<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-1683 LDAP authentication FAQ</title><link>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-1683 LDAP authentication FAQ</title><link>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq</link><pubDate>Wed, 03 Mar 2021 01:52:43 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:ff9bcdf1-d240-45dd-954b-788e73fd66af</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq#comments</comments><description>Current Revision posted to Appian Knowledge Base by Parmida Borhani on 3/3/2021 1:52:43 AM&lt;br /&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to&amp;nbsp;LDAP authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#Should%20I%20restrict%20LDAP%20authentication%20to%20a%20particular%20group?"&gt;Should I restrict LDAP authentication to a particular group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20my%20DN%20pattern?"&gt;What is my DN pattern?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#DifferentOUs"&gt;I have users under different OUs. What should I put as the DN pattern?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20Appian%20implement%20multiple%20LDAP%20servers?"&gt;Can Appian implement multiple LDAP servers?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20Appian%20users%20who%20are%20created%20upon%20first%20login%20be%20placed%20in%20a%20group%20automatically?"&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#BindvSearch"&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20I%20set%20up%20LDAP%20with%20my%20Appian%20Cloud%20environment?"&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#My%20LDAP%20Sync%20process%20is%20not%20working%20correctly.%20What%20can%20I%20do?"&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Should I restrict LDAP authentication to a particular group?"&gt;&lt;/a&gt;Should I restrict LDAP authentication to a particular group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. This prevents getting locked out of the environment if the LDAP server is unreachable (network issue).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is my DN pattern?"&gt;&lt;/a&gt;What is my DN pattern?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The DN, or Distinguished Name, is the unique list of domain components added together to define your LDAP user objects,&amp;nbsp;similar to how&amp;nbsp;a full file path defines a file location in an operating system. The DN pattern in conjunction with the LDAP URL will identify where your Appian users reside in your LDAP directory in order for Appian to find and authenticate users. Whatever is specified as the LDAP username attribute should be added to the DN pattern&amp;nbsp;set to {username}. {username} will be replaced by the username entered by the user.&lt;/p&gt;
&lt;p&gt;For example, in the Appian Admin console if your username attribute is set to &lt;strong&gt;cn&lt;/strong&gt; and your user&amp;#39;s Distinguished Names were made up of domain components &lt;strong&gt;ou=appianusers, dc=companyName, dc=com,&amp;nbsp;&lt;/strong&gt;provided a URL such as &lt;code&gt;ldap://&amp;lt;LDAP_FQDN_OR_IP_ADDRESS&amp;gt;:389/dc=companyName,dc=com&lt;/code&gt;, your DN pattern would be &lt;strong&gt;cn={username},&amp;nbsp;ou=appianusers&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="DifferentOUs"&gt;&lt;/a&gt;I have users under different OUs. What should I put as the DN pattern?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If there are multiple OUs within a parent OU, having only the parent OU in the DN pattern will suffice. Users under all the child OUs will be able to access the site.&lt;/p&gt;
&lt;p&gt;If you selected &amp;quot;Search for user then bind as user&amp;quot;, the &amp;#39;Administrator&amp;#39; would need to have permission to view the users in order to sign in.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can Appian implement multiple LDAP servers?"&gt;&lt;/a&gt;Can Appian implement multiple LDAP servers?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes, Appian can accept multiple LDAP URLs, however the base DN must be the same.The intention is for each additional URL to serve as a backup in case the first server goes down. They are not intended to be used as multiple base DN providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can Appian users who are created upon first login be placed in a group automatically?"&gt;&lt;/a&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;span style="font-weight:400;"&gt;Yes, if LDAP authentication is restricted to a particular group then when users are created they will be automatically added to that group. &lt;strong&gt;Note:&lt;/strong&gt; users created like this default to the Basic User type.&lt;a id="BindvSearch"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Bind&amp;nbsp;&lt;/strong&gt;&amp;mdash; Use this method when Appian should connect to the LDAP server and bind using the username (CN) and password of the user who is attempting to log in to Appian. Use this method when the CN field on the LDAP account matches the username defined in Appian.&lt;br /&gt;&lt;strong&gt;Search and Bind&lt;/strong&gt; &amp;mdash; Use this method to connect to the LDAP server using a pre-configured set of credentials. This method can be used when the value for the CN field on your users&amp;#39; LDAP account does not match the username defined in Appian, eg the Appian username may be another field such as UID or sAMAccountName in a standard Active Directory environment. Search and bind requires a service account that has full access to the base DN, since this account will search for the user who is attempting to log in.&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#ldap-authentication"&gt;LDAP Authentication&lt;/a&gt; under &lt;strong&gt;Authentication Method&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can I set up LDAP with my Appian Cloud environment?"&gt;&lt;/a&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Yes. To integrate with Appian Cloud, it is recommended that a VPN connection should be established between the Appian environment and your LDAP server. See the &lt;a href="https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html" rel="noopener noreferrer" target="_blank"&gt;documentation&lt;/a&gt;&amp;nbsp;on VPN integration. Note that if you wish to use LDAPS,&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;DNS resolution must be configured and you&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;must use publicly signed CA certificates.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My LDAP Sync process is not working correctly. What can I do?"&gt;&lt;/a&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Add the following loggers to the &lt;strong&gt;appian_log4j.properties&lt;/strong&gt; file. For Appian 18.3 and later, this file can be found in&amp;nbsp;&lt;span&gt;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/deployment/web.war/WEB-INF/resources&lt;/code&gt;. For Appian 18.2 and earlier, this file can be&lt;/span&gt;&amp;nbsp;found in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG&lt;br /&gt;log4j.logger.org.springframework.security=DEBUG&lt;br /&gt;log4j.logger.com.appian.directory.syncwithusernames=DEBUG&lt;br /&gt;log4j.logger.com.appiancorp.plugin.directory=DEBUG&lt;br /&gt;log4j.logger.org.ldaptive=DEBUG&lt;/pre&gt;
&lt;p&gt;Then rerun the process and check the application server log for details on the error you may be facing. Most of the time the error stems from a connection issue from the Appian server to the LDAP server.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;March 2021&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: LDAP, authentication, FAQ&lt;/div&gt;
