<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Authorization issue between NiFi and NiFi Registry in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Authorization-issue-between-NiFi-and-NiFi-Registry/m-p/413254#M253962</link>
    <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/134112"&gt;@pnac03&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;1). The keystore configured in NiFi (nifi.properies and in SSL Context Service controller services) and NiFi-Registry (nifi-registry.properties) must contain only 1 PrivateKeyEntry since there is no way to control which is used when multiple exist.&amp;nbsp; The verbose output you shared for your keystore shows it containing only 1 PrivateKeyEntry.&lt;BR /&gt;&lt;BR /&gt;2) TLS will negotiate the highest mutually supported version between client and server in the mTLS exchange.&lt;BR /&gt;&lt;BR /&gt;3) You did not share the verbose output for the keystore used in the SSL Context Service you configured your NiFiFlowRegistry client to use.&amp;nbsp; Would also need to see the nifi-registry.properties file to inspect all the identity mapping properties set to see how the DNs might be manipulated.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Please help our community grow. If you found&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Accept as Solution&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;" on&amp;nbsp;&lt;STRONG&gt;one or more&lt;/STRONG&gt;&amp;nbsp;of them that helped.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;BR /&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 07 Jan 2026 14:43:20 GMT</pubDate>
    <dc:creator>MattWho</dc:creator>
    <dc:date>2026-01-07T14:43:20Z</dc:date>
    <item>
      <title>Authorization issue between NiFi and NiFi Registry</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Authorization-issue-between-NiFi-and-NiFi-Registry/m-p/413239#M253953</link>
      <description>&lt;P&gt;I am trying to connect between NiFi and NiFi Registry. I'm able to authenticate with Registry from NiFi but I'm unable to see the buckets, not even the public ones. I've configured a SSL Context on NiFi that references a truststore containing Registry's Truststore and Keystore. I've imported NiFi's node certificates into the truststore on the registry's side. I've given the 'proxy and manage user bucket' permissions to the Node's identity in the Registry UI and Read Write and Execute permission to the same user on the Buckets. But I'm still unable to see the buckets on NiFi's UI. The API Responses also indicate that NiFi only has read permissions to the buckets. This is as if there is some anomaly during login..&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;:&lt;BR /&gt;1) I'm using a Clustered NiFi Setup. I have verified that my node identity is 'CN=node-0-nifikop'.&lt;BR /&gt;2) Both NiFi Cluster (NiFiKop) and the NiFi Registry (Helm Release) are running inside a Kubernetes Cluster&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Error Samples:&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;The Error on NiFi UI:&amp;nbsp;&lt;!-- StartFragment  --&gt; &lt;A href="https://sssupply1-my.sharepoint.com/:i:/g/personal/aditya_charan_3scsolution_com/IQChyGKzwCv9R794Fgy8w6DxAb5aKU7UPXZ5MyCHC29CfTQ?e=wJZbCp" target="_blank"&gt;Error.jpeg&lt;/A&gt;&lt;!-- StartFragment  --&gt;&lt;BR /&gt;Registry Bucket Policies:&amp;nbsp;&lt;!-- StartFragment  --&gt; &lt;A href="https://sssupply1-my.sharepoint.com/:i:/g/personal/aditya_charan_3scsolution_com/IQDDoiica49wRZQZZeIROs8yATDPecayAthqAg8M7S-hiRo?e=hfAyp7" target="_blank"&gt;Bucket Policies.jpeg&lt;/A&gt;&lt;BR /&gt;Registry User Permissions:&amp;nbsp;&lt;!-- StartFragment  --&gt; &lt;A href="https://sssupply1-my.sharepoint.com/:i:/g/personal/aditya_charan_3scsolution_com/IQBkVRqcDok8QYw-lhci5mFUAVQ22VYtpLQ6-3QXh0ed1Pk?e=BjXnC2" target="_blank"&gt;Registry User Permissions.jpeg&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The following is the Truststore referenced in NiFi's SSL Contexts&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;======================================
NOTE: SENSITIVE INFORMATION HAS BEEN OBFUSCATED
======================================

Keystore type: PKCS12
Keystore provider: SUN

Your keystore contains 4 entries

Alias name: ca-cert
Creation date: Jan 5, 2026
Entry type: trustedCertEntry

Owner: O=3SCDemo, CN=3SCDemo-CA
Issuer: O=3SCDemo, CN=3SCDemo-CA
Serial number: 1745e28f179548d468a6ece0d0d497be8b15d74f
Valid from: Sat Dec 20 19:51:51 UTC 2025 until: Sun Dec 20 19:51:51 UTC 2026
Certificate fingerprints:
	 SHA1:  SHA256: 
Signature algorithm name: SHA256withRSA
Subject Public Key Algorithm: 2048-bit RSA key
Version: 3

Extensions: 

#1: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
                                        +...
]
]

#2: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
  CA:true
  PathLen: no limit
]

#3: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_CertSign
  Crl_Sign
]

#4: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
                                       +...
]
]



*******************************************
*******************************************


Alias name: nifi-ca
Creation date: Jan 5, 2026
Entry type: trustedCertEntry

Owner: CN=nifikop-ca.dev.cluster.local
Issuer: CN=nifikop-ca.dev.cluster.local
Serial number: 
Valid from: Mon Dec 29 07:08:21 UTC 2025 until: Sun Mar 29 07:08:21 UTC 2026
Certificate fingerprints:
	 SHA1:  SHA256: 
Signature algorithm name: SHA256withRSA
Subject Public Key Algorithm: 2048-bit RSA key
Version: 3

