<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: NiFi Security configuration - SSLHandshakeException: Received fatal alert: certificate_unknown in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-Security-configuration-SSLHandshakeException-Received/m-p/194319#M73695</link>
    <description>&lt;A rel="user" href="https://community.cloudera.com/users/62158/andrewtwigg.html" nodeid="62158"&gt;@Andrew Twigg&lt;/A&gt;&lt;P&gt;Make sure that your keystore and certs meet the following:&lt;/P&gt;&lt;P&gt; - The keystore file used on each server contains only a single PrivateKeyEntry.&lt;/P&gt;&lt;P&gt; - The certificate in the keystore has an extended key usage that includes both client auth and server auth&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
    <pubDate>Fri, 19 Jan 2018 22:35:05 GMT</pubDate>
    <dc:creator>MattWho</dc:creator>
    <dc:date>2018-01-19T22:35:05Z</dc:date>
    <item>
      <title>NiFi Security configuration - SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-Security-configuration-SSLHandshakeException-Received/m-p/194318#M73694</link>
      <description>&lt;P&gt;We’re working on securing NiFi and I’m coming across an
issue where I intermittently get an exception. The environment is a two-node
NiFi cluster which is configured to authenticate users using LDAPS, and authorise them using the FileAccessPolicyProvider / FileUserGroupProvider which we plan to replace with LDAPS.&lt;/P&gt;&lt;P&gt;The login looks to be working. I think this is the
authorisation part which is failing (although it works sometimes - before cluster voting completes). We have
configured a certificate trust store for the CA (which is an internal CA), and
a key store for the SSL cert.&lt;/P&gt;&lt;P&gt;Note: We're using a san cert for SSL.&lt;/P&gt;&lt;P&gt;&lt;IMG style="height:2.093in;width:6.229in" /&gt;&lt;/P&gt;&lt;P&gt;Exception is…&lt;/P&gt;&lt;P&gt;2018-01-19 08:41:23,999 WARN
[Replicate Request Thread-9] o.a.n.c.c.h.r.ThreadPoolRequestReplicator Failed
to replicate request GET /nifi-api/flow/current-user to 10.101.50.5:8443 due to
com.sun.jersey.api.client.ClientHandlerException:
javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown&lt;/P&gt;&lt;P&gt;2018-01-19 08:41:23,999 WARN
[Replicate Request Thread-10] o.a.n.c.c.h.r.ThreadPoolRequestReplicator Failed to
replicate request GET /nifi-api/flow/current-user to 10.101.50.4:8443 due to
com.sun.jersey.api.client.ClientHandlerException: java.net.SocketException:
Broken pipe (Write failed)&lt;/P&gt;&lt;P&gt;2018-01-19 08:41:24,000 WARN
[Replicate Request Thread-9] o.a.n.c.c.h.r.ThreadPoolRequestReplicator&lt;/P&gt;&lt;P&gt;com.sun.jersey.api.client.ClientHandlerException:
javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown&lt;/P&gt;&lt;P&gt; 
at
com.sun.jersey.client.urlconnection.URLConnectionClientHandler.handle(URLConnectionClientHandler.java:155)&lt;/P&gt;&lt;P&gt; 
at com.sun.jersey.api.client.Client.handle(Client.java:652)&lt;/P&gt;&lt;P&gt; 
at
com.sun.jersey.api.client.filter.GZIPContentEncodingFilter.handle(GZIPContentEncodingFilter.java:123)&lt;/P&gt;&lt;P&gt; 
at com.sun.jersey.api.client.WebResource.handle(WebResource.java:682)&lt;/P&gt;&lt;P&gt; 
at com.sun.jersey.api.client.WebResource.access$200(WebResource.java:74)&lt;/P&gt;&lt;P&gt; 
at com.sun.jersey.api.client.WebResource$Builder.get(WebResource.java:509)&lt;/P&gt;&lt;P&gt; 
at org.apache.nifi.cluster.coordination.http.replication.ThreadPoolRequestReplicator.replicateRequest(ThreadPoolRequestReplicator.java:641)&lt;/P&gt;&lt;P&gt; 
at
org.apache.nifi.cluster.coordination.http.replication.ThreadPoolRequestReplicator$NodeHttpRequest.run(ThreadPoolRequestReplicator.java:852)&lt;/P&gt;&lt;P&gt; 
at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511)&lt;/P&gt;&lt;P&gt; 
at java.util.concurrent.FutureTask.run(FutureTask.java:266)&lt;/P&gt;&lt;P&gt; 