</description></item><item><title>KB-1683 LDAP authentication FAQ</title><link>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq/revision/13</link><pubDate>Wed, 03 Mar 2021 01:52:16 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:ff9bcdf1-d240-45dd-954b-788e73fd66af</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq#comments</comments><description>Revision 13 posted to Appian Knowledge Base by Parmida Borhani on 3/3/2021 1:52:16 AM&lt;br /&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to&amp;nbsp;LDAP authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#Should%20I%20restrict%20LDAP%20authentication%20to%20a%20particular%20group?"&gt;Should I restrict LDAP authentication to a particular group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20my%20DN%20pattern?"&gt;What is my DN pattern?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#DifferentOUs"&gt;I have users under different OUs. What should I put as the DN pattern?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20Appian%20implement%20multiple%20LDAP%20servers?"&gt;Can Appian implement multiple LDAP servers?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20Appian%20users%20who%20are%20created%20upon%20first%20login%20be%20placed%20in%20a%20group%20automatically?"&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20I%20set%20up%20LDAP%20with%20my%20Appian%20Cloud%20environment?"&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#My%20LDAP%20Sync%20process%20is%20not%20working%20correctly.%20What%20can%20I%20do?"&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Should I restrict LDAP authentication to a particular group?"&gt;&lt;/a&gt;Should I restrict LDAP authentication to a particular group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. This prevents getting locked out of the environment if the LDAP server is unreachable (network issue).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is my DN pattern?"&gt;&lt;/a&gt;What is my DN pattern?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The DN, or Distinguished Name, is the unique list of domain components added together to define your LDAP user objects,&amp;nbsp;similar to how&amp;nbsp;a full file path defines a file location in an operating system. The DN pattern in conjunction with the LDAP URL will identify where your Appian users reside in your LDAP directory in order for Appian to find and authenticate users. Whatever is specified as the LDAP username attribute should be added to the DN pattern&amp;nbsp;set to {username}. {username} will be replaced by the username entered by the user.&lt;/p&gt;
&lt;p&gt;For example, in the Appian Admin console if your username attribute is set to &lt;strong&gt;cn&lt;/strong&gt; and your user&amp;#39;s Distinguished Names were made up of domain components &lt;strong&gt;ou=appianusers, dc=companyName, dc=com,&amp;nbsp;&lt;/strong&gt;provided a URL such as &lt;code&gt;ldap://&amp;lt;LDAP_FQDN_OR_IP_ADDRESS&amp;gt;:389/dc=companyName,dc=com&lt;/code&gt;, your DN pattern would be &lt;strong&gt;cn={username},&amp;nbsp;ou=appianusers&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="DifferentOUs"&gt;&lt;/a&gt;I have users under different OUs. What should I put as the DN pattern?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If there are multiple OUs within a parent OU, having only the parent OU in the DN pattern will suffice. Users under all the child OUs will be able to access the site.&lt;/p&gt;
&lt;p&gt;If you selected &amp;quot;Search for user then bind as user&amp;quot;, the &amp;#39;Administrator&amp;#39; would need to have permission to view the users in order to sign in.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can Appian implement multiple LDAP servers?"&gt;&lt;/a&gt;Can Appian implement multiple LDAP servers?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes, Appian can accept multiple LDAP URLs, however the base DN must be the same.The intention is for each additional URL to serve as a backup in case the first server goes down. They are not intended to be used as multiple base DN providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can Appian users who are created upon first login be placed in a group automatically?"&gt;&lt;/a&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;span style="font-weight:400;"&gt;Yes, if LDAP authentication is restricted to a particular group then when users are created they will be automatically added to that group. &lt;strong&gt;Note:&lt;/strong&gt; users created like this default to the Basic User type.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?"&gt;&lt;/a&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Bind&amp;nbsp;&lt;/strong&gt;&amp;mdash; Use this method when Appian should connect to the LDAP server and bind using the username (CN) and password of the user who is attempting to log in to Appian. Use this method when the CN field on the LDAP account matches the username defined in Appian.&lt;br /&gt;&lt;strong&gt;Search and Bind&lt;/strong&gt; &amp;mdash; Use this method to connect to the LDAP server using a pre-configured set of credentials. This method can be used when the value for the CN field on your users&amp;#39; LDAP account does not match the username defined in Appian, eg the Appian username may be another field such as UID or sAMAccountName in a standard Active Directory environment. Search and bind requires a service account that has full access to the base DN, since this account will search for the user who is attempting to log in.&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#ldap-authentication"&gt;LDAP Authentication&lt;/a&gt; under &lt;strong&gt;Authentication Method&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can I set up LDAP with my Appian Cloud environment?"&gt;&lt;/a&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Yes. To integrate with Appian Cloud, it is recommended that a VPN connection should be established between the Appian environment and your LDAP server. See the &lt;a href="https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html" rel="noopener noreferrer" target="_blank"&gt;documentation&lt;/a&gt;&amp;nbsp;on VPN integration. Note that if you wish to use LDAPS,&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;DNS resolution must be configured and you&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;must use publicly signed CA certificates.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My LDAP Sync process is not working correctly. What can I do?"&gt;&lt;/a&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Add the following loggers to the &lt;strong&gt;appian_log4j.properties&lt;/strong&gt; file. For Appian 18.3 and later, this file can be found in&amp;nbsp;&lt;span&gt;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/deployment/web.war/WEB-INF/resources&lt;/code&gt;. For Appian 18.2 and earlier, this file can be&lt;/span&gt;&amp;nbsp;found in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG&lt;br /&gt;log4j.logger.org.springframework.security=DEBUG&lt;br /&gt;log4j.logger.com.appian.directory.syncwithusernames=DEBUG&lt;br /&gt;log4j.logger.com.appiancorp.plugin.directory=DEBUG&lt;br /&gt;log4j.logger.org.ldaptive=DEBUG&lt;/pre&gt;
&lt;p&gt;Then rerun the process and check the application server log for details on the error you may be facing. Most of the time the error stems from a connection issue from the Appian server to the LDAP server.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;March 2021&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: LDAP, authentication, FAQ&lt;/div&gt;
</description></item><item><title>KB-1683 LDAP authentication FAQ</title><link>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq/revision/12</link><pubDate>Thu, 23 May 2019 23:16:41 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:ff9bcdf1-d240-45dd-954b-788e73fd66af</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq#comments</comments><description>Revision 12 posted to Appian Knowledge Base by Parmida Borhani on 5/23/2019 11:16:41 PM&lt;br /&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to&amp;nbsp;LDAP authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#Should%20I%20restrict%20LDAP%20authentication%20to%20a%20particular%20group?"&gt;Should I restrict LDAP authentication to a particular group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20my%20DN%20pattern?"&gt;What is my DN pattern?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20Appian%20implement%20multiple%20LDAP%20servers?"&gt;Can Appian implement multiple LDAP servers?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20Appian%20users%20who%20are%20created%20upon%20first%20login%20be%20placed%20in%20a%20group%20automatically?"&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20difference%20between%20&amp;ldquo;Bind%20as%20user&amp;rdquo;%20vs.%20&amp;ldquo;Search%20for%20user%20then%20bind%20as%20user&amp;rdquo;%20options?"&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20I%20set%20up%20LDAP%20with%20my%20Appian%20Cloud%20environment?"&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#My%20LDAP%20Sync%20process%20is%20not%20working%20correctly.%20What%20can%20I%20do?"&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Should I restrict LDAP authentication to a particular group?"&gt;&lt;/a&gt;Should I restrict LDAP authentication to a particular group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. This prevents getting locked out of the environment if the LDAP server is unreachable (network issue).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is my DN pattern?"&gt;&lt;/a&gt;What is my DN pattern?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The DN, or Distinguished Name, is the unique list of domain components added together to define your LDAP user objects,&amp;nbsp;similar to how&amp;nbsp;a full file path defines a file location in an operating system. The DN pattern in conjunction with the LDAP URL will identify where your Appian users reside in your LDAP directory in order for Appian to find and authenticate users. Whatever is specified as the LDAP username attribute should be added to the DN pattern&amp;nbsp;set to {username}. {username} will be replaced by the username entered by the user.&lt;/p&gt;
