[ 
https://issues.apache.org/jira/browse/NIFI-4382?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16181742#comment-16181742
 ] 

ASF GitHub Bot commented on NIFI-4382:
--------------------------------------

Github user alopresto commented on the issue:

    https://github.com/apache/nifi/pull/2177
  
    Yeah, I don't have deep enough Knox familiarity to judge the best use case 
for communicating back that the logout command has occurred. If we treated 
receiving the `hadoop-jwt` token from Knox the same way we did the credential 
check for LDAP or Kerberos, and issued our own JWT, deleting the local JWT 
would trigger re-validating the `hadoop-jwt` cookie. If we update the local key 
store to indicate that that specific JWT is no longer valid, I believe we could 
trigger a redirect to the Knox service. However, my understanding is that we 
cannot simply delete the `hadoop-jwt` cookie because other services rely on it 
for SSO, and I do not know what the Knox API is like to trigger a logout 
remotely. At this time, I do not have a good suggestion for this scenario. 


> Add KnoxSSO support to NiFi
> ---------------------------
>
>                 Key: NIFI-4382
>                 URL: https://issues.apache.org/jira/browse/NIFI-4382
>             Project: Apache NiFi
>          Issue Type: Bug
>          Components: Core Framework
>            Reporter: Jeff Storck
>            Assignee: Jeff Storck
>
> Add support for KnoxSSO to NiFi.
> Reference documentation: 
> http://knox.apache.org/books/knox-0-13-0/dev-guide.html#KnoxSSO+Integration



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Reply via email to