at
java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)&lt;/P&gt;&lt;P&gt; 
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)&lt;/P&gt;&lt;P&gt; 
at java.lang.Thread.run(Thread.java:748)&lt;/P&gt;&lt;P&gt;Caused by:
javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.Alerts.getSSLException(Alerts.java:192)&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.Alerts.getSSLException(Alerts.java:154)&lt;/P&gt;&lt;P&gt; 
 at
sun.security.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:2033)&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1135)&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1385)&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1413)&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1397)&lt;/P&gt;&lt;P&gt; 
at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559)&lt;/P&gt;&lt;P&gt; 
at
sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185)&lt;/P&gt;&lt;P&gt; 
at sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1564)&lt;/P&gt;&lt;P&gt; 
at
sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1492)&lt;/P&gt;&lt;P&gt; 
at java.net.HttpURLConnection.getResponseCode(HttpURLConnection.java:480)&lt;/P&gt;&lt;P&gt; 
at sun.net.www.protocol.https.HttpsURLConnectionImpl.getResponseCode(HttpsURLConnectionImpl.java:347)&lt;/P&gt;&lt;P&gt; 
at
com.sun.jersey.client.urlconnection.URLConnectionClientHandler._invoke(URLConnectionClientHandler.java:253)&lt;/P&gt;&lt;P&gt; 
at com.sun.jersey.client.urlconnection.URLConnectionClientHandler.handle(URLConnectionClientHandler.java:153)&lt;/P&gt;&lt;P&gt; 
... 12 common frames omitted&lt;/P&gt;&lt;P&gt;2018-01-19 08:41:24,000 WARN
[Replicate Request Thread-10] o.a.n.c.c.h.r.ThreadPoolRequestReplicator&lt;/P&gt;&lt;P&gt;com.sun.jersey.api.client.ClientHandlerException:
java.net.SocketException: Broken pipe (Write failed)&lt;/P&gt;&lt;P&gt; 
at
com.sun.jersey.client.urlconnection.URLConnectionClientHandler.handle(URLConnectionClientHandler.java:155)&lt;/P&gt;&lt;P&gt; 
at com.sun.jersey.api.client.Client.handle(Client.java:652)&lt;/P&gt;&lt;P&gt; 
at com.sun.jersey.api.client.filter.GZIPContentEncodingFilter.handle(GZIPContentEncodingFilter.java:123)&lt;/P&gt;&lt;P&gt; 
at com.sun.jersey.api.client.WebResource.handle(WebResource.java:682)&lt;/P&gt;&lt;P&gt; 
at com.sun.jersey.api.client.WebResource.access$200(WebResource.java:74)&lt;/P&gt;&lt;P&gt; 
at com.sun.jersey.api.client.WebResource$Builder.get(WebResource.java:509)&lt;/P&gt;&lt;P&gt; 
at
org.apache.nifi.cluster.coordination.http.replication.ThreadPoolRequestReplicator.replicateRequest(ThreadPoolRequestReplicator.java:641)&lt;/P&gt;&lt;P&gt; 
at org.apache.nifi.cluster.coordination.http.replication.ThreadPoolRequestReplicator$NodeHttpRequest.run(ThreadPoolRequestReplicator.java:852)&lt;/P&gt;&lt;P&gt; 
at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511)&lt;/P&gt;&lt;P&gt; 
at java.util.concurrent.FutureTask.run(FutureTask.java:266)&lt;/P&gt;&lt;P&gt; 
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)&lt;/P&gt;&lt;P&gt; 
at
java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)&lt;/P&gt;&lt;P&gt; 
at java.lang.Thread.run(Thread.java:748)&lt;/P&gt;&lt;P&gt;Caused by:
java.net.SocketException: Broken pipe (Write failed)&lt;/P&gt;&lt;P&gt; 
at java.net.SocketOutputStream.socketWrite0(Native Method)&lt;/P&gt;&lt;P&gt; 
at java.net.SocketOutputStream.socketWrite(SocketOutputStream.java:111)&lt;/P&gt;&lt;P&gt; 
