<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Need a simple  &amp;quot;How To&amp;quot; for  Nifi-AD / LDAP integration in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Need-a-simple-quot-How-To-quot-for-Nifi-AD-LDAP-integration/m-p/413491#M254086</link>
    <description>&lt;P&gt;Hi all,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I recently spent a full 2 days over a rainy weekend trying to get a stand alone instance of Nifi v2.5.0 on ubuntu 22.04 trying to integrate with AD,&amp;nbsp; to use AD for Nifi authentication, but with no joy. It almost worked but couldn't get past a certain point. The problem I discovered is there doesn't seem to exist on the internet&amp;nbsp; a simple step by step process on how to set up Nifi with AD/LDAP.&lt;/P&gt;&lt;P&gt;My set up is a linux PC called &lt;STRONG&gt;nifi1&lt;/STRONG&gt; and had an old windows 2012 R2 domain controller with LDAP running on it I decided to use.&lt;/P&gt;&lt;P&gt;I created a domain called&amp;nbsp; &lt;STRONG&gt;testdomain.local&lt;/STRONG&gt; and created a domain user called &lt;STRONG&gt;testuser&lt;/STRONG&gt; in the AD &lt;STRONG&gt;User OU&lt;/STRONG&gt; that I wanted to use as a nifi user. I also created a service account called &lt;STRONG&gt;svc-nifi&lt;/STRONG&gt; also in the &lt;STRONG&gt;User OU&lt;/STRONG&gt; that is used to log onto AD as a service.&lt;/P&gt;&lt;P&gt;I ran a series of tests using LDAP command line queries from the linux PC whereby the service account could run LDAP queries from linux that proved it could access AD, read the AD info it needed and could connect OK to AD etc. The testuser logon also works fine in logging onto the domain on other PCs.&lt;/P&gt;&lt;P&gt;Is there a documented basic step by step process of how to do this on a linux ( or windows ) PC please?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just need the minimum basic working example of &lt;STRONG&gt;nifi.properties, authorizers.xml, uses.xml and authorize.xml&lt;/STRONG&gt; etc files please. There are so many variables in each file that make it difficult to work through sequentially, as I dont have expert Nifi knowledge.&lt;/P&gt;&lt;P&gt;I wondered if I had maybe skipped a step or something, like :&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; * Do I need to add the linux PC to AD itself first , and if so, how is this set up in the&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; config files?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;* What do i need to add to the nifi.properties, authorizers.xml file etc to get it to work please?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; * etc.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Any help appreciated - this should really be simple, but its not......&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm happy to write up a step by process and post it back here once I have it running, to help others.&lt;/P&gt;&lt;P&gt;Thanks in advance. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 03 Feb 2026 05:01:35 GMT</pubDate>
    <dc:creator>zzzz77</dc:creator>
    <dc:date>2026-02-03T05:01:35Z</dc:date>
    <item>
      <title>Need a simple  "How To" for  Nifi-AD / LDAP integration</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Need-a-simple-quot-How-To-quot-for-Nifi-AD-LDAP-integration/m-p/413491#M254086</link>
      <description>&lt;P&gt;Hi all,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I recently spent a full 2 days over a rainy weekend trying to get a stand alone instance of Nifi v2.5.0 on ubuntu 22.04 trying to integrate with AD,&amp;nbsp; to use AD for Nifi authentication, but with no joy. It almost worked but couldn't get past a certain point. The problem I discovered is there doesn't seem to exist on the internet&amp;nbsp; a simple step by step process on how to set up Nifi with AD/LDAP.&lt;/P&gt;&lt;P&gt;My set up is a linux PC called &lt;STRONG&gt;nifi1&lt;/STRONG&gt; and had an old windows 2012 R2 domain controller with LDAP running on it I decided to use.&lt;/P&gt;&lt;P&gt;I created a domain called&amp;nbsp; &lt;STRONG&gt;testdomain.local&lt;/STRONG&gt; and created a domain user called &lt;STRONG&gt;testuser&lt;/STRONG&gt; in the AD &lt;STRONG&gt;User OU&lt;/STRONG&gt; that I wanted to use as a nifi user. I also created a service account called &lt;STRONG&gt;svc-nifi&lt;/STRONG&gt; also in the &lt;STRONG&gt;User OU&lt;/STRONG&gt; that is used to log onto AD as a service.&lt;/P&gt;&lt;P&gt;I ran a series of tests using LDAP command line queries from the linux PC whereby the service account could run LDAP queries from linux that proved it could access AD, read the AD info it needed and could connect OK to AD etc. The testuser logon also works fine in logging onto the domain on other PCs.&lt;/P&gt;&lt;P&gt;Is there a documented basic step by step process of how to do this on a linux ( or windows ) PC please?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just need the minimum basic working example of &lt;STRONG&gt;nifi.properties, authorizers.xml, uses.xml and authorize.xml&lt;/STRONG&gt; etc files please. There are so many variables in each file that make it difficult to work through sequentially, as I dont have expert Nifi knowledge.&lt;/P&gt;&lt;P&gt;I wondered if I had maybe skipped a step or something, like :&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; * Do I need to add the linux PC to AD itself first , and if so, how is this set up in the&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; config files?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;* What do i need to add to the nifi.properties, authorizers.xml file etc to get it to work please?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; * etc.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Any help appreciated - this should really be simple, but its not......&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm happy to write up a step by process and post it back here once I have it running, to help others.&lt;/P&gt;&lt;P&gt;Thanks in advance. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Feb 2026 05:01:35 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Need-a-simple-quot-How-To-quot-for-Nifi-AD-LDAP-integration/m-p/413491#M254086</guid>
      <dc:creator>zzzz77</dc:creator>
      <dc:date>2026-02-03T05:01:35Z</dc:date>
    </item>
    <item>
      <title>Re: Need a simple  "How To" for  Nifi-AD / LDAP integration</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Need-a-simple-quot-How-To-quot-for-Nifi-AD-LDAP-integration/m-p/413508#M254099</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/136792"&gt;@zzzz77&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I can certainly help you with the structured setup commonly used when integrating NIFi with LDAP.&amp;nbsp; NiFi authentication and authorization are different processes and configurations.&amp;nbsp; You can even authenticate using LDAP and not use LDAP at all during authorization. Also need to be aware that only a secured NiFi setup over HTTPS can support authentication and authorization.&lt;BR /&gt;&lt;BR /&gt;Since Authentication needs to happen first, we'll start there.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://nifi.apache.org/nifi-docs/administration-guide.html#ldap_login_identity_provider" target="_blank" rel="noopener"&gt;LDAP authentication&lt;/A&gt; is configured as a login provider inside the login-identity-providers.xml configuration file:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;provider&amp;gt;
    &amp;lt;identifier&amp;gt;ldap-provider&amp;lt;/identifier&amp;gt;
    &amp;lt;class&amp;gt;org.apache.nifi.ldap.LdapProvider&amp;lt;/class&amp;gt;
    &amp;lt;property name="Authentication Strategy"&amp;gt;START_TLS&amp;lt;/property&amp;gt;

