Encrypted Passwords in Configuration Files
In order to facilitate the secure setup of NiFi, you can use the
encrypt-config command line utility to encrypt raw configuration values that NiFi decrypts in memory on startup. This extensible protection scheme transparently allows NiFi to use raw values in operation, while protecting them at rest. In the future, hardware security modules (HSM) and external secure storage mechanisms will be integrated, but for now, an AES encryption provider is the default implementation.
This is a change in behavior; prior to 1.0, all configuration values were stored in plaintext on the file system. POSIX file permissions were recommended to limit unauthorized access to these files.
If no administrator action is taken, the configuration values remain unencrypted.
For more information, see the encrypt_config Tool section in the NiFi Toolkit Guide.