Extensions: 

#1: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
  CA:true
  PathLen: no limit
]

#2: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_Encipherment
  Key_CertSign
]

#3: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
                                        .c..
]
]



*******************************************
*******************************************


Alias name: nifi-prod
Creation date: Jan 5, 2026
Entry type: trustedCertEntry

Owner: CN=node-0-nifikop
Issuer: CN=nifikop-ca.dev.cluster.local
Serial number: 
Valid from: Mon Dec 29 07:08:26 UTC 2025 until: Sun Mar 29 07:08:26 UTC 2026
Certificate fingerprints:
	 SHA1:  SHA256: 
Signature algorithm name: SHA256withRSA
Subject Public Key Algorithm: 4096-bit RSA key
Version: 3

Extensions: 

#1: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
                                       .c..
]
]

#2: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
  CA:false
  PathLen: undefined
]

#3: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
  clientAuth
  serverAuth
]

#4: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
  DNSName: nifikop-headless.dev.svc.cluster.local
  DNSName: nifikop-0-node.nifikop-headless.dev.svc.cluster.local
  DNSName: nifikop-headless.dev.svc
  DNSName: nifikop-0-node.nifikop-headless.dev.svc
  DNSName: nifikop-headless.dev
  DNSName: nifikop-0-node.nifikop-headless.dev
  DNSName: nifikop-headless
  DNSName: nifikop-0-node.nifikop-headless
  DNSName: nifikop-0-node
  DNSName: adinifiapp.com
  URIName: spiffe://nifikop/ns/dev/nifiuser/node-0-nifikop
]



*******************************************
*******************************************


Alias name: nifi-reg-keystore-import
Creation date: Jan 5, 2026
Entry type: trustedCertEntry

Owner: O=3SCDemo, CN=nifi-registry
Issuer: O=3SCDemo, CN=3SCDemo-CA
Serial number: 
Valid from: Sat Dec 20 19:51:52 UTC 2025 until: Sun Dec 20 19:51:52 UTC 2026
Certificate fingerprints:
	 SHA1: 	 SHA256: 
Signature algorithm name: SHA256withRSA
Subject Public Key Algorithm: 2048-bit RSA key
Version: 3

Extensions: 

#1: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
                                        +...
]
]

#2: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:false
  PathLen: undefined
]

#3: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
  serverAuth
  clientAuth
]

#4: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_Encipherment
]

#5: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
  DNSName: nifi-registry
  DNSName: nifi-registry.dev
  DNSName: nifi-registry.dev.svc
  DNSName: nifi-registry.dev.svc.cluster.local
  DNSName: localhost
  IPAddress: 127.0.0.1
]

#6: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
                                      ....
]
]



*******************************************
*******************************************

======================================
NOTE: SENSITIVE INFORMATION HAS BEEN OBFUSCATED
======================================&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;The following is the truststore of NiFi Registry&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;======================================
NOTE: SENSITIVE INFORMATION HAS BEEN OBFUSCATED
======================================

Keystore type: PKCS12
Keystore provider: SUN

Your keystore contains 3 entries

Alias name: ca-cert
Creation date: Jan 5, 2026
Entry type: trustedCertEntry

Owner: O=3SCDemo, CN=3SCDemo-CA
Issuer: O=3SCDemo, CN=3SCDemo-CA
Serial number: 
Valid from: Sat Dec 20 19:51:51 UTC 2025 until: Sun Dec 20 19:51:51 UTC 2026
Certificate fingerprints:
	 SHA1: 	 SHA256: 
Signature algorithm name: SHA256withRSA
Subject Public Key Algorithm: 2048-bit RSA key
Version: 3

Extensions: 

#1: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
                                       +...
]
]

#2: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
  CA:true
  PathLen: no limit
]

#3: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_CertSign
  Crl_Sign
]

#4: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
                                        +...
]
]



*******************************************
*******************************************


Alias name: nifi-ca
Creation date: Jan 5, 2026
Entry type: trustedCertEntry

Owner: CN=nifikop-ca.dev.cluster.local
Issuer: CN=nifikop-ca.dev.cluster.local
Serial number: 
Valid from: Mon Dec 29 07:08:21 UTC 2025 until: Sun Mar 29 07:08:21 UTC 2026
Certificate fingerprints:
	 SHA1: 	 SHA256: 
Signature algorithm name: SHA256withRSA
Subject Public Key Algorithm: 2048-bit RSA key
Version: 3

Extensions: 

#1: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
  CA:true
  PathLen: no limit
]

#2: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_Encipherment
  Key_CertSign
]

#3: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: EB 16 CA 18 17 7C 14 24   E3 FC 9D E7 EE CA A6 80  .......$........
0010: A1 63 D1 BB                                        .c..
]
]



*******************************************
*******************************************


Alias name: nifi-prod
Creation date: Jan 5, 2026
Entry type: trustedCertEntry

Owner: CN=node-0-nifikop
Issuer: CN=nifikop-ca.dev.cluster.local
Serial number: 
Valid from: Mon Dec 29 07:08:26 UTC 2025 until: Sun Mar 29 07:08:26 UTC 2026
Certificate fingerprints:
	 SHA1: 	 SHA256:
Signature algorithm name: SHA256withRSA
Subject Public Key Algorithm: 4096-bit RSA key
Version: 3