&lt;p&gt;For example, in the Appian Admin console if your username attribute is set to &lt;strong&gt;cn&lt;/strong&gt; and your user&amp;#39;s Distinguished Names were made up of domain components &lt;strong&gt;ou=appianusers, dc=companyName, dc=com,&amp;nbsp;&lt;/strong&gt;provided a URL such as &lt;code&gt;ldap://&amp;lt;LDAP_FQDN_OR_IP_ADDRESS&amp;gt;:389/dc=companyName,dc=com&lt;/code&gt;, your DN pattern would be &lt;strong&gt;cn={username},&amp;nbsp;ou=appianusers&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can Appian implement multiple LDAP servers?"&gt;&lt;/a&gt;Can Appian implement multiple LDAP servers?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes, Appian can accept multiple LDAP URLs, however the base DN must be the same.The intention is for each additional URL to serve as a backup in case the first server goes down. They are not intended to be used as multiple base DN providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can Appian users who are created upon first login be placed in a group automatically?"&gt;&lt;/a&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;span style="font-weight:400;"&gt;Yes, if LDAP authentication is restricted to a particular group then when users are created they will be automatically added to that group. &lt;strong&gt;Note:&lt;/strong&gt; users created like this default to the Basic User type.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?"&gt;&lt;/a&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Bind&amp;nbsp;&lt;/strong&gt;&amp;mdash; Use this method when Appian should connect to the LDAP server and bind using the username (CN) and password of the user who is attempting to log in to Appian. Use this method when the CN field on the LDAP account matches the username defined in Appian.&lt;br /&gt;&lt;strong&gt;Search and Bind&lt;/strong&gt; &amp;mdash; Use this method to connect to the LDAP server using a pre-configured set of credentials. This method can be used when the value for the CN field on your users&amp;#39; LDAP account does not match the username defined in Appian, eg the Appian username may be another field such as UID or sAMAccountName in a standard Active Directory environment. Search and bind requires a service account that has full access to the base DN, since this account will search for the user who is attempting to log in.&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#ldap-authentication"&gt;LDAP Authentication&lt;/a&gt; under &lt;strong&gt;Authentication Method&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can I set up LDAP with my Appian Cloud environment?"&gt;&lt;/a&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Yes. To integrate with Appian Cloud, it is recommended that a VPN connection should be established between the Appian environment and your LDAP server. See the &lt;a href="https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html" rel="noopener noreferrer" target="_blank"&gt;documentation&lt;/a&gt;&amp;nbsp;on VPN integration. Note that if you wish to use LDAPS,&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;DNS resolution must be configured and you&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;must use publicly signed CA certificates.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My LDAP Sync process is not working correctly. What can I do?"&gt;&lt;/a&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Add the following loggers to the &lt;strong&gt;appian_log4j.properties&lt;/strong&gt; file. For Appian 18.3 and later, this file can be found in&amp;nbsp;&lt;span&gt;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/deployment/web.war/WEB-INF/resources&lt;/code&gt;. For Appian 18.2 and earlier, this file can be&lt;/span&gt;&amp;nbsp;found in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG&lt;br /&gt;log4j.logger.org.springframework.security=DEBUG&lt;br /&gt;log4j.logger.com.appian.directory.syncwithusernames=DEBUG&lt;br /&gt;log4j.logger.com.appiancorp.plugin.directory=DEBUG&lt;br /&gt;log4j.logger.org.ldaptive=DEBUG&lt;/pre&gt;
&lt;p&gt;Then rerun the process and check the application server log for details on the error you may be facing. Most of the time the error stems from a connection issue from the Appian server to the LDAP server.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;May 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: LDAP, authentication, FAQ&lt;/div&gt;
</description></item><item><title>KB-1683 LDAP authentication FAQ</title><link>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq/revision/11</link><pubDate>Thu, 23 May 2019 23:15:59 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:ff9bcdf1-d240-45dd-954b-788e73fd66af</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq#comments</comments><description>Revision 11 posted to Appian Knowledge Base by Parmida Borhani on 5/23/2019 11:15:59 PM&lt;br /&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to&amp;nbsp;LDAP authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#Should%20I%20restrict%20LDAP%20authentication%20to%20a%20particular%20group?"&gt;Should I restrict LDAP authentication to a particular group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20my%20DN%20pattern?"&gt;What is my DN pattern?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20Appian%20implement%20multiple%20LDAP%20servers?"&gt;Can Appian implement multiple LDAP servers?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20Appian%20users%20who%20are%20created%20upon%20first%20login%20be%20placed%20in%20a%20group%20automatically?"&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20difference%20between%20&amp;ldquo;Bind%20as%20user&amp;rdquo;%20vs.%20&amp;ldquo;Search%20for%20user%20then%20bind%20as%20user&amp;rdquo;%20options?"&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20I%20set%20up%20LDAP%20with%20my%20Appian%20Cloud%20environment?"&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#My%20LDAP%20Sync%20process%20is%20not%20working%20correctly.%20What%20can%20I%20do?"&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Should I restrict LDAP authentication to a particular group?"&gt;&lt;/a&gt;Should I restrict LDAP authentication to a particular group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. This prevents getting locked out of the environment if the LDAP server is unreachable (network issue).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is my DN pattern?"&gt;&lt;/a&gt;What is my DN pattern?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The DN, or Distinguished Name, is the unique list of domain components added together to define your LDAP user objects,&amp;nbsp;similar to how&amp;nbsp;a full file path defines a file location in an operating system. The DN pattern in conjunction with the LDAP URL will identify where your Appian users reside in your LDAP directory in order for Appian to find and authenticate users. Whatever is specified as the LDAP username attribute should be added to the DN pattern&amp;nbsp;set to {username}. {username} will be replaced by the username entered by the user.&lt;/p&gt;