    &amp;lt;property name="Manager DN"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;property name="Manager Password"&amp;gt;&amp;lt;/property&amp;gt;

    &amp;lt;property name="TLS - Keystore"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;property name="TLS - Keystore Password"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;property name="TLS - Keystore Type"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;property name="TLS - Truststore"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;property name="TLS - Truststore Password"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;property name="TLS - Truststore Type"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;property name="TLS - Client Auth"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;property name="TLS - Protocol"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;property name="TLS - Shutdown Gracefully"&amp;gt;&amp;lt;/property&amp;gt;

    &amp;lt;property name="Referral Strategy"&amp;gt;FOLLOW&amp;lt;/property&amp;gt;
    &amp;lt;property name="Connect Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;
    &amp;lt;property name="Read Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;

    &amp;lt;property name="Url"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;property name="User Search Base"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;property name="User Search Filter"&amp;gt;&amp;lt;/property&amp;gt;

    &amp;lt;property name="Identity Strategy"&amp;gt;USE_DN&amp;lt;/property&amp;gt;
    &amp;lt;property name="Authentication Expiration"&amp;gt;12 hours&amp;lt;/property&amp;gt;
&amp;lt;/provider&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The actual configuration is dependent on your LDAP setup.&amp;nbsp; You can refer to the linked documentation for each field.&amp;nbsp; Depending on "Authentication Strategy" setting, TLS properties may not need to be configured.&amp;nbsp; The "identifier" for this provider is "ldap-provider".&amp;nbsp; &amp;nbsp;The "Identity Strategy" is used to decide what string is used as the authenticated users identity.&amp;nbsp; Options are "USE_DN" (use the full DN from the LDAP entry) or "USE_USERNAME" (use the username as typed in the login window).&amp;nbsp; &amp;nbsp;USE_USERNAME is commonly used.&lt;BR /&gt;&lt;BR /&gt;This identifier needs to be configured in the nifi.properties file, so NiFi knows which login-provider NiFi should be using.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nifi.security.user.login.identity.provider=ldap-provider&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now we need to setup the authorizers.xml file so we can setup authorizations for the ldap users.&amp;nbsp; Here you have two options, you can manually add the ldap user identities via the "user-group-provider" or you can sync the user identities directly from ldap using the "ldap-user-group-provider".&amp;nbsp; Sometimes you want both if not all your users/clients are part of LDAP (this applies to user identities derived from clientAuth certificates during a mutualTLS exchange).&amp;nbsp; &amp;nbsp;Both would commonly be necessary for a NiFi cluster setup.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;Since you are setting up a single instance (non cluster) NiFi, I'll show how to structure your authorizers.xml file using just the ldap-user-group-provider:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;    &amp;lt;userGroupProvider&amp;gt;
        &amp;lt;identifier&amp;gt;ldap-user-group-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.ldap.tenants.LdapUserGroupProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Authentication Strategy"&amp;gt;SIMPLE&amp;lt;/property&amp;gt;

