You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@nifi.apache.org by "Andy LoPresto (Jira)" <ji...@apache.org> on 2020/05/14 18:39:00 UTC

[jira] [Commented] (NIFI-7333) OIDC provider should use NiFi keystore & truststore

    [ https://issues.apache.org/jira/browse/NIFI-7333?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17107555#comment-17107555 ] 

Andy LoPresto commented on NIFI-7333:
-------------------------------------

I discussed this with [~markap14] and our proposal is:

* Add a new property in {{nifi.properties}} for an OIDC-specific truststore path and password
* If this value is not populated, continue using the JVM {{cacerts}} which will work with public OIDC providers like Google & Microsoft out of the box
* If the desired OIDC provider is not trusted by the JVM, a new truststore can be provided via these properties. It can be a standalone truststore which only trusts the OIDC provider, or the OIDC provider public certificate can be added to the NiFi truststore, and that file can be referenced here as well

There is another discussion about possibly allowing multiple "framework-level" keystore/truststores, which would be named and referenced by name in application behavior, which would obviate this need. 

> OIDC provider should use NiFi keystore & truststore
> ---------------------------------------------------
>
>                 Key: NIFI-7333
>                 URL: https://issues.apache.org/jira/browse/NIFI-7333
>             Project: Apache NiFi
>          Issue Type: Bug
>          Components: Core Framework, Security
>    Affects Versions: 1.11.4
>            Reporter: Andy LoPresto
>            Assignee: Troy Melhase
>            Priority: Major
>              Labels: keystore, oidc, security, tls
>
> The OIDC provider uses generic HTTPS requests to the OIDC IdP, but does not configure these requests to use the NiFi keystore or truststore. Rather, it uses the default JVM keystore and truststore, which leads to difficulty debugging PKIX and other TLS negotiation errors. It should be switched to use the NiFi keystore and truststore as other NiFi framework services do. 



--
This message was sent by Atlassian Jira
(v8.3.4#803005)