Extensions: 

#1: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
                                      .c..
]
]

#2: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
  CA:false
  PathLen: undefined
]

#3: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
  clientAuth
  serverAuth
]

#4: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
  DNSName: nifikop-headless.dev.svc.cluster.local
  DNSName: nifikop-0-node.nifikop-headless.dev.svc.cluster.local
  DNSName: nifikop-headless.dev.svc
  DNSName: nifikop-0-node.nifikop-headless.dev.svc
  DNSName: nifikop-headless.dev
  DNSName: nifikop-0-node.nifikop-headless.dev
  DNSName: nifikop-headless
  DNSName: nifikop-0-node.nifikop-headless
  DNSName: nifikop-0-node
  DNSName: adinifiapp.com
  URIName: spiffe://nifikop/ns/dev/nifiuser/node-0-nifikop
]

*******************************************
*******************************************
======================================
NOTE: SENSITIVE INFORMATION HAS BEEN OBFUSCATED
======================================&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;This is the kind of response i get when I hit this API:&lt;BR /&gt;&lt;SPAN&gt;&lt;A href="https://domain-name/context-path/nifi-api/flow/registries/9e779b09-0199-1000-ffff-ffffec7d027b/buckets" target="_blank"&gt;https://domain-name/context-path/nifi-api/flow/registries/9e779b09-0199-1000-ffff-ffffec7d027b/buckets&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="javascript"&gt;{
    "buckets": [
        {
            "id": "38257128-3406-4fe7-9a7e-967340552ca8",
            "bucket": {
                "id": "38257128-3406-4fe7-9a7e-967340552ca8",
                "name": "fddf",
                "description": "",
                "created": 1760507389992
            },
            "permissions": {
                "canRead": true,
                "canWrite": false
            }
        }
    ]
}&lt;/LI-CODE&gt;&lt;P&gt;&lt;STRONG&gt;Another Clarification:&lt;/STRONG&gt;&amp;nbsp;&lt;BR /&gt;If I understand this right, in case of a clustered setup, the certificate referenced in the SSL Context is proxied via the Node's Identity while NiFi presents its own identity to Registry during the mTLS Handshake. So what registry would see in case of a clustered nifi setup would be the node's identity instead of that Certificate which is referenced in NiFi's SSL Contexts. I have verified the same even from Registry using tcpdump in my setup and I do see that the incoming CN name from nifi is CN=node-0-nifikop instead of what is referenced in the SSL Context.&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2026 06:19:07 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Authorization-issue-between-NiFi-and-NiFi-Registry/m-p/413239#M253953</guid>
      <dc:creator>pnac03</dc:creator>
      <dc:date>2026-01-06T06:19:07Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization issue between NiFi and NiFi Registry</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Authorization-issue-between-NiFi-and-NiFi-Registry/m-p/413242#M253956</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/134112"&gt;@pnac03&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Some clarification:&lt;BR /&gt;&lt;BR /&gt;The NiFi Registry Client (&lt;SPAN&gt;NifiRegistryFlowRegistryClient) will use the configured keystore and truststore in the defined SLS ContextService if configured to authenticate with the target NiFi Registry URL.&amp;nbsp; This Client Auth certificate will proxy the request on behalf of the user identity displayed in the upper right corner of the NiFi UI where this NiFi Registry client is being used.&amp;nbsp; &amp;nbsp;If an SSL Context Service is not defined in the Registry client, the Registry client will use the keystore and truststore configured in the NiFi node's nifi.properties files.&amp;nbsp; Now it is common in a Nifi cluster setup that every node has its own unique keystore.&amp;nbsp; As such you would need to make sure that all the clientAuth certificates are properly authorized to proxy user requests in the target NiFi (this applies no matter which NiFi node you are logged into when making the call to NiFi-Registry since the request gets replicated by all nodes.).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;That brings into question your statement below:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;I have verified the same even from Registry using tcpdump in my setup and I do see that the incoming CN name from nifi is CN=node-0-nifikop instead of what is referenced in the SSL Context.&lt;/LI-CODE&gt;&lt;P&gt;&lt;SPAN&gt;Can you share the verbose output for your PrivateKeyEntry?&amp;nbsp; Does it contain only 1 PrivateKey Entry or multiple?&amp;nbsp; (Must contain only one since NiFi Registry client does not provide a configuration option to specify a specific certificate by alias name.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-----&lt;BR /&gt;Public bucket clarification:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;A public bucket allows any user to import a flow from that bucket to the Canvas of a NiFi.&amp;nbsp; It does not allow any user to write (start version control) of a new dataflow or commit new version of an existing version controlled dataflow to the public bucket.&amp;nbsp; Writing a new flow to a bucket will require proper write permission on the bucket regardless of whether the bucket is public or not.