Security
Cluster-level security recommendations
Identity and policies
TLS/SSL configuration
Enabling Auto-TLS
Configuring TLS/SSL manually
Requirements and recommendations
Configuring TLS/SSL encryption manually
NiFi TLS/SSL properties
NiFi Registry TLS/SSL properties
Authentication
Kerberos authentication
Customizing Kerberos principal
LDAP authentication
SAML authentication
OpenID Connect authentication
Identity mapping properties
Hardening Znodes
Authorization
User group providers
LDAP integration
LDAP and Ranger policies
LDAP and file-based policies
LDAP User Group Provider properties
Pairing LDAP with a Composite Group Provider
Access policies providers
Ranger authorization
Understanding Ranger authorization
Ranger-based NiFi policy descriptions
Predefined Ranger access policies for NiFi
Predefined Ranger access policies for NiFi Registry
Predefined component-level policies for NiFi
NiFi restricted components
Adding user to a pre-defined Ranger access policy
Creating a custom Ranger access policy
Authorization example
Enabling access to Knox and NiFi
File-based authorization
Migrating file-based authorization to Ranger
Migrating NiFi file-based authorization to Ranger
Migrating NiFi Registry file-based authorization to Ranger
Environment variables
Kerberos credentials
Local file system access
Network
Default ports for NiFi and NiFi Registry
FIPS 140-2 compliance
Encrypting NiFi sensitive properties with FIPS 140-2 approved algorithm
Deploying Cloudera Flow Management on FIPS-enabled clusters
Integrations
Integrating NiFi and Atlas
Manually integrating with Atlas when Auto-TLS is not enabled
Manually integrating with Atlas when Auto-TLS is enabled
Integrating NiFi and NiFi Registry with Knox
Customizing properties in Cloudera Manager