<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Securing a NiFi 2.0 cluster in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Securing-a-NiFi-2-0-cluster/m-p/412845#M253724</link>
    <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/123805"&gt;@jfs912&lt;/a&gt;&amp;nbsp; &amp;nbsp;The NiFi toolkit was removed with the NiFi 2.0 releases.&amp;nbsp; See below for more details on why that decision was made.&lt;BR /&gt;&lt;A href="https://lists.apache.org/thread/vn1nzobtz4fh7fs461sgg8jj9zygrk0f" target="_blank"&gt;https://lists.apache.org/thread/vn1nzobtz4fh7fs461sgg8jj9zygrk0f&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I am not well versed on c&lt;SPAN&gt;etic helm charts, so not going to be able to provide specific guidance there.&amp;nbsp; The bottom line is there is nothing special about toolkit generated certficates.&amp;nbsp; I see no reason why you coudl not use the ca from cetic as long as the certificates meet the NiFi requirements for EKUs, SANs, Wildcards..&lt;BR /&gt;&lt;BR /&gt;A NiFi or NiFi-Registry keystore:&lt;BR /&gt;- Must contain ONLY one PrivateKeyEntry.&lt;BR /&gt;- PrivateKeyEntry DN must not use wildcards.&lt;BR /&gt;- PrivateKeyEntry&amp;nbsp; Extended Key Usage (EKU) must support ClientAuth and ServerAuth&lt;BR /&gt;- PrivateKeyEntry must contain one or more SAN entries. A SAN must match the hostname used by NiFi&lt;BR /&gt;&lt;BR /&gt;A NiFi or NiFi-Registry Keystore. (typically same truststore is used by both):&lt;BR /&gt;- Must contain the complete trust chain for at clientAuth Certificate used to connect with NIFi.&amp;nbsp; This includes any intermediate and root CA in the trust chain.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Please help our community grow. If you found&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Accept as Solution&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;" on&amp;nbsp;&lt;STRONG&gt;one or more&lt;/STRONG&gt;&amp;nbsp;of them that helped.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;BR /&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 12 Nov 2025 15:11:28 GMT</pubDate>
    <dc:creator>MattWho</dc:creator>
    <dc:date>2025-11-12T15:11:28Z</dc:date>
    <item>
      <title>Securing a NiFi 2.0 cluster</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Securing-a-NiFi-2-0-cluster/m-p/411678#M253119</link>
      <description>&lt;P&gt;We want to move from NiFi 1.28.1 -&amp;gt; NiFi 2.4. We have done most of the prerequisites like using the json flow file not xml but are confused with the deprecation of the the ./tls-toolkit.sh. How are NiFi 2.0+ clusters secured? We are using helm charts.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jul 2025 18:48:24 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Securing-a-NiFi-2-0-cluster/m-p/411678#M253119</guid>
      <dc:creator>jfs912</dc:creator>
      <dc:date>2025-07-21T18:48:24Z</dc:date>
    </item>
    <item>
      <title>Re: Securing a NiFi 2.0 cluster</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Securing-a-NiFi-2-0-cluster/m-p/411686#M253123</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/123805"&gt;@jfs912&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;NiFi 2.x is secured in the same way as NiFi 1.x was secured.&amp;nbsp; The Apache NIFi community made a decision to move away from providing a toolkit for generating TLS certificates since it did not make sense to have its own tool to manage certificate creation when there is nothing special the toolkit does (&lt;A class="issue-link" href="https://issues.apache.org/jira/browse/NIFI-12200" target="_blank" rel="13553436 noopener"&gt;NIFI-12200&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;.&amp;nbsp; You can create your own self signed certificates (simple web search will show many resources on how to do this), you can use a certificate service to create yoru certificates and sign them for you, you can setup your own certificate authority for signing your certificates, etc.&amp;nbsp; &amp;nbsp; It really made no sense for Apache NiFi to maintain this code.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The important parts to remember when creating your NiFi certificates are:&lt;BR /&gt;Keystore for NiFi:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Must contain 1 and only 1 PrivateKey entry&lt;/LI&gt;&lt;LI&gt;PrivateKey entry DN must NOT contain wildcards.&amp;nbsp; The DN is used as the client identity and use of wildcards in client identities is not a proper security practice.&lt;/LI&gt;&lt;LI&gt;PrivateKey entry must have ExtendedKeyUsage with both ClientAuth and ServerAuth.&amp;nbsp; NiFi uses this certificate for both client and server authorizations&lt;/LI&gt;&lt;LI&gt;PrivateKey entry must include at least one SAN entry that matches the hostname of the NiFi server on which the certificate will be used. During a TLS exchange hostname verification is performed to make sure the hostname accessed via the URL used matches a SAN entry in the Server certificate the target server responds with.&amp;nbsp; It is not uncommon for a certificate to contain more then one SAN entry.&lt;/LI&gt;&lt;LI&gt;Recommend that PrivateKey password and Keystore password are the same.