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-------&lt;BR /&gt;User Identities:&lt;BR /&gt;&amp;nbsp;The user identities coming from the ssl context services and proxied are case sensitive "User 2" and "user 2" would be treated as to different users in both NiFi and NiFi-Registry.&lt;BR /&gt;&lt;BR /&gt;The User identities are evaluated against any identity mappings that may be configured in the nifi-registry.properties file, so you'll want to take a look at these to make sure they are not manipulating the user identity string or clientAuth certificate DN.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Please help our community grow. If you found&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Accept as Solution&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;" on&amp;nbsp;&lt;STRONG&gt;one or more&lt;/STRONG&gt;&amp;nbsp;of them that helped.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;BR /&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2026 13:55:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Authorization-issue-between-NiFi-and-NiFi-Registry/m-p/413242#M253956</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2026-01-06T13:55:39Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization issue between NiFi and NiFi Registry</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Authorization-issue-between-NiFi-and-NiFi-Registry/m-p/413246#M253960</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp; Thanks for the quick reply! Thanks for the clarification on the proxying.&lt;BR /&gt;I checked my setup and I have these three questions:&lt;/P&gt;&lt;P&gt;1) Do you need the verbose output from the tcpdump utility or from my NiFi Node's keystore ?&lt;BR /&gt;I've shared the verbose output of my NiFi Node's keystore below. It does seem that my keystore has 2 aliases (or PrivateKeyEntries) indeed, one of them carrying the certificate involved i.e. CN=node-0-nifikop&lt;/P&gt;&lt;PRE&gt;nifi@nifikop-0-node:/var/run/secrets/java.io/keystores/server$ keytool --list -v --keystore keystore.jks&lt;BR /&gt;Enter keystore password:&lt;BR /&gt;Keystore type: JKS&lt;BR /&gt;Keystore provider: SUN&lt;BR /&gt;&lt;BR /&gt;Your keystore contains 2 entries&lt;BR /&gt;&lt;BR /&gt;Alias name: ca&lt;BR /&gt;Creation date: Nov 24, 2025&lt;BR /&gt;Entry type: trustedCertEntry&lt;BR /&gt;&lt;BR /&gt;Owner: CN=nifikop-ca.dev.cluster.local&lt;BR /&gt;Issuer: CN=nifikop-ca.dev.cluster.local&lt;BR /&gt;Serial number: f6b7c60ecee584faa4b5778b6667a7fb&lt;BR /&gt;Valid from: Mon Oct 13 21:43:39 UTC 2025 until: Sun Jan 11 21:43:39 UTC 2026&lt;BR /&gt;Certificate fingerprints:&lt;BR /&gt;SHA1: 56:05:68:C3:15:7F:82:A0:C8:90:6D:DF:BE:02:3E:10:7F:9D:C0:05&lt;BR /&gt;SHA256: 32:46:2C:84:04:D0:91:D9:A8:05:D3:8B:07:E2:09:1C:E3:AC:75:17:77:CB:86:EA:BE:90:9E:09:6F:77:4B:3A&lt;BR /&gt;Signature algorithm name: SHA256withRSA&lt;BR /&gt;Subject Public Key Algorithm: 2048-bit RSA key&lt;BR /&gt;Version: 3&lt;BR /&gt;&lt;BR /&gt;Extensions:&lt;BR /&gt;&lt;BR /&gt;#1: ObjectId: 2.5.29.19 Criticality=true&lt;BR /&gt;BasicConstraints:[&lt;BR /&gt;CA:true&lt;BR /&gt;PathLen: no limit&lt;BR /&gt;]&lt;BR /&gt;&lt;BR /&gt;#2: ObjectId: 2.5.29.15 Criticality=true&lt;BR /&gt;KeyUsage [&lt;BR /&gt;DigitalSignature&lt;BR /&gt;Key_Encipherment&lt;BR /&gt;Key_CertSign&lt;BR /&gt;]&lt;BR /&gt;&lt;BR /&gt;#3: ObjectId: 2.5.29.14 Criticality=false&lt;BR /&gt;SubjectKeyIdentifier [&lt;BR /&gt;KeyIdentifier [&lt;BR /&gt;0000: 0C A4 00 26 2F 44 ED FF BD 2C 3F 76 8F 6C FA CB ...&amp;amp;/D...,?v.l..&lt;BR /&gt;0010: 2A 48 0E A2 *H..&lt;BR /&gt;]&lt;BR /&gt;]&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;*******************************************&lt;BR /&gt;*******************************************&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Alias name: certificate&lt;BR /&gt;Creation date: Nov 24, 2025&lt;BR /&gt;Entry type: PrivateKeyEntry&lt;BR /&gt;Certificate chain length: 1&lt;BR /&gt;Certificate[1]:&lt;BR /&gt;Owner: CN=node-0-nifikop&lt;BR /&gt;Issuer: CN=nifikop-ca.dev.cluster.local&lt;BR /&gt;Serial number: b15ef24eef5835b02b5921d40726a453&lt;BR /&gt;Valid from: Mon Nov 24 06:29:55 UTC 2025 until: Sun Feb 22 06:29:55 UTC 2026&lt;BR /&gt;Certificate fingerprints:&lt;BR /&gt;SHA1: 80:60:7E:27:D9:8A:3D:10:C0:47:0E:72:C1:31:17:D7:7C:3E:3E:AF&lt;BR /&gt;SHA256: 07:25:53:5B:05:00:5F:16:E6:12:B9:44:77:D6:A6:7C:83:F8:80:F7:4A:DB:F3:F6:DF:32:F6:31:56:AC:66:FF&lt;BR /&gt;Signature algorithm name: SHA256withRSA&lt;BR /&gt;Subject Public Key Algorithm: 4096-bit RSA key&lt;BR /&gt;Version: 3&lt;BR /&gt;&lt;BR /&gt;Extensions:&lt;BR /&gt;&lt;BR /&gt;#1: ObjectId: 2.5.29.35 Criticality=false&lt;BR /&gt;AuthorityKeyIdentifier [&lt;BR /&gt;KeyIdentifier [&lt;BR /&gt;0000: 0C A4 00 26 2F 44 ED FF BD 2C 3F 76 8F 6C FA CB ...&amp;amp;/D...,?v.l..&lt;BR /&gt;0010: 2A 48 0E A2 *H..