Hello

Received a note today about this tweet:

https://twitter.com/silascutler/status/566983203232428033

It is a great reminder about our responsibility to provide secure software.

Out of the box NiFi starts up in a non-secure mode that is an HTTP
port to which anyone that can access it can command and control nifi
as an anonymous user.

We do provide configuration options for setting up proper HTTPS with
2-way SSL where the client's browser can establish trust in the
server, the server can establish trust in the client, the server can
establish the client identity by pulling the DN from the cert, and the
server can authorize the user for various roles based on a pluggable
authorization scheme.

The basic dilemma is how can we best balance out of the box usability
and approach-ability with security.

Ideas I'd propose:
1) In the UI provide a constant (and annoying in nature) reminder of a
non-secure config
2) Emphasize documentation, tooling, etc.. that makes it easy as
possible for users to establish secure configurations.
3) Add support for other identity mechanisms (like what?)

If folks have ideas on what the right balance is please share.  What
we have now doesn't seem like the right answer and feels irresponsible
knowing that folks will not secure their instances properly.

Thanks
Joe

Reply via email to