&lt;p&gt;For example, in the Appian Admin console if your username attribute is set to &lt;strong&gt;cn&lt;/strong&gt; and your user&amp;#39;s Distinguished Names were made up of domain components &lt;strong&gt;ou=appianusers, dc=companyName, dc=com,&amp;nbsp;&lt;/strong&gt;provided a URL such as &lt;code&gt;ldap://&amp;lt;LDAP_FQDN_OR_IP_ADDRESS&amp;gt;:389/dc=companyName,dc=com&lt;/code&gt;, your DN pattern would be &lt;strong&gt;cn={username},&amp;nbsp;ou=appianusers&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can Appian implement multiple LDAP servers?"&gt;&lt;/a&gt;Can Appian implement multiple LDAP servers?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes, Appian can accept multiple LDAP URLs, however the base DN must be the same.The intention is for each additional URL to serve as a backup in case the first server goes down. They are not intended to be used as multiple base DN providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can Appian users who are created upon first login be placed in a group automatically?"&gt;&lt;/a&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;span style="font-weight:400;"&gt;Yes, if LDAP authentication is restricted to a particular group then when users are created they will be automatically added to that group. &lt;strong&gt;Note:&lt;/strong&gt; users created like this default to the Basic User type.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?"&gt;&lt;/a&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Bind&amp;nbsp;&lt;/strong&gt;&amp;mdash; Use this method when Appian should connect to the LDAP server and bind using the username (CN) and password of the user who is attempting to log in to Appian. Use this method when the CN field on the LDAP account matches the username defined in Appian.&lt;br /&gt;&lt;strong&gt;Search and Bind&lt;/strong&gt; &amp;mdash; Use this method to connect to the LDAP server using a pre-configured set of credentials. This method can be used when the value for the CN field on your users&amp;#39; LDAP account does not match the username defined in Appian, eg the Appian username may be another field such as UID or sAMAccountName in a standard Active Directory environment. Search and bind requires a service account that has full access to the base DN, since this account will search for the user who is attempting to log in.&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#ldap-authentication"&gt;LDAP Authentication&lt;/a&gt; under &lt;strong&gt;Authentication Method&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can I set up LDAP with my Appian Cloud environment?"&gt;&lt;/a&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Yes. To integrate with Appian Cloud, it is recommended that a VPN connection should be established between the Appian environment and your LDAP server. See the &lt;a href="https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html" rel="noopener noreferrer" target="_blank"&gt;documentation&lt;/a&gt;&amp;nbsp;on VPN integration. Note that if you wish to use LDAPS,&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;DNS resolution must be configured and you&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;must use publicly signed CA certificates.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My LDAP Sync process is not working correctly. What can I do?"&gt;&lt;/a&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Add the following loggers to the &lt;strong&gt;appian_log4j.properties&lt;/strong&gt; file. For Appian 18.3 and later, this file can be found in&amp;nbsp;&lt;span&gt;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/deployment/web.war/WEB-INF/resources&lt;/code&gt;. For Appian 18.2 and earlier, this file can be&lt;/span&gt;&amp;nbsp;located in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG&lt;br /&gt;log4j.logger.org.springframework.security=DEBUG&lt;br /&gt;log4j.logger.com.appian.directory.syncwithusernames=DEBUG&lt;br /&gt;log4j.logger.com.appiancorp.plugin.directory=DEBUG&lt;br /&gt;log4j.logger.org.ldaptive=DEBUG&lt;/pre&gt;
&lt;p&gt;Then rerun the process and check the application server log for details on the error you may be facing. Most of the time the error stems from a connection issue from the Appian server to the LDAP server.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;May 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: LDAP, authentication, FAQ&lt;/div&gt;
</description></item><item><title>KB-1683 LDAP authentication FAQ</title><link>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq/revision/10</link><pubDate>Wed, 12 Dec 2018 14:54:42 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:ff9bcdf1-d240-45dd-954b-788e73fd66af</guid><dc:creator>Jordan Horwat</dc:creator><comments>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq#comments</comments><description>Revision 10 posted to Appian Knowledge Base by Jordan Horwat on 12/12/2018 2:54:42 PM&lt;br /&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to&amp;nbsp;LDAP authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#Should%20I%20restrict%20LDAP%20authentication%20to%20a%20particular%20group?"&gt;Should I restrict LDAP authentication to a particular group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20my%20DN%20pattern?"&gt;What is my DN pattern?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20Appian%20implement%20multiple%20LDAP%20servers?"&gt;Can Appian implement multiple LDAP servers?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20Appian%20users%20who%20are%20created%20upon%20first%20login%20be%20placed%20in%20a%20group%20automatically?"&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20difference%20between%20&amp;ldquo;Bind%20as%20user&amp;rdquo;%20vs.%20&amp;ldquo;Search%20for%20user%20then%20bind%20as%20user&amp;rdquo;%20options?"&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20I%20set%20up%20LDAP%20with%20my%20Appian%20Cloud%20environment?"&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#My%20LDAP%20Sync%20process%20is%20not%20working%20correctly.%20What%20can%20I%20do?"&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Should I restrict LDAP authentication to a particular group?"&gt;&lt;/a&gt;Should I restrict LDAP authentication to a particular group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. This prevents getting locked out of the environment if the LDAP server is unreachable (network issue).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is my DN pattern?"&gt;&lt;/a&gt;What is my DN pattern?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The DN, or Distinguished Name, is the unique list of domain components added together to define your LDAP user objects,&amp;nbsp;similar to how&amp;nbsp;a full file path defines a file location in an operating system. The DN pattern in conjunction with the LDAP URL will identify where your Appian users reside in your LDAP directory in order for Appian to find and authenticate users. Whatever is specified as the LDAP username attribute should be added to the DN pattern&amp;nbsp;set to {username}. {username} will be replaced by the username entered by the user.&lt;/p&gt;
&lt;p&gt;For example, in the Appian Admin console if your username attribute is set to &lt;strong&gt;cn&lt;/strong&gt; and your user&amp;#39;s Distinguished Names were made up of domain components &lt;strong&gt;ou=appianusers, dc=companyName, dc=com,&amp;nbsp;&lt;/strong&gt;provided a URL such as &lt;code&gt;ldap://&amp;lt;LDAP_FQDN_OR_IP_ADDRESS&amp;gt;:389/dc=companyName,dc=com&lt;/code&gt;, your DN pattern would be &lt;strong&gt;cn={username},&amp;nbsp;ou=appianusers&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can Appian implement multiple LDAP servers?"&gt;&lt;/a&gt;Can Appian implement multiple LDAP servers?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes, Appian can accept multiple LDAP URLs, however the base DN must be the same.The intention is for each additional URL to serve as a backup in case the first server goes down. They are not intended to be used as multiple base DN providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can Appian users who are created upon first login be placed in a group automatically?"&gt;&lt;/a&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;span style="font-weight:400;"&gt;Yes, if LDAP authentication is restricted to a particular group then when users are created they will be automatically added to that group. &lt;strong&gt;Note:&lt;/strong&gt; users created like this default to the Basic User type.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?"&gt;&lt;/a&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Bind&amp;nbsp;&lt;/strong&gt;&amp;mdash; Use this method when Appian should connect to the LDAP server and bind using the username (CN) and password of the user who is attempting to log in to Appian. Use this method when the CN field on the LDAP account matches the username defined in Appian.&lt;br /&gt;&lt;strong&gt;Search and Bind&lt;/strong&gt; &amp;mdash; Use this method to connect to the LDAP server using a pre-configured set of credentials. This method can be used when the value for the CN field on your users&amp;#39; LDAP account does not match the username defined in Appian, eg the Appian username may be another field such as UID or sAMAccountName in a standard Active Directory environment. Search and bind requires a service account that has full access to the base DN, since this account will search for the user who is attempting to log in.&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#ldap-authentication"&gt;LDAP Authentication&lt;/a&gt; under &lt;strong&gt;Authentication Method&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can I set up LDAP with my Appian Cloud environment?"&gt;&lt;/a&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Yes. To integrate with Appian Cloud, it is recommended that a VPN connection should be established between the Appian environment and your LDAP server. See our documentation on VPN integration here:&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html"&gt;https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html&lt;/a&gt;. Note that if you wish to use LDAPS,&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;DNS resolution must be configured and you&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;must use publicly signed CA certificates.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My LDAP Sync process is not working correctly. What can I do?"&gt;&lt;/a&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Add the following loggers to the appian_log4j.properties file located in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG&lt;br /&gt;log4j.logger.org.springframework.security=DEBUG&lt;br /&gt;log4j.logger.com.appian.directory.syncwithusernames=DEBUG&lt;br /&gt;log4j.logger.com.appiancorp.plugin.directory=DEBUG&lt;br /&gt;log4j.logger.org.ldaptive=DEBUG&lt;/pre&gt;