&lt;BR /&gt;]&lt;BR /&gt;]&lt;BR /&gt;&lt;BR /&gt;#2: ObjectId: 2.5.29.19 Criticality=true&lt;BR /&gt;BasicConstraints:[&lt;BR /&gt;CA:false&lt;BR /&gt;PathLen: undefined&lt;BR /&gt;]&lt;BR /&gt;&lt;BR /&gt;#3: ObjectId: 2.5.29.37 Criticality=false&lt;BR /&gt;ExtendedKeyUsages [&lt;BR /&gt;clientAuth&lt;BR /&gt;serverAuth&lt;BR /&gt;]&lt;BR /&gt;&lt;BR /&gt;#4: ObjectId: 2.5.29.17 Criticality=false&lt;BR /&gt;SubjectAlternativeName [&lt;BR /&gt;DNSName: nifikop-headless.dev.svc.cluster.local&lt;BR /&gt;DNSName: nifikop-0-node.nifikop-headless.dev.svc.cluster.local&lt;BR /&gt;DNSName: nifikop-headless.dev.svc&lt;BR /&gt;DNSName: nifikop-0-node.nifikop-headless.dev.svc&lt;BR /&gt;DNSName: nifikop-headless.dev&lt;BR /&gt;DNSName: nifikop-0-node.nifikop-headless.dev&lt;BR /&gt;DNSName: nifikop-headless&lt;BR /&gt;DNSName: nifikop-0-node.nifikop-headless&lt;BR /&gt;DNSName: nifikop-0-node&lt;BR /&gt;DNSName: nifi-internal.3sc.com&lt;BR /&gt;URIName: spiffe://nifikop/ns/dev/nifiuser/node-0-nifikop&lt;BR /&gt;]&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;*******************************************&lt;BR /&gt;*******************************************&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Warning:&lt;BR /&gt;The JKS keystore uses a proprietary format. It is recommended to migrate to PKCS12 which is an industry standard format using "keytool -importkeystore -srckeystore keystore.jks -destkeystore keystore.jks -deststoretype pkcs12".&lt;/PRE&gt;&lt;P&gt;Note: My NiFi Cluster also has an Operator and this is all deployed inside a Kubernetes Cluster. Cert-manager is used to generate and manage these certificates.&lt;BR /&gt;&lt;BR /&gt;2) Does the TLS Version matter in the SSL Context? Currently it's set to 'TLS' and I tried even with SSL and it hadn't worked.&lt;BR /&gt;&lt;BR /&gt;3) Although I've referenced another working certificate (with clientAuth EKUs) in the SSL Context which has&amp;nbsp;"O=3SCDemo, CN=nifi-registry" as the Subject Name and exactly one alias in that keystore, why is NiFi is still presenting the node's certificate referenced in nifi.properties to the registry (as I had confirmed using tcpdump). I didn't see any other CN Name except CN=node-0-nifikop).&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2026 18:55:47 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Authorization-issue-between-NiFi-and-NiFi-Registry/m-p/413246#M253960</guid>
      <dc:creator>pnac03</dc:creator>
      <dc:date>2026-01-06T18:55:47Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization issue between NiFi and NiFi Registry</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Authorization-issue-between-NiFi-and-NiFi-Registry/m-p/413254#M253962</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/134112"&gt;@pnac03&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;1). The keystore configured in NiFi (nifi.properies and in SSL Context Service controller services) and NiFi-Registry (nifi-registry.properties) must contain only 1 PrivateKeyEntry since there is no way to control which is used when multiple exist.&amp;nbsp; The verbose output you shared for your keystore shows it containing only 1 PrivateKeyEntry.&lt;BR /&gt;&lt;BR /&gt;2) TLS will negotiate the highest mutually supported version between client and server in the mTLS exchange.&lt;BR /&gt;&lt;BR /&gt;3) You did not share the verbose output for the keystore used in the SSL Context Service you configured your NiFiFlowRegistry client to use.&amp;nbsp; Would also need to see the nifi-registry.properties file to inspect all the identity mapping properties set to see how the DNs might be manipulated.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Please help our community grow. If you found&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Accept as Solution&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;" on&amp;nbsp;&lt;STRONG&gt;one or more&lt;/STRONG&gt;&amp;nbsp;of them that helped.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;BR /&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jan 2026 14:43:20 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Authorization-issue-between-NiFi-and-NiFi-Registry/m-p/413254#M253962</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2026-01-07T14:43:20Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization issue between NiFi and NiFi Registry</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Authorization-issue-between-NiFi-and-NiFi-Registry/m-p/413264#M253970</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;Thanks for the clarifications.&lt;BR /&gt;&lt;BR /&gt;Here's the verbose output of the keystore used in the SSL Context Service for my NiFiFlowRegistryClient&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;PRE&gt;Keystore type: JKS&lt;BR /&gt;Keystore provider: SUN&lt;BR /&gt;&lt;BR /&gt;Your keystore contains 1 entry&lt;BR /&gt;&lt;BR /&gt;Alias name: nifi-registry&lt;BR /&gt;Creation date: Dec 20, 2025&lt;BR /&gt;Entry type: PrivateKeyEntry&lt;BR /&gt;Certificate chain length: 2&lt;BR /&gt;&lt;BR /&gt;Certificate[1]:&lt;BR /&gt;&lt;BR /&gt;Owner: O=3SCDemo, CN=nifi-registry&lt;BR /&gt;Issuer: O=3SCDemo, CN=3SCDemo-CA&lt;BR /&gt;Serial number:&amp;nbsp;&lt;BR /&gt;Valid from: Sat Dec 20 19:51:52 UTC 2025 until: Sun Dec 20 19:51:52 UTC 2026&lt;BR /&gt;Certificate fingerprints:&lt;BR /&gt;&lt;SPAN&gt; SHA1: SHA256:&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;Signature algorithm name: SHA256withRSA&lt;BR /&gt;Subject Public Key Algorithm: 2048-bit RSA key&lt;BR /&gt;Version: 3&lt;BR /&gt;Extensions:&amp;nbsp;&lt;BR /&gt;#1: ObjectId: 2.5.29.35 Criticality=false&lt;BR /&gt;AuthorityKeyIdentifier [&lt;BR /&gt;KeyIdentifier [&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;+...