@agrayush
Once you secure NiFi and/or NiFi-Registry (configured for HTTPS), MutualTLS based authentication will always be supported. When you access the HTTPS URL for either service, in the TLS exchange the service (NiFi or NiFi-Registry will "WANT" a client auth certificate). When a client certificate is NOT provided, the services will attempt to authenticate the user/client via another configured Authentication method. My guess here is that when you originally secured your NiFi and NiFi-Registry services, you used the TLS toolkit to create your user/client certificate which you then loaded into your browser. When you accessed the service, the browser presented that client certificate (depending on browser you may have even been prompted by the browser to confirm using the certificate). At this point the browser retains your certificate. preference for the target URL(s). Now that you have configured another authentication method, the browser is still going to present that certificate and the service us going to take it. You can not disable client certificate authentication as it is the only supported auth method for connecting between nodes in a NiFi cluster and NiFi authentication with NiFi-Registry.
I suggest you remove the sys_admin certificate from your browser, clear all cookies/site data from your browser, and and then restart the service again.
If you found that the provided solution(s) assisted you with your query, please take a moment to login and click Accept as Solution below each response that helped.
Thank you,
Matt