<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question NiFi support for Active Directory Groups in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-support-for-Active-Directory-Groups/m-p/157483#M53191</link>
    <description>&lt;P&gt;I'm trying to permission NiFi using Active Directory groups.&lt;/P&gt;&lt;P&gt;I'm aware there is a problem using groups in AD with the NiFi-Ranger plugin, but I'm attempting to authorize using the Kerberos identity provider and and the file provider within NiFi itself.&lt;/P&gt;&lt;P&gt;Is there any way to pull in AD groups into the NiFi application, and use them to authorize access? Ideally I don't want to create static groups in NiFi that contain my principals, which are updated manually.&lt;/P&gt;&lt;P&gt;As a fallback I was considering writing a script that generates NiFi groups based on an ldapsearch and populates it with the relevant principals.&lt;/P&gt;</description>
    <pubDate>Tue, 21 Apr 2026 12:25:23 GMT</pubDate>
    <dc:creator>ollie1</dc:creator>
    <dc:date>2026-04-21T12:25:23Z</dc:date>
    <item>
      <title>NiFi support for Active Directory Groups</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-support-for-Active-Directory-Groups/m-p/157483#M53191</link>
      <description>&lt;P&gt;I'm trying to permission NiFi using Active Directory groups.&lt;/P&gt;&lt;P&gt;I'm aware there is a problem using groups in AD with the NiFi-Ranger plugin, but I'm attempting to authorize using the Kerberos identity provider and and the file provider within NiFi itself.&lt;/P&gt;&lt;P&gt;Is there any way to pull in AD groups into the NiFi application, and use them to authorize access? Ideally I don't want to create static groups in NiFi that contain my principals, which are updated manually.&lt;/P&gt;&lt;P&gt;As a fallback I was considering writing a script that generates NiFi groups based on an ldapsearch and populates it with the relevant principals.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 12:25:23 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-support-for-Active-Directory-Groups/m-p/157483#M53191</guid>
      <dc:creator>ollie1</dc:creator>
      <dc:date>2026-04-21T12:25:23Z</dc:date>
    </item>
    <item>
      <title>Re: NiFi support for Active Directory Groups</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-support-for-Active-Directory-Groups/m-p/157484#M53192</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/14834/ollie.html" nodeid="14834"&gt;@Oliver Fletcher&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Authentication and authorization are two separate processes within NiFi.&lt;/P&gt;&lt;P&gt;There is no way currently for NiFi to pull LDAP groups in to its authorizer.  While NiFi's file based local authorizer does support groups, those groups are not mapped to any LDAP groups.  With NiFi's latest release authentication via LDAP supports only two "Identity Strategies":&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;CODE&gt;Identity Strategy&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;Strategy
 to identify users. Possible values are USE_DN and USE_USERNAME. The 
default functionality if this property is missing is USE_DN in order to 
retain backward
compatibility. USE_DN will use the full DN of the user entry if 
possible. USE_USERNAME will use the username the user logged in with.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;
So either the DN returned by LDAP (USE_DN) or the username enter on the login screen (USE_USERNAME) is passed to the authorizer post any configured pattern mapping.  There are currently is no Strategy for passing the user's LDAP group to the authorizer.&lt;/P&gt;&lt;P&gt;NiFi has no support for Ranger groups as you are already aware.  However, you could create a set of groups in NiFi's local file based authorizers that each provide a distinct set of access policies.  You could then use your script idea to conduct ldap searches and map users DNs or usernames to those specific NiFi groups.  You scripts could make calls to the nifi-api to automate adding these users to the those groups.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 21:01:37 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-support-for-Active-Directory-Groups/m-p/157484#M53192</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2017-02-02T21:01:37Z</dc:date>
    </item>
  </channel>
</rss>