&lt;BR /&gt;]&lt;BR /&gt;]&lt;BR /&gt;#2: ObjectId: 2.5.29.19 Criticality=false&lt;BR /&gt;BasicConstraints:[&lt;BR /&gt;&amp;nbsp; CA:false&lt;BR /&gt;&amp;nbsp; PathLen: undefined&lt;BR /&gt;]&lt;BR /&gt;#3: ObjectId: 2.5.29.37 Criticality=false&lt;BR /&gt;ExtendedKeyUsages [&lt;BR /&gt;&amp;nbsp; serverAuth&lt;BR /&gt;&amp;nbsp; clientAuth&lt;BR /&gt;]&lt;BR /&gt;#4: ObjectId: 2.5.29.15 Criticality=true&lt;BR /&gt;KeyUsage [&lt;BR /&gt;&amp;nbsp; DigitalSignature&lt;BR /&gt;&amp;nbsp; Key_Encipherment&lt;BR /&gt;]&lt;BR /&gt;#5: ObjectId: 2.5.29.17 Criticality=false&lt;BR /&gt;SubjectAlternativeName [&lt;BR /&gt;&amp;nbsp; DNSName: nifi-registry&lt;BR /&gt;&amp;nbsp; DNSName: nifi-registry.dev&lt;BR /&gt;&amp;nbsp; DNSName: nifi-registry.dev.svc&lt;BR /&gt;&amp;nbsp; DNSName: nifi-registry.dev.svc.cluster.local&lt;BR /&gt;&amp;nbsp; DNSName: localhost&lt;BR /&gt;&amp;nbsp; IPAddress: 127.0.0.1&lt;BR /&gt;]&lt;BR /&gt;#6: ObjectId: 2.5.29.14 Criticality=false&lt;BR /&gt;SubjectKeyIdentifier [&lt;BR /&gt;KeyIdentifier [&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;....&lt;BR /&gt;]&lt;BR /&gt;]&lt;BR /&gt;&lt;BR /&gt;Certificate[2]:&lt;BR /&gt;&lt;BR /&gt;Owner: O=3SCDemo, CN=3SCDemo-CA&lt;BR /&gt;Issuer: O=3SCDemo, CN=3SCDemo-CA&lt;BR /&gt;Serial number:&amp;nbsp;&lt;BR /&gt;Valid from: Sat Dec 20 19:51:51 UTC 2025 until: Sun Dec 20 19:51:51 UTC 2026&lt;BR /&gt;Certificate fingerprints:&lt;BR /&gt;&lt;SPAN&gt; SHA1: SHA256:&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;Signature algorithm name: SHA256withRSA&lt;BR /&gt;Subject Public Key Algorithm: 2048-bit RSA key&lt;BR /&gt;Version: 3&lt;BR /&gt;Extensions:&amp;nbsp;&lt;BR /&gt;#1: ObjectId: 2.5.29.35 Criticality=false&lt;BR /&gt;AuthorityKeyIdentifier [&lt;BR /&gt;KeyIdentifier [&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; +...&lt;BR /&gt;]&lt;BR /&gt;]&lt;BR /&gt;#2: ObjectId: 2.5.29.19 Criticality=true&lt;BR /&gt;BasicConstraints:[&lt;BR /&gt;&amp;nbsp; CA:true&lt;BR /&gt;&amp;nbsp; PathLen: no limit&lt;BR /&gt;]&lt;BR /&gt;#3: ObjectId: 2.5.29.15 Criticality=true&lt;BR /&gt;KeyUsage [&lt;BR /&gt;&amp;nbsp; DigitalSignature&lt;BR /&gt;&amp;nbsp; Key_CertSign&lt;BR /&gt;&amp;nbsp; Crl_Sign&lt;BR /&gt;]&lt;BR /&gt;#4: ObjectId: 2.5.29.14 Criticality=false&lt;BR /&gt;SubjectKeyIdentifier [&lt;BR /&gt;KeyIdentifier [&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; +...&lt;BR /&gt;]&lt;BR /&gt;]&lt;BR /&gt;&lt;BR /&gt;*******************************************&lt;BR /&gt;*******************************************&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;Please find the &lt;STRONG&gt;nifi-registry.properties&lt;/STRONG&gt; file:&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&lt;SPAN&gt;# web properties #&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.web.war.directory&lt;/SPAN&gt;&lt;SPAN&gt;=./lib&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.web.http.host&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.web.http.port&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.web.https.host&lt;/SPAN&gt;&lt;SPAN&gt;=nifi-registry-0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.web.https.port&lt;/SPAN&gt;&lt;SPAN&gt;=18443&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.web.https.network.interface.default&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.web.https.application.protocols&lt;/SPAN&gt;&lt;SPAN&gt;=h2 http/1.1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.web.jetty.working.directory&lt;/SPAN&gt;&lt;SPAN&gt;=./work/jetty&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.web.jetty.threads&lt;/SPAN&gt;&lt;SPAN&gt;=200&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.web.should.send.server.version&lt;/SPAN&gt;&lt;SPAN&gt;=true&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# security properties #&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.keystore&lt;/SPAN&gt;&lt;SPAN&gt;=/opt/certs/nifi-registry-keystore.jks&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.keystoreType&lt;/SPAN&gt;&lt;SPAN&gt;=JKS&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.keystorePasswd&lt;/SPAN&gt;&lt;SPAN&gt;=newps&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.keyPasswd&lt;/SPAN&gt;&lt;SPAN&gt;=newps&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.truststore&lt;/SPAN&gt;&lt;SPAN&gt;=/opt/certs/nifi-registry-truststore.jks&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.truststoreType&lt;/SPAN&gt;&lt;SPAN&gt;=JKS&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.truststorePasswd&lt;/SPAN&gt;&lt;SPAN&gt;=newps&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.needClientAuth&lt;/SPAN&gt;&lt;SPAN&gt;=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.authorizers.configuration.file&lt;/SPAN&gt;&lt;SPAN&gt;=./conf/authorizers.xml&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.authorizer&lt;/SPAN&gt;&lt;SPAN&gt;=managed-authorizer&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.identity.providers.configuration.file&lt;/SPAN&gt;&lt;SPAN&gt;=./conf/identity-providers.xml&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.identity.provider&lt;/SPAN&gt;&lt;SPAN&gt;=ldap-identity-provider&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# providers properties #&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.providers.configuration.file&lt;/SPAN&gt;&lt;SPAN&gt;=./conf/providers.xml&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# registry alias properties #&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.registry.alias.configuration.file&lt;/SPAN&gt;&lt;SPAN&gt;=./conf/registry-aliases.xml&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# extensions