[ https://issues.apache.org/jira/browse/NIFI-4382?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16181742#comment-16181742 ]
ASF GitHub Bot commented on NIFI-4382: -------------------------------------- Github user alopresto commented on the issue: https://github.com/apache/nifi/pull/2177 Yeah, I don't have deep enough Knox familiarity to judge the best use case for communicating back that the logout command has occurred. If we treated receiving the `hadoop-jwt` token from Knox the same way we did the credential check for LDAP or Kerberos, and issued our own JWT, deleting the local JWT would trigger re-validating the `hadoop-jwt` cookie. If we update the local key store to indicate that that specific JWT is no longer valid, I believe we could trigger a redirect to the Knox service. However, my understanding is that we cannot simply delete the `hadoop-jwt` cookie because other services rely on it for SSO, and I do not know what the Knox API is like to trigger a logout remotely. At this time, I do not have a good suggestion for this scenario. > Add KnoxSSO support to NiFi > --------------------------- > > Key: NIFI-4382 > URL: https://issues.apache.org/jira/browse/NIFI-4382 > Project: Apache NiFi > Issue Type: Bug > Components: Core Framework > Reporter: Jeff Storck > Assignee: Jeff Storck > > Add support for KnoxSSO to NiFi. > Reference documentation: > http://knox.apache.org/books/knox-0-13-0/dev-guide.html#KnoxSSO+Integration -- This message was sent by Atlassian JIRA (v6.4.14#64029)