&lt;p&gt;Then rerun the process and check the application server log for details on the error you may be facing. Most of the time the error stems from a connection issue from the Appian server to the LDAP server.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: August 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: LDAP, authentication, FAQ&lt;/div&gt;
</description></item><item><title>KB-1683 LDAP authentication FAQ</title><link>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq/revision/9</link><pubDate>Wed, 12 Dec 2018 14:53:37 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:ff9bcdf1-d240-45dd-954b-788e73fd66af</guid><dc:creator>Jordan Horwat</dc:creator><comments>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq#comments</comments><description>Revision 9 posted to Appian Knowledge Base by Jordan Horwat on 12/12/2018 2:53:37 PM&lt;br /&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to&amp;nbsp;LDAP authentication in Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Should I restrict LDAP authentication to a particular group?"&gt;&lt;/a&gt;Should I restrict LDAP authentication to a particular group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. This prevents getting locked out of the environment if the LDAP server is unreachable (network issue).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is my DN pattern?"&gt;&lt;/a&gt;What is my DN pattern?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The DN, or Distinguished Name, is the unique list of domain components added together to define your LDAP user objects,&amp;nbsp;similar to how&amp;nbsp;a full file path defines a file location in an operating system. The DN pattern in conjunction with the LDAP URL will identify where your Appian users reside in your LDAP directory in order for Appian to find and authenticate users. Whatever is specified as the LDAP username attribute should be added to the DN pattern&amp;nbsp;set to {username}. {username} will be replaced by the username entered by the user.&lt;/p&gt;
&lt;p&gt;For example, in the Appian Admin console if your username attribute is set to &lt;strong&gt;cn&lt;/strong&gt; and your user&amp;#39;s Distinguished Names were made up of domain components &lt;strong&gt;ou=appianusers, dc=companyName, dc=com,&amp;nbsp;&lt;/strong&gt;provided a URL such as &lt;code&gt;ldap://&amp;lt;LDAP_FQDN_OR_IP_ADDRESS&amp;gt;:389/dc=companyName,dc=com&lt;/code&gt;, your DN pattern would be &lt;strong&gt;cn={username},&amp;nbsp;ou=appianusers&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can Appian implement multiple LDAP servers?"&gt;&lt;/a&gt;Can Appian implement multiple LDAP servers?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes, Appian can accept multiple LDAP URLs, however the base DN must be the same.The intention is for each additional URL to serve as a backup in case the first server goes down. They are not intended to be used as multiple base DN providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can Appian users who are created upon first login be placed in a group automatically?"&gt;&lt;/a&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;span style="font-weight:400;"&gt;Yes, if LDAP authentication is restricted to a particular group then when users are created they will be automatically added to that group. &lt;strong&gt;Note:&lt;/strong&gt; users created like this default to the Basic User type.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?"&gt;&lt;/a&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Bind&amp;nbsp;&lt;/strong&gt;&amp;mdash; Use this method when Appian should connect to the LDAP server and bind using the username (CN) and password of the user who is attempting to log in to Appian. Use this method when the CN field on the LDAP account matches the username defined in Appian.&lt;br /&gt;&lt;strong&gt;Search and Bind&lt;/strong&gt; &amp;mdash; Use this method to connect to the LDAP server using a pre-configured set of credentials. This method can be used when the value for the CN field on your users&amp;#39; LDAP account does not match the username defined in Appian, eg the Appian username may be another field such as UID or sAMAccountName in a standard Active Directory environment. Search and bind requires a service account that has full access to the base DN, since this account will search for the user who is attempting to log in.&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#ldap-authentication"&gt;LDAP Authentication&lt;/a&gt; under &lt;strong&gt;Authentication Method&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can I set up LDAP with my Appian Cloud environment?"&gt;&lt;/a&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Yes. To integrate with Appian Cloud, it is recommended that a VPN connection should be established between the Appian environment and your LDAP server. See our documentation on VPN integration here:&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html"&gt;https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html&lt;/a&gt;. Note that if you wish to use LDAPS,&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;DNS resolution must be configured and you&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;must use publicly signed CA certificates.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My LDAP Sync process is not working correctly. What can I do?"&gt;&lt;/a&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Add the following loggers to the appian_log4j.properties file located in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG&lt;br /&gt;log4j.logger.org.springframework.security=DEBUG&lt;br /&gt;log4j.logger.com.appian.directory.syncwithusernames=DEBUG&lt;br /&gt;log4j.logger.com.appiancorp.plugin.directory=DEBUG&lt;br /&gt;log4j.logger.org.ldaptive=DEBUG&lt;/pre&gt;
&lt;p&gt;Then rerun the process and check the application server log for details on the error you may be facing. Most of the time the error stems from a connection issue from the Appian server to the LDAP server.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: August 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: LDAP, authentication, FAQ&lt;/div&gt;
</description></item><item><title>KB-1683 LDAP authentication FAQ</title><link>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq/revision/8</link><pubDate>Fri, 07 Dec 2018 15:10:18 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:ff9bcdf1-d240-45dd-954b-788e73fd66af</guid><dc:creator>Jordan Horwat</dc:creator><comments>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq#comments</comments><description>Revision 8 posted to Appian Knowledge Base by Jordan Horwat on 12/7/2018 3:10:18 PM&lt;br /&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to&amp;nbsp;LDAP authentication in Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Should I restrict LDAP authentication to a particular group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. This prevents getting locked out of the environment if the LDAP server is unreachable (network issue).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is my DN pattern?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The DN, or Distinguished Name, is the unique list of domain components added together to define your LDAP user objects,&amp;nbsp;similar to how&amp;nbsp;a full file path defines a file location in an operating system. The DN pattern in conjunction with the LDAP URL will identify where your Appian users reside in your LDAP directory in order for Appian to find and authenticate users. Whatever is specified as the LDAP username attribute should be added to the DN pattern&amp;nbsp;set to {username}. {username} will be replaced by the username entered by the user.&lt;/p&gt;
