying.user}&lt;BR /&gt;# nifi.registry.security.user.oidc.claim.groups=groups&lt;/P&gt;&lt;P&gt;# revision management #&lt;BR /&gt;# This feature should remain disabled until a future NiFi release that supports the revision API changes&lt;BR /&gt;nifi.registry.revisions.enabled=false&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thank you &amp;amp; best regards,&lt;BR /&gt;casaui&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2025 10:32:50 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Cannot-access-the-NiFi-Registry-from-NiFi-and-view-the/m-p/412819#M253702</guid>
      <dc:creator>casaui</dc:creator>
      <dc:date>2025-11-05T10:32:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot access the NiFi Registry from NiFi and view the buckets</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Cannot-access-the-NiFi-Registry-from-NiFi-and-view-the/m-p/412821#M253704</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/135452"&gt;@casaui&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;You have multiple issues with your setup.&lt;BR /&gt;&lt;BR /&gt;Issue 1:&lt;BR /&gt;Problem:&amp;nbsp; Missing ClientAuth certificate in MutualTLS exchange between NiFi's NiFiRegistryFlowRegistryClient and your NiFi-Registry.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[NiFi Registry Web Server-50] o.a.n.r.w.s.a.x.X509CertificateExtractor No client certificate found in request.&lt;/LI-CODE&gt;&lt;P&gt;Solution:&lt;BR /&gt;The NiFiRegistryFlowRegistryClient will use the keystore and truststore defined in the nifi.properties file if a SSL Context service has not been configured in the registry client directly.&amp;nbsp; For a mutualTLS exchange to be successful, the client side must present a clientAuth certificate that is trusted by the truststore being used on the server side (NiFi-Registry) of the TLS connection.&amp;nbsp; Likewise, the serverAuth certificate presented by the server (NiFi-Registry) must be trusted by the truststore the client (NiFiFlowRegistryClient) is configured to use.&amp;nbsp; &amp;nbsp;I have no idea why you have an ALB setup for NiFi-registry since there is just one NiFi-Registry.&amp;nbsp; The NiFiRegistryFlowRegistryClient should be configured with the direct NiFi-Registry URL:&amp;nbsp;&lt;A href="https://nifi_ec2server.com:18443/nifi-registry" target="_blank" rel="noopener nofollow noreferrer"&gt;https://nifi_ec2server.com:18443/nifi-registry&lt;/A&gt;&lt;BR /&gt;Without a clientAuth certificate presented in the mutualTLS exchange your Registry client is going to be anonymous.&lt;BR /&gt;&lt;BR /&gt;Issue 2: Authorization&lt;BR /&gt;Problem:&amp;nbsp; Every action is authenticated and authorized when it comes to interacting with a secured NiFi or NiFi-Registry. When the Registry Client attempts to establish a connection to the NiFi-registry, it uses the DN from clientAuth certificate from the configured keystore (provided server can trust it) as the client/user identity.&amp;nbsp; &amp;nbsp;From your shared authorizers.xml I can see you are using the managed authorizer --&amp;gt; file-access-policy-provider --&amp;gt; ldap-user-group-provider.&amp;nbsp; &amp;nbsp;So unless your ldap is returning the DN for your clientAuth certificate, you won't be able to setup the necessary authorization needed for the client.&lt;BR /&gt;Solution: The authorizers.xml could be setup instead to use managed-authorizer --&amp;gt; file-access-policy-provider (modified to use composite-configurable-user-group-provider instead of ldap-user-group-provider) --&amp;gt; composite-configurable-user-group-provider (configured to use configurable provider = file-user-group-provider and provider ldap-user-group-provider).&amp;nbsp; &amp;nbsp; Both the file-user-group-provider and ldap-user-group-provider configured in the composite-configurable-user-group-provider need to also be configured.&amp;nbsp; The file-user-group-provider will allow you manually added client/user identities not provided via your ldap-user-group-provider to which you can set authorization policies needed.&amp;nbsp; The clientAuth certificate DN (may be unique for each NiFi node in a NiFi cluster) would need to be authorized for "Can proxy user requests (read, write, delete)" and "Can Manage Buckets (read)".&lt;BR /&gt;&lt;BR /&gt;Issue 3: Authorizers - ldap-user-group-provider use of {0}.&lt;BR /&gt;Problem:&amp;nbsp; I suspect you are not getting any users returned by this provider because your user search filter is using "&lt;SPAN&gt;sAMAccountName={0}" and group search filter is using "member={0}".&amp;nbsp; "{0}" is going to treated as a literal string.&amp;nbsp; It only has special meaning in the ldap-provider.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;Solution:&amp;nbsp; Stop using {0} in the authorizers.xml file ldap-user-group-provider.&amp;nbsp; This provider executes every 30 minutes to sync users and groups from ldap.&amp;nbsp; It doe snot take any outside input.&amp;nbsp; The ldap-provider does however.&amp;nbsp; The username entered at login is inserted in place of the {0} in the ldap-provider to be used to verify the username and password provided at login.&lt;BR /&gt;&lt;BR /&gt;Issue 4: Authorizers and login-provider - Auth strategy mismatch&lt;BR /&gt;Problem:&amp;nbsp; You configured auth strategy as Simple; however, configured a ldaps url:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;property name="Authentication Strategy"&amp;gt;SIMPLE&amp;lt;/property&amp;gt;
...