at java.net.SocketOutputStream.write(SocketOutputStream.java:155)&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.OutputRecord.writeBuffer(OutputRecord.java:431)&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.OutputRecord.write(OutputRecord.java:417)&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.SSLSocketImpl.writeRecordInternal(SSLSocketImpl.java:886)&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.SSLSocketImpl.writeRecord(SSLSocketImpl.java:857)&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.SSLSocketImpl.writeRecord(SSLSocketImpl.java:727)&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.Handshaker.sendChangeCipherSpec(Handshaker.java:1124)&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.ClientHandshaker.sendChangeCipherAndFinish(ClientHandshaker.java:1216)&lt;/P&gt;&lt;P&gt; 
at
sun.security.ssl.ClientHandshaker.serverHelloDone(ClientHandshaker.java:1128)&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:348)&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.Handshaker.processLoop(Handshaker.java:1026)&lt;/P&gt;&lt;P&gt; 
 at
sun.security.ssl.Handshaker.process_record(Handshaker.java:961)&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1072)&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1385)&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1413)&lt;/P&gt;&lt;P&gt; 
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1397)&lt;/P&gt;&lt;P&gt; 
at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559)&lt;/P&gt;&lt;P&gt; 
at
sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185)&lt;/P&gt;&lt;P&gt; 
at sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1564)&lt;/P&gt;&lt;P&gt; 
at
sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1492)&lt;/P&gt;&lt;P&gt; 
at java.net.HttpURLConnection.getResponseCode(HttpURLConnection.java:480)&lt;/P&gt;&lt;P&gt; 
at sun.net.www.protocol.https.HttpsURLConnectionImpl.getResponseCode(HttpsURLConnectionImpl.java:347)&lt;/P&gt;&lt;P&gt; 
at
com.sun.jersey.client.urlconnection.URLConnectionClientHandler._invoke(URLConnectionClientHandler.java:253)&lt;/P&gt;&lt;P&gt; 
at com.sun.jersey.client.urlconnection.URLConnectionClientHandler.handle(URLConnectionClientHandler.java:153)&lt;/P&gt;&lt;P&gt; 
... 12 common frames omitted&lt;/P&gt;&lt;P&gt;I’ve
tried installing the CA into the
/usr/java/jdk1.8.0_151/jre/lib/security/cacerts which didn’t solve the problem. I've also got the full CA in the keystore and the truststore.&lt;/P&gt;&lt;P&gt;I'm using the domain names as per the certificate in the nifi.properties file for nifi.web.https.host, and for authorizers.xml.&lt;/P&gt;&lt;P&gt;I couldn't seem to get any deeper info from the logging set as DEBUG.&lt;/P&gt;&lt;P&gt;Anyone have any ideas?&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2018 20:13:09 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-Security-configuration-SSLHandshakeException-Received/m-p/194318#M73694</guid>
      <dc:creator>andrew_twigg</dc:creator>
      <dc:date>2018-01-19T20:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: NiFi Security configuration - SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-Security-configuration-SSLHandshakeException-Received/m-p/194319#M73695</link>
      <description>&lt;A rel="user" href="https://community.cloudera.com/users/62158/andrewtwigg.html" nodeid="62158"&gt;@Andrew Twigg&lt;/A&gt;&lt;P&gt;Make sure that your keystore and certs meet the following:&lt;/P&gt;&lt;P&gt; - The keystore file used on each server contains only a single PrivateKeyEntry.&lt;/P&gt;&lt;P&gt; - The certificate in the keystore has an extended key usage that includes both client auth and server auth&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2018 22:35:05 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-Security-configuration-SSLHandshakeException-Received/m-p/194319#M73695</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2018-01-19T22:35:05Z</dc:date>
    </item>
    <item>
      <title>Re: NiFi Security configuration - SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-Security-configuration-SSLHandshakeException-Received/m-p/194320#M73696</link>