&lt;p&gt;For example, in the Appian Admin console if your username attribute is set to &lt;strong&gt;cn&lt;/strong&gt; and your user&amp;#39;s Distinguished Names were made up of domain components &lt;strong&gt;ou=appianusers, dc=companyName, dc=com,&amp;nbsp;&lt;/strong&gt;provided a URL such as &lt;code&gt;ldap://&amp;lt;LDAP_FQDN_OR_IP_ADDRESS&amp;gt;:389/dc=companyName,dc=com&lt;/code&gt;, your DN pattern would be &lt;strong&gt;cn={username},&amp;nbsp;ou=appianusers&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Can Appian implement multiple LDAP servers?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes, Appian can accept multiple LDAP URLs, however the base DN must be the same.The intention is for each additional URL to serve as a backup in case the first server goes down. They are not intended to be used as multiple base DN providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;span style="font-weight:400;"&gt;Yes, if LDAP authentication is restricted to a particular group then when users are created they will be automatically added to that group. &lt;strong&gt;Note:&lt;/strong&gt; users created like this default to the Basic User type.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Bind&amp;nbsp;&lt;/strong&gt;&amp;mdash; Use this method when Appian should connect to the LDAP server and bind using the username (CN) and password of the user who is attempting to log in to Appian. Use this method when the CN field on the LDAP account matches the username defined in Appian.&lt;br /&gt;&lt;strong&gt;Search and Bind&lt;/strong&gt; &amp;mdash; Use this method to connect to the LDAP server using a pre-configured set of credentials. This method can be used when the value for the CN field on your users&amp;#39; LDAP account does not match the username defined in Appian, eg the Appian username may be another field such as UID or sAMAccountName in a standard Active Directory environment. Search and bind requires a service account that has full access to the base DN, since this account will search for the user who is attempting to log in.&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#ldap-authentication"&gt;LDAP Authentication&lt;/a&gt; under &lt;strong&gt;Authentication Method&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Yes. To integrate with Appian Cloud, it is recommended that a VPN connection should be established between the Appian environment and your LDAP server. See our documentation on VPN integration here:&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html"&gt;https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html&lt;/a&gt;. Note that if you wish to use LDAPS,&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;DNS resolution must be configured and you&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;must use publicly signed CA certificates.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Add the following loggers to the appian_log4j.properties file located in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG&lt;br /&gt;log4j.logger.org.springframework.security=DEBUG&lt;br /&gt;log4j.logger.com.appian.directory.syncwithusernames=DEBUG&lt;br /&gt;log4j.logger.com.appiancorp.plugin.directory=DEBUG&lt;br /&gt;log4j.logger.org.ldaptive=DEBUG&lt;/pre&gt;
&lt;p&gt;Then rerun the process and check the application server log for details on the error you may be facing. Most of the time the error stems from a connection issue from the Appian server to the LDAP server.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: August 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: LDAP, authentication, FAQ&lt;/div&gt;
</description></item><item><title>KB-1683 LDAP authentication FAQ</title><link>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq/revision/7</link><pubDate>Thu, 30 Aug 2018 04:39:42 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:ff9bcdf1-d240-45dd-954b-788e73fd66af</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq#comments</comments><description>Revision 7 posted to Appian Knowledge Base by Parmida Borhani on 8/30/2018 4:39:42 AM&lt;br /&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to&amp;nbsp;LDAP authentication in Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&lt;/strong&gt; Should I restrict LDAP authentication to a particular group?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Yes. This prevents getting locked out of the environment if the LDAP server is unreachable (network issue).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;What is my DN pattern?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;The DN, or Distinguished Name, is the unique list of domain components added together to define your LDAP user objects,&amp;nbsp;similar to how&amp;nbsp;a full file path defines a file location in an operating system. The DN pattern in conjunction with the LDAP URL will identify where your Appian users reside in your LDAP directory in order for Appian to find and authenticate users. Whatever is specified as the LDAP username attribute should be added to the DN pattern&amp;nbsp;set to {username}. {username} will be replaced by the username entered by the user.&lt;/p&gt;
&lt;p&gt;For example, in the Appian Admin console if your username attribute is set to &lt;strong&gt;cn&lt;/strong&gt; and your user&amp;#39;s Distinguished Names were made up of domain components &lt;strong&gt;ou=appianusers, dc=companyName, dc=com,&amp;nbsp;&lt;/strong&gt;provided a URL such as &lt;code&gt;ldap://&amp;lt;LDAP_FQDN_OR_IP_ADDRESS&amp;gt;:389/dc=companyName,dc=com&lt;/code&gt;, your DN pattern would be &lt;strong&gt;cn={username},&amp;nbsp;ou=appianusers&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;span style="font-weight:400;"&gt;Can Appian implement multiple LDAP servers?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;Yes, Appian can accept multiple LDAP URLs, however the base DN must be the same.The intention is for each additional URL to serve as a backup in case the first server goes down. They are not intended to be used as multiple base DN providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;span style="font-weight:400;"&gt;Yes, if LDAP authentication is restricted to a particular group then when users are created they will be automatically added to that group. &lt;strong&gt;Note:&lt;/strong&gt; users created like this default to the Basic User type.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;span style="font-weight:400;"&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;Bind&amp;nbsp;&lt;/strong&gt;&amp;mdash; Use this method when Appian should connect to the LDAP server and bind using the username (CN) and password of the user who is attempting to log in to Appian. Use this method when the CN field on the LDAP account matches the username defined in Appian.&lt;br /&gt;&lt;strong&gt;Search and Bind&lt;/strong&gt; &amp;mdash; Use this method to connect to the LDAP server using a pre-configured set of credentials. This method can be used when the value for the CN field on your users&amp;#39; LDAP account does not match the username defined in Appian, eg the Appian username may be another field such as UID or sAMAccountName in a standard Active Directory environment. Search and bind requires a service account that has full access to the base DN, since this account will search for the user who is attempting to log in.&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#ldap-authentication"&gt;LDAP Authentication&lt;/a&gt; under &lt;strong&gt;Authentication Method&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A: &lt;/strong&gt;&lt;span style="font-weight:400;"&gt;Yes. To integrate with Appian Cloud, it is recommended that a VPN connection should be established between the Appian environment and your LDAP server. See our documentation on VPN integration here:&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html"&gt;https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html&lt;/a&gt;. Note that if you wish to use LDAPS,&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;DNS resolution must be configured and you&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;must use publicly signed CA certificates.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;Add the following loggers to the appian_log4j.properties file located in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG&lt;br /&gt;log4j.logger.org.springframework.security=DEBUG&lt;br /&gt;log4j.logger.com.appian.directory.syncwithusernames=DEBUG&lt;br /&gt;log4j.logger.com.appiancorp.plugin.directory=DEBUG&lt;br /&gt;log4j.logger.org.ldaptive=DEBUG&lt;/pre&gt;