        &amp;lt;property name="Manager DN"&amp;gt;cn=Manager,dc=nifi,dc=hwx&amp;lt;/property&amp;gt;
        &amp;lt;property name="Manager Password"&amp;gt;password&amp;lt;/property&amp;gt;

        &amp;lt;property name="TLS - Keystore"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Keystore Password"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Keystore Type"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Truststore"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Truststore Password"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Truststore Type"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Client Auth"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Protocol"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="TLS - Shutdown Gracefully"&amp;gt;&amp;lt;/property&amp;gt;

        &amp;lt;property name="Referral Strategy"&amp;gt;FOLLOW&amp;lt;/property&amp;gt;
        &amp;lt;property name="Connect Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;
        &amp;lt;property name="Read Timeout"&amp;gt;10 secs&amp;lt;/property&amp;gt;

        &amp;lt;property name="Url"&amp;gt;ldap://&amp;lt;ip or hostname&amp;gt;:389&amp;lt;/property&amp;gt;
        &amp;lt;property name="Page Size"&amp;gt;500&amp;lt;/property&amp;gt;
        &amp;lt;property name="Sync Interval"&amp;gt;30 mins&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Membership - Enforce Case Sensitivity"&amp;gt;false&amp;lt;/property&amp;gt;

        &amp;lt;property name="User Search Base"&amp;gt;ou=People,dc=nifi,dc=hwx&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Object Class"&amp;gt;inetOrgPerson&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Search Scope"&amp;gt;SUBTREE&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Search Filter"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Identity Attribute"&amp;gt;cn&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Group Name Attribute"&amp;gt;memberOf&amp;lt;/property&amp;gt;
        &amp;lt;property name="User Group Name Attribute - Referenced Group Attribute"&amp;gt;&amp;lt;/property&amp;gt;

        &amp;lt;property name="Group Search Base"&amp;gt;ou=Group,dc=nifi,dc=hwx&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Object Class"&amp;gt;groupOfNames&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Search Scope"&amp;gt;SUBTREE&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Search Filter"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Name Attribute"&amp;gt;cn&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Member Attribute"&amp;gt;member&amp;lt;/property&amp;gt;
        &amp;lt;property name="Group Member Attribute - Referenced User Attribute"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;/userGroupProvider&amp;gt;

    &amp;lt;accessPolicyProvider&amp;gt;
        &amp;lt;identifier&amp;gt;file-access-policy-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAccessPolicyProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="User Group Provider"&amp;gt;ldap-user-group-provider&amp;lt;/property&amp;gt;
        &amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;
        &amp;lt;property name="Initial Admin Identity"&amp;gt;nifiadmin&amp;lt;/property&amp;gt;
        &amp;lt;property name="Node Identity 1"&amp;gt;&amp;lt;/property&amp;gt;
        &amp;lt;property name="Node Group"&amp;gt;&amp;lt;/property&amp;gt;
    &amp;lt;/accessPolicyProvider&amp;gt;