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Truststore for NiFi:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The NiFi truststore contains one too many trusted cert entries.&amp;nbsp; Some choose to use the Java default cacerts (truststore) file and just add the NiFi additional trusted certs entries to it.&amp;nbsp; This same truststore is then used on every node in a NiFi cluster.&lt;/LI&gt;&lt;LI&gt;Must contain the complete trusts chain for the NiFi certificates.&amp;nbsp; A NiFi certificate may be self signed meaning the issuer and signer are the same DistinquishedName (DN).&amp;nbsp; I this case the public cert for each of yoru NiFi node's certificates needs to be added to the truststore.&amp;nbsp; A NiFi certificate might be signed by an Intermediate Certificate Authority (CA).&amp;nbsp; An intermediate CA would be the signer DN for the NIFi certificate. An Intermediate CA will have a different Issuer and Signer DN.&amp;nbsp; The truststore must contain the public cert for this Intermediate CA.&amp;nbsp; There may be multiple levels of intermediate CAs before reaching the signer that is the root CA. The root CA public certificate can be identified&amp;nbsp; because it will have the same DN for issuer and signer.&amp;nbsp; The truststore must contain the public certificate for the root CA.&amp;nbsp; Having all the public certificates for every signer for the NiFi certificate to the Root CA makes up the complete trust chain required for trust of the signed NiFi certificate.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Please help our community grow. If you found&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Accept as Solution&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;" on&amp;nbsp;&lt;STRONG&gt;one or more&lt;/STRONG&gt;&amp;nbsp;of them that helped.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;BR /&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jul 2025 12:26:52 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Securing-a-NiFi-2-0-cluster/m-p/411686#M253123</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2025-07-22T12:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: Securing a NiFi 2.0 cluster</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Securing-a-NiFi-2-0-cluster/m-p/412842#M253721</link>
      <description>&lt;P&gt;Matt, thanks for the response, unfortunately our deployment is a little more complicated than that. Its using a custom cetic helm chart and deployed in k8s. Considering what you said would you suggest not using the ca from cetic and just run this in a statefulset?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2025 20:24:48 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Securing-a-NiFi-2-0-cluster/m-p/412842#M253721</guid>
      <dc:creator>jfs912</dc:creator>
      <dc:date>2025-11-11T20:24:48Z</dc:date>
    </item>
    <item>
      <title>Re: Securing a NiFi 2.0 cluster</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Securing-a-NiFi-2-0-cluster/m-p/412845#M253724</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/123805"&gt;@jfs912&lt;/a&gt;&amp;nbsp; &amp;nbsp;The NiFi toolkit was removed with the NiFi 2.0 releases.&amp;nbsp; See below for more details on why that decision was made.&lt;BR /&gt;&lt;A href="https://lists.apache.org/thread/vn1nzobtz4fh7fs461sgg8jj9zygrk0f" target="_blank"&gt;https://lists.apache.org/thread/vn1nzobtz4fh7fs461sgg8jj9zygrk0f&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I am not well versed on c&lt;SPAN&gt;etic helm charts, so not going to be able to provide specific guidance there.&amp;nbsp; The bottom line is there is nothing special about toolkit generated certficates.&amp;nbsp; I see no reason why you coudl not use the ca from cetic as long as the certificates meet the NiFi requirements for EKUs, SANs, Wildcards..&lt;BR /&gt;&lt;BR /&gt;A NiFi or NiFi-Registry keystore:&lt;BR /&gt;- Must contain ONLY one PrivateKeyEntry.&lt;BR /&gt;- PrivateKeyEntry DN must not use wildcards.&lt;BR /&gt;- PrivateKeyEntry&amp;nbsp; Extended Key Usage (EKU) must support ClientAuth and ServerAuth&lt;BR /&gt;- PrivateKeyEntry must contain one or more SAN entries. A SAN must match the hostname used by NiFi&lt;BR /&gt;&lt;BR /&gt;A NiFi or NiFi-Registry Keystore. (typically same truststore is used by both):&lt;BR /&gt;- Must contain the complete trust chain for at clientAuth Certificate used to connect with NIFi.&amp;nbsp; This includes any intermediate and root CA in the trust chain.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Please help our community grow. If you found&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Accept as Solution&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;" on&amp;nbsp;&lt;STRONG&gt;one or more&lt;/STRONG&gt;&amp;nbsp;of them that helped.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;BR /&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2025 15:11:28 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Securing-a-NiFi-2-0-cluster/m-p/412845#M253724</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2025-11-12T15:11:28Z</dc:date>
    </item>
  </channel>
</rss>