&lt;p&gt;Then rerun the process and check the application server log for details on the error you may be facing. Most of the time the error stems from a connection issue from the Appian server to the LDAP server.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: August 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: LDAP, authentication, FAQ&lt;/div&gt;
</description></item><item><title>[DRAFT] KB-XXXX LDAP Authentication FAQ</title><link>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq/revision/6</link><pubDate>Wed, 29 Aug 2018 22:01:11 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:ff9bcdf1-d240-45dd-954b-788e73fd66af</guid><dc:creator>Tom Ryan</dc:creator><comments>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq#comments</comments><description>Revision 6 posted to Appian Knowledge Base by Tom Ryan on 8/29/2018 10:01:11 PM&lt;br /&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to&amp;nbsp;LDAP authentication in Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&lt;/strong&gt; Should I restrict LDAP authentication to a particular group?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Yes. This prevents getting locked out of the environment if the LDAP server is unreachable (network issue).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;What is my DN pattern?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;The DN, or Distinguished Name, is the unique list of domain components added together to define your LDAP user objects,&amp;nbsp;similar to how&amp;nbsp;a full file path defines a file location in an operating system. The DN pattern in conjunction with the LDAP URL will identify where your Appian users reside in your LDAP directory in order for Appian to find and authenticate users. Whatever is specified as the LDAP username attribute should be added to the DN pattern&amp;nbsp;set to {username}. {username} will be replaced by the username entered by the user.&lt;/p&gt;
&lt;p&gt;For example, in the Appian Admin console if your username attribute is set to &lt;strong&gt;cn&lt;/strong&gt; and your user&amp;#39;s Distinguished Names were made up of domain components &lt;strong&gt;ou=appianusers, dc=companyName, dc=com,&amp;nbsp;&lt;/strong&gt;provided a URL such as &lt;code&gt;ldap://&amp;lt;LDAP_FQDN_OR_IP_ADDRESS&amp;gt;:389/dc=companyName,dc=com&lt;/code&gt;, your DN pattern would be &lt;strong&gt;cn={username},&amp;nbsp;ou=appianusers&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;span style="font-weight:400;"&gt;Can Appian implement multiple LDAP servers?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;Yes, Appian can accept multiple LDAP URLs, however the base DN must be the same.The intention is for each additional URL to serve as a backup in case the first server goes down. They are not intended to be used as multiple base DN providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;span style="font-weight:400;"&gt;Yes, if LDAP authentication is restricted to a particular group then when users are created they will be automatically added to that group. &lt;strong&gt;Note:&lt;/strong&gt; users created like this default to the Basic User type.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;span style="font-weight:400;"&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;Bind&amp;nbsp;&lt;/strong&gt;&amp;mdash; Use this method when Appian should connect to the LDAP server and bind using the username (CN) and password of the user who is attempting to log in to Appian. Use this method when the CN field on the LDAP account matches the username defined in Appian.&lt;br /&gt;&lt;strong&gt;Search and Bind&lt;/strong&gt; &amp;mdash; Use this method to connect to the LDAP server using a pre-configured set of credentials. This method can be used when the value for the CN field on your users&amp;#39; LDAP account does not match the username defined in Appian, eg the Appian username may be another field such as UID or sAMAccountName in a standard Active Directory environment. Search and bind requires a service account that has full access to the base DN, since this account will search for the user who is attempting to log in.&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#ldap-authentication"&gt;LDAP Authentication&lt;/a&gt; under &lt;strong&gt;Authentication Method&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A: &lt;/strong&gt;&lt;span style="font-weight:400;"&gt;Yes. To integrate with Appian Cloud, it is recommended that a VPN connection should be established between the Appian environment and your LDAP server. See our documentation on VPN integration here:&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html"&gt;https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html&lt;/a&gt;. Note that if you wish to use LDAPS,&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;DNS resolution must be configured and you&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;must use publicly signed CA certificates.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;Add the following loggers to the appian_log4j.properties file located in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG&lt;br /&gt;log4j.logger.org.springframework.security=DEBUG&lt;br /&gt;log4j.logger.com.appian.directory.syncwithusernames=DEBUG&lt;br /&gt;log4j.logger.com.appiancorp.plugin.directory=DEBUG&lt;br /&gt;log4j.logger.org.ldaptive=DEBUG&lt;/pre&gt;
&lt;p&gt;Then rerun the process and check the application server log for details on the error you may be facing. Most of the time the error stems from a connection issue from the Appian server to the LDAP server.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: August 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: LDAP, authentication, FAQ&lt;/div&gt;
</description></item><item><title>[DRAFT] KB-XXXX LDAP Authentication FAQ</title><link>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq/revision/5</link><pubDate>Thu, 23 Aug 2018 21:21:59 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:ff9bcdf1-d240-45dd-954b-788e73fd66af</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq#comments</comments><description>Revision 5 posted to Appian Knowledge Base by Parmida Borhani on 8/23/2018 9:21:59 PM&lt;br /&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to&amp;nbsp;LDAP authentication in Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&lt;/strong&gt; Should I restrict LDAP authentication to a particular group?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Yes. This prevents getting locked out of the environment if the LDAP server is unreachable (network issue).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;What is my DN pattern?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;The DN, or Distinguished Name, is the unique list of domain components added together to define your LDAP user objects,&amp;nbsp;similar to how&amp;nbsp;a full file path defines a file location in an operating system. The DN pattern in conjunction with the LDAP URL will identify where your Appian users reside in your LDAP directory in order for Appian to find and authenticate users. Whatever is specified as the LDAP username attribute should be added to the DN pattern&amp;nbsp;set to {username}. {username} will be replaced by the username entered by the user.&lt;/p&gt;
&lt;p&gt;For example, in the Appian Admin console if your username attribute is set to &lt;strong&gt;cn&lt;/strong&gt; and your user&amp;#39;s Distinguished Names were made up of domain components &lt;strong&gt;ou=appianusers, dc=companyName, dc=com,&amp;nbsp;&lt;/strong&gt;provided a URL such as &lt;code&gt;ldap://&amp;lt;LDAP_FQDN_OR_IP_ADDRESS&amp;gt;:389/dc=companyName,dc=com&lt;/code&gt;, your DN pattern would be &lt;strong&gt;cn={username},&amp;nbsp;ou=appianusers&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;span style="font-weight:400;"&gt;Can Appian implement multiple LDAP servers?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;Yes, Appian can accept multiple LDAP URLs, however the base DN must be the same.The intention is for each additional URL to serve as a backup in case the first server goes down. They are not intended to be used as multiple base DN providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;span style="font-weight:400;"&gt;Yes, if LDAP authentication is restricted to a particular group then when users are created they will be automatically added to that group. &lt;strong&gt;Note:&lt;/strong&gt; users created like this default to the Basic User type.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;span style="font-weight:400;"&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;Bind&amp;nbsp;&lt;/strong&gt;&amp;mdash; Use LDAP bind when Appian connects to the LDAP server and binds using the CN and password. (These values are the username and password of the user logging Appian). Use the bind method when your LDAP account&amp;#39;s CN field matches that of the username defined in Appian.