      <description>&lt;P&gt;Thanks for your response. This fixed the issue. &lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2018 00:07:18 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-Security-configuration-SSLHandshakeException-Received/m-p/194320#M73696</guid>
      <dc:creator>andrew_twigg</dc:creator>
      <dc:date>2018-01-23T00:07:18Z</dc:date>
    </item>
    <item>
      <title>Re: NiFi Security configuration - SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-Security-configuration-SSLHandshakeException-Received/m-p/381691#M73697</link>
      <description>&lt;P&gt;Ik had hetzelfde probleem en heb meerdere oplossingen geprobeerd die niet hielpen. Ik weet niet zeker waarom.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2024 12:37:20 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-Security-configuration-SSLHandshakeException-Received/m-p/381691#M73697</guid>
      <dc:creator>JamesZhang</dc:creator>
      <dc:date>2024-01-05T12:37:20Z</dc:date>
    </item>
    <item>
      <title>Re: NiFi Security configuration - SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-Security-configuration-SSLHandshakeException-Received/m-p/381692#M73698</link>
      <description>&lt;P&gt;2024-01-05 20:29:50,646 WARN [Replicate Request Thread-2] o.a.n.c.c.h.r.ThreadPoolRequestReplicator Failed to replicate request GET /nifi-api/component-marks/classification to runtime-0.runtime-statefulset.default.svc.cluster.local:443 due to javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown&lt;BR /&gt;2024-01-05 20:29:50,647 WARN [Replicate Request Thread-2] o.a.n.c.c.h.r.ThreadPoolRequestReplicator&lt;BR /&gt;javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown&lt;BR /&gt;at sun.security.ssl.Alerts.getSSLException(Alerts.java:192)&lt;BR /&gt;at sun.security.ssl.Alerts.getSSLException(Alerts.java:154)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:2038)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1135)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1385)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1413)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1397)&lt;BR /&gt;at okhttp3.internal.connection.RealConnection.connectTls(RealConnection.java:336)&lt;BR /&gt;at okhttp3.internal.connection.RealConnection.establishProtocol(RealConnection.java:300)&lt;BR /&gt;at okhttp3.internal.connection.RealConnection.connect(RealConnection.java:185)&lt;BR /&gt;at okhttp3.internal.connection.ExchangeFinder.findConnection(ExchangeFinder.java:224)&lt;BR /&gt;at okhttp3.internal.connection.ExchangeFinder.findHealthyConnection(ExchangeFinder.java:108)&lt;BR /&gt;at okhttp3.internal.connection.ExchangeFinder.find(ExchangeFinder.java:88)&lt;BR /&gt;at okhttp3.internal.connection.Transmitter.newExchange(Transmitter.java:169)&lt;BR /&gt;at okhttp3.internal.connection.ConnectInterceptor.intercept(ConnectInterceptor.java:41)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:142)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:117)&lt;BR /&gt;at okhttp3.internal.cache.CacheInterceptor.intercept(CacheInterceptor.java:94)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:142)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:117)&lt;BR /&gt;at okhttp3.internal.http.BridgeInterceptor.intercept(BridgeInterceptor.java:93)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:142)&lt;BR /&gt;at okhttp3.internal.http.RetryAndFollowUpInterceptor.intercept(RetryAndFollowUpInterceptor.java:88)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:142)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:117)&lt;BR /&gt;at okhttp3.RealCall.getResponseWithInterceptorChain(RealCall.java:229)&lt;BR /&gt;at okhttp3.RealCall.execute(RealCall.java:81)&lt;BR /&gt;at org.apache.nifi.cluster.coordination.http.replication.okhttp.OkHttpReplicationClient.replicate(OkHttpReplicationClient.java:122)&lt;BR /&gt;at