Security
Recommendations
Identity and policies in NiFi
TLS/SSL Configuration
Enabling Auto-TLS
Configuring TLS/SSL manually
TLS/SSL certificate requirements and recommendations
Configuring TLS/SSL encryption manually for NiFi and NiFi Registry
NiFi TLS/SSL properties
NiFi Registry TLS/SSL properties
Authentication
Kerberos authentication
Customizing Kerberos principal
LDAP authentication
SAML authentication
OpenID Connect authentication
Identity-Mapping properties
Hardening Znodes
Authorization
User group providers
LDAP Integration
LDAP and Ranger Policies
LDAP and File-Based Policies
LDAP User Group Provider Properties
Pairing LDAP with a Composite Group Provider
Access Policies providers
Ranger authorization
Understanding the Ranger Authorization Process for CFM
Ranger-based NiFi policy descriptions
Predefined Ranger Access Policies for Apache NiFi
Predefined Ranger Access Policies for Apache NiFi Registry
Predefined component-level policies for NiFi
NiFi Restricted Components
Add user to a pre-defined Ranger access policy
Create a custom Ranger access policy
Authorization example
Enable access to Knox and NiFi
File-based authorization
Migrating file-based authorization to Ranger
Migrating NiFi File-Based authorization to Ranger
Migrating NiFi Registry file-based authorization to Ranger
Environment variables
Kerberos credentials
Local file system access
Network
Default ports for NiFi and NiFi Registry
FIPS 140-2 compliance
Encrypting NiFi sensitive properties with FIPS 140-2 approved algorithm
Deploying Cloudera Flow Management on FIPS-enabled clusters
Integrations
Integrating NiFi and Atlas
Manually integrating with Atlas when Auto-TLS is not enabled
Manually integrating with Atlas when Auto-TLS is enabled
Integrating NiFi and NiFi Registry with Knox
Enhancing or overwriting properties in Cloudera Manager