I found another 9 page potentially useful article on Medium.

"https://sandundayananda.medium.com/deploy-apache-nifi-on-docker-with-aws-ec2-instance-and-connect-to-web-interface-3e516e06fe04";

https://sandundayananda.medium.com/deploy-apache-nifi-on-docker-with-aws-ec2-instance-and-connect-to-web-interface-3e516e06fe04
Deploy Apache NiFi on Docker with AWS EC2 instance and Connect to Web Interface
sandundayananda.medium.com

-Jim

> On Apr 3, 2024, at 8:32 PM, Matthew Hawkins <hawko2...@gmail.com> wrote:
> 
> Hi Mark,
> 
> NiFi supports many different forms of authentication. The "simple" way is
> "http basic" and you can roll your own /etc/passwd style authenticator with
> it. I actually recommend NOT doing this unless it's a test system as http
> basic is trash and can be a right pest if you need to "unauth".
> 
> Single Sign-On refers to the literal SSO auth framework, where you'll need
> an IdP and so forth per the SSO spec. You can allegedly get this to work
> with AWS IAM but I've never tried. Note NiFi is designed first up to
> integrate into an Apache/HDFS environment so there's often assumptions like
> you have HDFS and you have a schema service and you have Ranger for auth.
> Bear this in mind because it'll make flow configuration make more sense
> once you've got the system up.
> 
> Note you can also mix different kinds; such as keep a break-glass admin
> account with http basic but do more enterprise auth with LDAP which
> integrates okish with RBAC in NiFi for daily users incl those with admin
> privs via RBAC. This can be handy for those times when *cough* AD *cough*
> dies again.
> 
> Authentication is one of the key configuration items to understand prior to
> deployment because your choice will drive what steps are necessary. E.g.
> with TLS auth you will need to add the CA chain to the truststore and make
> sure the users.xml is entirely accurate including spaces with the DN from
> the x509 data. If you have a cluster, you need to understand auth is not
> synced, each cluster member is its own individual instance & so some steps
> have to be repeated on each member. There's a fantastic ansible script from
> cavemandaveman to manage deployments properly and I do recommend that path
> over manual editing even with a single instance.
> 
> Kind regards,
> 
> On Thu, 4 Apr 2024, 08:59 Mark Woodcock, <woodc...@usna.edu.invalid> wrote:
> 
>> What does the documentation mean by this paragraph:
>> 
>>> For Single sign-on authentication, NiFi will redirect users to the
>> Identity Provider before returning to NiFi. NiFi will then process
>> responses and convert attributes to application token information.
>> 
>> I've gotten local instances of Nifi to work before, but getting it to run
>> on an AWS/EC2 instance (across a couple of proxies, to manage local
>> firewalls) is not going well. I can see (from login-identity-providers.xml)
>> that I've successfully set a simple username/password, but it always fails
>> when I get to the UI.   But, is the single-sign-on stuff not part of NiFi?
>> What sort of redirection is going on at this point?
>> 
>> thx,
>> 
>> mew
>> 
>> 
>> On Thu, Mar 28, 2024 at 4:31 PM Mark Woodcock <woodc...@usna.edu> wrote:
>> 
>>> Howdy,
>>> 
>>> Cranked up an EC2 instance.
>>> Installed Java 11.
>>> set up JAVA_HOME
>>> Downloaded Nifi 1.25.0
>>> unzipped Nifi
>>> set a nifi.sensitive.properties.key
>>> (https.port is default 8443)
>>> 
>>> bin/nifi.sh start
>>> 
>>> But, I can't even seem to access the most basic bit of the UI:
>>> 
>>> curl -vvvk https://54.91.56.55:8443
>>> *   Trying 54.91.56.55:8443...
>>> * connect to 54.91.56.55 port 8443 failed: Connection refused
>>> * Failed to connect to 54.91.56.55 port 8443 after 17 ms: Connection
>>> refused
>>> * Closing connection 0
>>> curl: (7) Failed to connect to 54.91.56.55 port 8443 after 17 ms:
>>> Connection refused
>>> 
>>> I have no doubt, I'm doing something astonishingly dumb.  Would someone
>> be
>>> kind enough to point it out?
>>> 
>>> thx,
>>> 
>>> mew
>>> 
>>> 
>> 

Reply via email to