working dir #&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.extensions.working.directory&lt;/SPAN&gt;&lt;SPAN&gt;=./work/extensions&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# legacy database properties, used to migrate data from original DB to new DB below&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# NOTE: Users upgrading from 0.1.0 should leave these populated, but new installs after 0.1.0 should leave these empty&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.db.directory&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.db.url.append&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# database properties&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.db.url&lt;/SPAN&gt;&lt;SPAN&gt;=jdbc:h2:./database/nifi-registry-primary&lt;/SPAN&gt;&lt;SPAN&gt;;AUTOCOMMIT=OFF;DB_CLOSE_ON_EXIT=FALSE;LOCK_MODE=3;LOCK_TIMEOUT=25000;WRITE_DELAY=0;AUTO_SERVER=FALSE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.db.driver.class&lt;/SPAN&gt;&lt;SPAN&gt;=org.h2.Driver&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.db.driver.directory&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.db.username&lt;/SPAN&gt;&lt;SPAN&gt;=nifireg&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.db.password&lt;/SPAN&gt;&lt;SPAN&gt;=nifireg&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.db.maxConnections&lt;/SPAN&gt;&lt;SPAN&gt;=5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.db.sql.debug&lt;/SPAN&gt;&lt;SPAN&gt;=false&lt;BR /&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# extension directories #&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# Each property beginning with "nifi.registry.extension.dir." will be treated as location for an extension,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# and a class loader will be created for each location, with the system class loader as the parent&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;#&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;#nifi.registry.extension.dir.1=/path/to/extension1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;#nifi.registry.extension.dir.2=/path/to/extension2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.extension.dir.aws&lt;/SPAN&gt;&lt;SPAN&gt;=./ext/aws/lib&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# Identity Mapping Properties #&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# These properties allow normalizing user identities such that identities coming from different identity providers&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# (certificates, LDAP, Kerberos) can be treated the same internally in NiFi. The following example demonstrates normalizing&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# DNs from certificates and principals from Kerberos into a common identity string:&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;#&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# nifi.registry.security.identity.mapping.pattern.dn=^CN=(.*?), OU=(.*?), O=(.*?), L=(.*?), ST=(.*?), C=(.*?)$&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# nifi.registry.security.identity.mapping.value.dn=$1@$2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# nifi.registry.security.identity.mapping.transform.dn=NONE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# nifi.registry.security.identity.mapping.pattern.kerb=^(.*?)/instance@(.*?)$&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# nifi.registry.security.identity.mapping.value.kerb=$1@$2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# nifi.registry.security.identity.mapping.transform.kerb=UPPER&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# Group Mapping Properties #&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# These properties allow normalizing group names coming from external sources like LDAP. The following example&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# lowercases any group name.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;#&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# nifi.registry.security.group.mapping.pattern.anygroup=^(.*)$&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# nifi.registry.security.group.mapping.value.anygroup=$1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# nifi.registry.security.group.mapping.transform.anygroup=LOWER&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;BR /&gt;# kerberos properties #&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.kerberos.krb5.file&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.kerberos.spnego.principal&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.kerberos.spnego.keytab.location&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.kerberos.spnego.authentication.expiration&lt;/SPAN&gt;&lt;SPAN&gt;=12 hours&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# OIDC #&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.user.oidc.discovery.url&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.user.oidc.connect.timeout&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.user.oidc.read.timeout&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.user.oidc.client.id&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.user.oidc.client.secret&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.user.oidc.preferred.jwsalgorithm&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.user.oidc.additional.scopes&lt;/SPAN&gt;&lt;SPAN&gt;=${nifi.registry.security.user.oidc.additional.scopes}&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.user.oidc.claim.identifying.user&lt;/SPAN&gt;&lt;SPAN&gt;=${nifi.registry.security.user.oidc.claim.identifying.user}&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.security.user.oidc.claim.groups&lt;/SPAN&gt;&lt;SPAN&gt;=groups&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# revision