org.apache.nifi.cluster.coordination.http.replication.okhttp.OkHttpReplicationClient.replicate(OkHttpReplicationClient.java:116)&lt;BR /&gt;at org.apache.nifi.cluster.coordination.http.replication.ThreadPoolRequestReplicator.replicateRequest(ThreadPoolRequestReplicator.java:629)&lt;BR /&gt;at org.apache.nifi.cluster.coordination.http.replication.ThreadPoolRequestReplicator$NodeHttpRequest.run(ThreadPoolRequestReplicator.java:821)&lt;BR /&gt;at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511)&lt;BR /&gt;at java.util.concurrent.FutureTask.run(FutureTask.java:266)&lt;BR /&gt;at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)&lt;BR /&gt;at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)&lt;BR /&gt;at java.lang.Thread.run(Thread.java:748)&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2024 12:38:56 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-Security-configuration-SSLHandshakeException-Received/m-p/381692#M73698</guid>
      <dc:creator>JamesZhang</dc:creator>
      <dc:date>2024-01-05T12:38:56Z</dc:date>
    </item>
    <item>
      <title>Re: NiFi Security configuration - SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-Security-configuration-SSLHandshakeException-Received/m-p/381693#M73699</link>
      <description>&lt;DIV&gt;# keytool -list -v -keystore truststore.jks&lt;/DIV&gt;&lt;DIV&gt;Enter keystore password:&lt;/DIV&gt;&lt;DIV&gt;Keystore type: jks&lt;/DIV&gt;&lt;DIV&gt;Keystore provider: SUN&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Your keystore contains 1 entry&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Alias name: ca&lt;/DIV&gt;&lt;DIV&gt;Creation date: Jan 5, 2024&lt;/DIV&gt;&lt;DIV&gt;Entry type: trustedCertEntry&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Owner: CN=ca, OU=foo.com&lt;/DIV&gt;&lt;DIV&gt;Issuer: CN=ca, OU=foo.com&lt;/DIV&gt;&lt;DIV&gt;Serial number: ea7f96497446ec07&lt;/DIV&gt;&lt;DIV&gt;Valid from: Wed Dec 13 14:00:40 CST 2023 until: Sat Dec 10 14:00:40 CST 2033&lt;/DIV&gt;&lt;DIV&gt;Certificate fingerprints:&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;MD5:&amp;nbsp; D1:C7:A1:6A:A3:67:65:68:55:B5:6D:0E:74:21:80:71&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;SHA1: 64:60:26:22:94:08:24:BD:75:B7:23:B0:62:6C:3C:FF:A8:62:AB:47&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;SHA256: 37:45:27:2F:B9:A2:A4:40:FC:14:7B:82:CA:D6:57:9D:9D:11:D9:44:13:2F:CC:8D:33:BB:A9:C5:C6:FA:C0:57&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;Signature algorithm name: SHA256withRSA&lt;/DIV&gt;&lt;DIV&gt;Subject Public Key Algorithm: 2048-bit RSA key&lt;/DIV&gt;&lt;DIV&gt;Version: 1&lt;/DIV&gt;</description>
      <pubDate>Fri, 05 Jan 2024 13:07:29 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-Security-configuration-SSLHandshakeException-Received/m-p/381693#M73699</guid>
      <dc:creator>JamesZhang</dc:creator>
      <dc:date>2024-01-05T13:07:29Z</dc:date>
    </item>
    <item>
      <title>Re: NiFi Security configuration - SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-Security-configuration-SSLHandshakeException-Received/m-p/381699#M73700</link>
      <description>&lt;P&gt;Welcome the community&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/108607"&gt;@JamesZhang&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As this is an older post, we recommend starting a new thread. The new thread will provide the opportunity to provide details specific to your environment that could aid others in providing a more accurate answer to your question.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2024 17:45:33 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/NiFi-Security-configuration-SSLHandshakeException-Received/m-p/381699#M73700</guid>
      <dc:creator>cjervis</dc:creator>
      <dc:date>2024-01-05T17:45:33Z</dc:date>
    </item>
  </channel>
</rss>