    &amp;lt;authorizer&amp;gt;
        &amp;lt;identifier&amp;gt;managed-authorizer&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.StandardManagedAuthorizer&amp;lt;/class&amp;gt;
        &amp;lt;property name="Access Policy Provider"&amp;gt;file-access-policy-provider&amp;lt;/property&amp;gt;
    &amp;lt;/authorizer&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;Above authorizer is the most basic setup example assuming an unsecure ldap setup as the example. You can see it has three sections.&amp;nbsp; The bets way to read an authorizers.xml configuration is from the bottom up starting with the "authorizer".&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;In this example you can see I am using the "&lt;A href="https://nifi.apache.org/nifi-docs/administration-guide.html#standardmanagedauthorizer" target="_blank" rel="noopener"&gt;StandardManagedAuthorizer&lt;/A&gt;" which has an identifier of "managed-authorizer" and it is configured to reference the "file-access-policy-provider".&amp;nbsp; So the next provider we should find going up through the authorizers.xml will be the provider with the identifier "file-access-policy-provider".&lt;BR /&gt;&lt;BR /&gt;The "&lt;A href="https://nifi.apache.org/nifi-docs/administration-guide.html#fileaccesspolicyprovider" target="_blank" rel="noopener"&gt;FileAccessPolicyProvider&lt;/A&gt;" is responsible for persisting the granted authorizations in a file name "authorizations.xml". This provider will also set some initial authorizations for the user identity set in the "Initial Admin Identity" field and the for any "Node Identity &amp;lt;num&amp;gt;" field entries.&amp;nbsp; &amp;nbsp;We can see that this provider is learning about users and groups from the "ldap-user-group-provider".&lt;BR /&gt;IMPORTANT NOTES:&amp;nbsp; This provider will only create the authorizations.xml file if it does NOT already exist.&amp;nbsp; So if you make any changes to this provider, those changes would not be reflected in an already existing authorizations.xml file.&amp;nbsp; &amp;nbsp;Also any identity strings set this provider must be returned by a user-group-provider(s).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;So the next provider needed has the identifier "ldap-user-group-provider" and needs to be located further up in this authorizations.xml file.&amp;nbsp; So we locate the "&lt;A href="https://nifi.apache.org/nifi-docs/administration-guide.html#ldapusergroupprovider" target="_blank" rel="noopener"&gt;LdapUserGroupProvider&lt;/A&gt;" which has this identifier.&amp;nbsp; This provider has no reference to any additional providers.&amp;nbsp; While i shared a very basic sample configuration, your configuration will be specific to your ldap server source. My example is configured to sync users and groups from ldap.&amp;nbsp; You can choose to sync users or users and groups.&amp;nbsp; You can not sync just groups.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Inside the nifi.properties file you will set the authorizer you want to use:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nifi.security.user.authorizer=managed-authorizer&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;Now that we have the authentication and authorization setup complete, let's walk through what happens when you access NiFi's "https://&amp;lt;hostname&amp;gt;:&amp;lt;port&amp;gt;/nifi" url.&lt;BR /&gt;A mutualTLS exchange with the client (browser) will occur where NiFi will "WANT" a clientAuth certificate.&amp;nbsp; Of one is not presented in that exchange, NiFi will redirect to the login UI:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattWho_0-1770226469105.png" style="width: 678px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/46612i3C67DA9F5C0C5AF4/image-dimensions/678x446?v=v2" width="678" height="446" role="button" title="MattWho_0-1770226469105.png" alt="MattWho_0-1770226469105.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Here the user will supply their ldap username and password.&amp;nbsp; &amp;nbsp;Assuming the ldap-login-identity-provider is using "USE_USERNAME" and authentication was successful, the username (case sensitive) as typed in the username field will be passed to the managed authorizer to check what authorizations are in place for that user.&amp;nbsp; Before that user identity reaches the managed authorizer, it is compared against the any&amp;nbsp;&lt;A href="https://nifi.apache.org/nifi-docs/administration-guide.html#identity-mapping-properties" target="_blank" rel="noopener"&gt;Identity Mapping Properties&lt;/A&gt;&amp;nbsp;configured in the nifi.properties file to see if any string manipulation should happen.&amp;nbsp; Next the string (manipulated if mapping was applied) goes to the authorizer.&amp;nbsp; First the authorizer will check to see if that user identity belongs to any groups.&amp;nbsp; Then it will check if the user or any groups that user is known to be member of (based on returns from ldap-user-group-provider sync) has proper authorizations to access the NiFi UI.&amp;nbsp; &amp;nbsp;If proper authorization exist, you will see the NiFi UI and the user identity will show in the upper right corner.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattWho_1-1770226930489.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/46613i280F7B5635B58C4C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattWho_1-1770226930489.png" alt="MattWho_1-1770226930489.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;If there are authorization issues, you'll find that logged in the nifi-user.log.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please help our community grow. If you found&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Accept as Solution&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;" on&amp;nbsp;&lt;STRONG&gt;one or more&lt;/STRONG&gt;&amp;nbsp;of them that helped.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;BR /&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Feb 2026 17:46:01 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Need-a-simple-quot-How-To-quot-for-Nifi-AD-LDAP-integration/m-p/413508#M254099</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2026-02-04T17:46:01Z</dc:date>
    </item>
  </channel>
</rss>

