[
https://issues.apache.org/jira/browse/NIFI-1578?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15289839#comment-15289839
]
ASF GitHub Bot commented on NIFI-1578:
--------------------------------------
Github user alopresto commented on the pull request:
https://github.com/apache/nifi/pull/256#issuecomment-220160457
@Edgardo, yes, NiFi provides access control and checks authentication and
authorization (if configured) before allowing a user or entity to access the
processor properties. However, as @adamonduty points out, when a template is
exported, any properties that are not marked as sensitive as exported as
plaintext values. If someone were to share this template, the webhook URL would
be included. Consider the URL similar to a shared password for room access.
It's something that should be protected from unnecessary access within NiFi, as
well as from accidental data leakage via template export.
> Create PutSlack processor
> -------------------------
>
> Key: NIFI-1578
> URL: https://issues.apache.org/jira/browse/NIFI-1578
> Project: Apache NiFi
> Issue Type: Improvement
> Components: Extensions
> Reporter: Adam Lamar
> Assignee: Adam Lamar
> Fix For: 0.7.0
>
>
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)