[ 
https://issues.apache.org/jira/browse/NIFI-1578?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15289839#comment-15289839
 ] 

ASF GitHub Bot commented on NIFI-1578:
--------------------------------------

Github user alopresto commented on the pull request:

    https://github.com/apache/nifi/pull/256#issuecomment-220160457
  
    @Edgardo, yes, NiFi provides access control and checks authentication and 
authorization (if configured) before allowing a user or entity to access the 
processor properties. However, as @adamonduty points out, when a template is 
exported, any properties that are not marked as sensitive as exported as 
plaintext values. If someone were to share this template, the webhook URL would 
be included. Consider the URL similar to a shared password for room access. 
It's something that should be protected from unnecessary access within NiFi, as 
well as from accidental data leakage via template export. 


> Create PutSlack processor
> -------------------------
>
>                 Key: NIFI-1578
>                 URL: https://issues.apache.org/jira/browse/NIFI-1578
>             Project: Apache NiFi
>          Issue Type: Improvement
>          Components: Extensions
>            Reporter: Adam Lamar
>            Assignee: Adam Lamar
>             Fix For: 0.7.0
>
>




--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to