|
|
|
NIFI-6617
|
NIFI-3388
Implement Encrypted Repository Shared Configuration
|
David Handermann
|
Andy LoPresto
|
|
Resolved |
Fixed
|
|
|
|
|
|
|
|
NIFI-3834
|
NIFI-3388
Implement encrypted content repository
|
Andy LoPresto
|
Andy LoPresto
|
|
Resolved |
Fixed
|
|
|
|
|
|
|
|
NIFI-3833
|
NIFI-3388
Implement encrypted flowfile repository
|
Andy LoPresto
|
Andy LoPresto
|
|
Resolved |
Fixed
|
|
|
|
|
|
|
|
NIFI-3721
|
NIFI-3388
Provide documentation for encrypted provenance repository
|
Andy LoPresto
|
Andy LoPresto
|
|
Resolved |
Fixed
|
|
|
|
|
|
|
|
NIFI-3713
|
NIFI-3388
Examine logs to ensure that data is not leaked to logs when the corresponding repository is encrypted
|
David Handermann
|
Andy LoPresto
|
|
Resolved |
Fixed
|
|
|
|
|
|
|
|
NIFI-3594
|
NIFI-3388
Implement encrypted provenance repository
|
Andy LoPresto
|
Andy LoPresto
|
|
Resolved |
Fixed
|
|
|
|
|