&amp;lt;property name="Url"&amp;gt;ldaps://ldapserver.com:636&amp;lt;/property&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;Solution: This provider is not going to work configured like this.&amp;nbsp; Auth strategy should be "LDAPS" when connecting to "ldaps://..." or your Url should be unsecured "ldap://..." if you still want to use "SIMPLE"&lt;BR /&gt;&lt;BR /&gt;------&lt;BR /&gt;Your user identity as displayed (case sensitive) in the upper right corner of the NiFi UI, must also exist as a user in NiFi-Registry and be properly authorized on the bucket(s) that user can use for version control.&amp;nbsp; Keep in mind that the NiFiRegistryFlowRegistryClient will proxy read/write request on behalf of your NiFi user.&amp;nbsp; So the authorizations I stated early for the registry client and the authorizations for the NiFi user must both exist in NiFi-Registry.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Please help our community grow. If you found&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Accept as Solution&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;" on&amp;nbsp;&lt;STRONG&gt;one or more&lt;/STRONG&gt;&amp;nbsp;of them that helped.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;BR /&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2025 16:01:44 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Cannot-access-the-NiFi-Registry-from-NiFi-and-view-the/m-p/412821#M253704</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2025-11-05T16:01:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot access the NiFi Registry from NiFi and view the buckets</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Cannot-access-the-NiFi-Registry-from-NiFi-and-view-the/m-p/412841#M253720</link>
      <description>&lt;P&gt;Hi Matt,&lt;/P&gt;&lt;P&gt;Sorry for the late reply. It worked for me once I used the same truststore for both NiFi and NiFi Registry. Now all authorized users can access the NiFi Registry and see all the buckets, which is fine for me.&lt;/P&gt;&lt;P&gt;The next problem I’m facing is the following error message, which occurs quite often:&lt;BR /&gt;{code}&lt;BR /&gt;Failed to load cluster summary - [&amp;lt;html&amp;gt; &amp;lt;head&amp;gt;&amp;lt;title&amp;gt;502 Bad Gateway&amp;lt;/title&amp;gt;&amp;lt;/head&amp;gt; &amp;lt;body&amp;gt; &amp;lt;center&amp;gt;&amp;lt;h1&amp;gt;502 Bad Gateway&amp;lt;/h1&amp;gt;&amp;lt;/center&amp;gt; &amp;lt;/body&amp;gt; &amp;lt;/html&amp;gt; &amp;lt;!-- a padding to disable MSIE and Chrome friendly error page --&amp;gt; ...]&lt;BR /&gt;{code}&lt;BR /&gt;Thanks a lot!&lt;BR /&gt;Best regards,&lt;BR /&gt;Casaui&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2025 11:01:31 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Cannot-access-the-NiFi-Registry-from-NiFi-and-view-the/m-p/412841#M253720</guid>
      <dc:creator>casaui</dc:creator>
      <dc:date>2025-11-11T11:01:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot access the NiFi Registry from NiFi and view the buckets</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Cannot-access-the-NiFi-Registry-from-NiFi-and-view-the/m-p/412844#M253723</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/135452"&gt;@casaui&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Your new issue is completely unrelated to your NiFi to NiFi-Registry MutualTLS authentication based issue in this community question.&amp;nbsp; I kindly ask that your start a new community question so that future users reading this question don't get confuse by multiple unrelated issues being discussed.&lt;BR /&gt;&lt;BR /&gt;If you found my assistance on this query helped you, please take a moment to click on "Accept as Solution" on the thread that helped guide you to resolution.&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2025 16:39:57 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Cannot-access-the-NiFi-Registry-from-NiFi-and-view-the/m-p/412844#M253723</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2025-11-12T16:39:57Z</dc:date>
    </item>
  </channel>
</rss>