management #&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# This feature should remain disabled until a future NiFi release that supports the revision API changes&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nifi.registry.revisions.enabled&lt;/SPAN&gt;&lt;SPAN&gt;=false&lt;/SPAN&gt;&lt;/PRE&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 08 Jan 2026 10:44:40 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Authorization-issue-between-NiFi-and-NiFi-Registry/m-p/413264#M253970</guid>
      <dc:creator>pnac03</dc:creator>
      <dc:date>2026-01-08T10:44:40Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization issue between NiFi and NiFi Registry</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Authorization-issue-between-NiFi-and-NiFi-Registry/m-p/413352#M254025</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;Were you able to check the outputs from my last reply? Tried other methods, still no luck..&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jan 2026 09:06:09 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Authorization-issue-between-NiFi-and-NiFi-Registry/m-p/413352#M254025</guid>
      <dc:creator>pnac03</dc:creator>
      <dc:date>2026-01-20T09:06:09Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization issue between NiFi and NiFi Registry</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Authorization-issue-between-NiFi-and-NiFi-Registry/m-p/413353#M254026</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/134112"&gt;@pnac03&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Based on your nifi-registry.properties file, there is no user identity manipulation happening.&amp;nbsp; This means that the full DistinquishedName (DN) presented by NiFi in the MutualTLS exchange with NiFi-Registry will be the user identity for the registry client connecting to your NiFi-Registry.&amp;nbsp; That means that the full DN needs to be authorized in NiFi-Registry properly.&amp;nbsp; That DN needs to be authorized for the following Special Privileges:&lt;BR /&gt;&lt;BR /&gt;"Can manage buckets" - Read&lt;BR /&gt;"Can proxy user requests" - Read, Write, and Delete&lt;BR /&gt;&lt;BR /&gt;From the keystore you shared fro your SSL Context Service, we can see it properly contains only one PrivateKeyEntry and the DN for that clientAuth privateKey is:&lt;/P&gt;&lt;PRE&gt;O=3SCDemo, CN=nifi-registry&lt;/PRE&gt;&lt;P&gt;So the above (case sensitive) MUST exist as a user in your NiFi-Registry and have granted to it the above special Privileges mentioned.&lt;BR /&gt;&lt;BR /&gt;Also, the user identity of the user logged into NiFi (as displayed in upper right corner - case sensitive) when attempting start version control on a process group in NiFi will need to exist as a user in your NiFi-Registry and be authorized properly directly on the bucket in which you want to version control the process group (this is different then the Special Privileges section in NiFi-Registry).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Read Bucket - Allows user to see version controlled flows in the bucket.&lt;BR /&gt;Write Bucket - Allows user to commit new version controlled flows to the bucket&lt;BR /&gt;Delete Bucket - allows user to delete a bucket.&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;Please help our community grow. If you found&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Accept as Solution&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;" on&amp;nbsp;&lt;STRONG&gt;one or more&lt;/STRONG&gt;&amp;nbsp;of them that helped.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;BR /&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jan 2026 13:42:21 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Authorization-issue-between-NiFi-and-NiFi-Registry/m-p/413353#M254026</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2026-01-20T13:42:21Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization issue between NiFi and NiFi Registry</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Authorization-issue-between-NiFi-and-NiFi-Registry/m-p/413552#M254131</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Probably as a result of a nifikop-operator based, LDAP-Authenticated, Clustered Nifi setup, I had to give permissions to both the DN you mentioned and my nifi user (as visible on the top right corner of my nifi UI).&lt;/P&gt;&lt;P&gt;Effective Permissions:&lt;BR /&gt;- Can Proxy User Requests and Can Manage Buckets to both the Users&lt;BR /&gt;- Read, Write and Delete (if required) access to my buckets&lt;BR /&gt;&lt;BR /&gt;Now I'm able to list and interact with my buckets from my nifi UI!&lt;/P&gt;</description>
      <pubDate>Sat, 14 Feb 2026 21:10:27 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Authorization-issue-between-NiFi-and-NiFi-Registry/m-p/413552#M254131</guid>
      <dc:creator>pnac03</dc:creator>
      <dc:date>2026-02-14T21:10:27Z</dc:date>
    </item>
  </channel>
</rss>

