Joe Witt created NIFI-8220:
------------------------------

             Summary: Establish a secure by default configuration for NiFi
                 Key: NIFI-8220
                 URL: https://issues.apache.org/jira/browse/NIFI-8220
             Project: Apache NiFi
          Issue Type: Epic
          Components: Tools and Build
            Reporter: Joe Witt
            Assignee: Joe Witt
             Fix For: 1.14.0


Inspired by this tweet 
https://twitter.com/_escctrl_/status/1359280656174510081?s=21 and the resulting 
discussion here 
https://lists.apache.org/thread.html/rc590f21807192a0dce18293c2d5b47392a6fd8a1ef26d77fbd6ee695%40%3Cdev.nifi.apache.org%3E

It is time to change our config model.  It was also setup to be easy to use.  
We've seen these silly setups on the Internet before but has gotten ridiculous. 
 We need to take action.

Will create a set of one or more JIRAs to roughly do the following.
1.  Disable HTTP by default.  If a user wants to enable to it for whatever 
reason then also make them enable a new property which says something to the 
effect of 'allow completely non secure access to the entire nifi instance - not 
recommended'
2. Enable HTTPS with one way authentication by default which would be the 
client authenticating the server whereby the server has a server cert.  We 
could either make that cert a self-signed (and thus not trusted by client's by 
default) cert or give a way for the user to run through command line process to 
make a legit cert. 
3. If not already configured with an authorization provider supply and out of 
the box provider which supports only a single auto generated at first startup 
user/password enabling access to the NiFi system.
4. Disable all restricted processors by default.  Require the user to 
explicitly enable them.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to