[ 
https://issues.apache.org/jira/browse/NIFI-5504?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Andy LoPresto reassigned NIFI-5504:
-----------------------------------

    Assignee: Andy LoPresto

> Improved Login Identity Provider Configurability
> ------------------------------------------------
>
>                 Key: NIFI-5504
>                 URL: https://issues.apache.org/jira/browse/NIFI-5504
>             Project: Apache NiFi
>          Issue Type: New Feature
>          Components: Security
>    Affects Versions: 1.5.0, 1.6.0, 1.7.0, 1.7.1
>            Reporter: Kevin Doran
>            Assignee: Andy LoPresto
>            Priority: Minor
>
> Currently, in NiFi (and NiFi Registry), the client/user identity for any 
> request to the REST API comes from a Spring Security filter chain during 
> request processing that handles authentication and sets the current user for 
> the request context.
> The X509 identity extraction is always first in the chain, meaning that if a 
> client certificate is present in the TLS handshake (even if not required), it 
> will be used as the client identity. This can be problematic when multiple 
> forms of authentication are desired (eg, certificate based for servers, 
> username/password for end users)
> This presents challenges for users that cannot easily change client 
> certificates managed by their host OS, browser, proxy, or third-party 
> authentication tool. Or when an end user simply accidentally selects a client 
> certificate when prompted.
> Today, if you want to force username/password login, you have to ensure that 
> the client/browser does not pass certificate or SPNEGO credentials so that 
> you fall through to the login screen. It would make for easier deployments 
> for administrators if they could configure the order of looking for 
> credentials (for example, use a JWT if present, and if not present use a 
> certificate identity if present).



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to