&lt;br /&gt;&lt;strong&gt;Search and Bind&lt;/strong&gt; &amp;mdash; Use LDAP search and bind when your LDAP account&amp;#39;s CN field is a user&amp;#39;s full name or does not match the username defined in Appian. For search and bind, the username is usually in another field such as UID or sAMAccountName in a standard Active Directory environment. Search and bind requires the credentials for a service account that has full access to the base DN. This information allows Appian to log into the LDAP server and search for the specified field.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;&lt;span style="font-weight:400;"&gt;To integrate with Cloud, a VPN connection should be established between the Appian environment and your LDAP server. See our documentation on VPN integration here:&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html"&gt;https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html&lt;/a&gt;. Note that with a VPN set up, LDAPS (LDAP with SSL) is not required since the connection is already protected via the VPN tunnel. If you wish to use LDAPS,&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;DNS resolution must be configured and you&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;must use publicly signed CA certificates.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;Add the following loggers to the appian_log4j.properties file located in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG&lt;br /&gt;log4j.logger.org.springframework.security=DEBUG&lt;br /&gt;log4j.logger.com.appian.directory.syncwithusernames=DEBUG&lt;br /&gt;log4j.logger.com.appiancorp.plugin.directory=DEBUG&lt;br /&gt;log4j.logger.org.ldaptive=DEBUG&lt;/pre&gt;
&lt;p&gt;Then rerun the process and check the application server log for details on the error you may be facing. Most of the time the error stems from a connection issue from the Appian server to the LDAP server.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: August 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: LDAP, authentication, FAQ&lt;/div&gt;
</description></item><item><title>[DRAFT] KB-XXXX LDAP Authentication FAQ</title><link>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq/revision/4</link><pubDate>Thu, 23 Aug 2018 04:52:39 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:ff9bcdf1-d240-45dd-954b-788e73fd66af</guid><dc:creator>Sean Kim</dc:creator><comments>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq#comments</comments><description>Revision 4 posted to Appian Knowledge Base by Sean Kim on 8/23/2018 4:52:39 AM&lt;br /&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to&amp;nbsp;LDAP authentication in Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&lt;/strong&gt; Should I restrict LDAP authentication to a particular group?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Yes. This prevents getting locked out of the environment if the LDAP server is unreachable (network issue).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;What is my DN pattern?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;The DN, or Distinguished Name, is the unique list of domain components added together to define your LDAP user objects,&amp;nbsp;similar to how&amp;nbsp;a full file path defines a file location in an operating system. The DN pattern in conjunction with the LDAP URL will identify where your Appian users reside in your LDAP directory in order for Appian to find and authenticate users. Whatever is specified as the LDAP username attribute should be added to the DN pattern&amp;nbsp;set to {username}. {username} will be replaced by the username entered by the user.&lt;/p&gt;
&lt;p&gt;For example, in the Appian Admin console if your username attribute is set to &lt;strong&gt;cn&lt;/strong&gt; and your user&amp;#39;s Distinguished Names were made up of domain components &lt;strong&gt;ou=appianusers, dc=companyName, dc=com,&amp;nbsp;&lt;/strong&gt;provided a URL such as &lt;strong&gt;&lt;code&gt;ldap://&amp;lt;LDAP_FQDN_OR_IP_ADDRESS&amp;gt;:389/dc=companyName,dc=com&lt;/code&gt;, &lt;/strong&gt;your DN pattern would be &lt;strong&gt;cn={username},&amp;nbsp;ou=appianusers&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;span style="font-weight:400;"&gt;Can Appian implement multiple LDAP servers?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;Yes, Appian can accept multiple LDAP URLs, however the base DN must be the same.The intention is for each additional URL to serve as a backup in case the first server goes down. They are not intended to be used as multiple base DN providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;span style="font-weight:400;"&gt;Yes, if LDAP authentication is restricted to a particular group then when users are created they will be automatically added to that group. &lt;strong&gt;Note:&lt;/strong&gt; users created like this default to the Basic User type.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;span style="font-weight:400;"&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;Bind&amp;nbsp;&lt;/strong&gt;&amp;mdash; Use LDAP bind when Appian connects to the LDAP server and binds using the CN and password. (These values are the username and password of the user logging Appian). Use the bind method when your LDAP account&amp;#39;s CN field matches that of the username defined in Appian.&lt;br /&gt;&lt;strong&gt;Search and Bind&lt;/strong&gt; &amp;mdash; Use LDAP search and bind when your LDAP account&amp;#39;s CN field is a user&amp;#39;s full name or does not match the username defined in Appian. For search and bind, the username is usually in another field such as UID or sAMAccountName in a standard Active Directory environment. Search and bind requires the credentials for a service account that has full access to the base DN. This information allows Appian to log into the LDAP server and search for the specified field.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;&lt;span style="font-weight:400;"&gt;To integrate with Cloud, a VPN connection should be established between the Appian environment and your LDAP server. See our documentation on VPN integration here:&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html"&gt;https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html&lt;/a&gt;. Note that with a VPN set up, LDAPS (LDAP with SSL) is not required since the connection is already protected via the VPN tunnel. If you wish to use LDAPS,&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;DNS resolution must be configured and you&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;must use publicly signed CA certificates.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;Add the following loggers to the appian_log4j.properties file located in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources&lt;/code&gt;:&lt;/p&gt;
&lt;p&gt;log4j.logger.com.appiancorp.security=DEBUG&lt;br /&gt;log4j.logger.org.springframework.security=DEBUG&lt;br /&gt;log4j.logger.com.appian.directory.syncwithusernames=DEBUG&lt;br /&gt;log4j.logger.com.appiancorp.plugin.directory=DEBUG&lt;br /&gt;log4j.logger.org.ldaptive=DEBUG&lt;/p&gt;
&lt;p&gt;Then rerun the process and check the application server log for details on the error you may be facing. Most of the time the error stems from a connection issue from the Appian server to the LDAP server.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: August 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: LDAP, authentication, FAQ&lt;/div&gt;
</description></item><item><title>[DRAFT] KB-XXXX LDAP Authentication FAQ</title><link>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq/revision/3</link><pubDate>Thu, 23 Aug 2018 04:51:18 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:ff9bcdf1-d240-45dd-954b-788e73fd66af</guid><dc:creator>Sean Kim</dc:creator><comments>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq#comments</comments><description>Revision 3 posted to Appian Knowledge Base by Sean Kim on 8/23/2018 4:51:18 AM&lt;br /&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to&amp;nbsp;LDAP authentication in Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&lt;/strong&gt; Should I restrict LDAP authentication to a particular group?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Yes. This prevents getting locked out of the environment if the LDAP server is unreachable (network issue).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;What is my DN pattern?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;The DN, or Distinguished Name, is the unique list of domain components added together to define your LDAP user objects,&amp;nbsp;similar to how&amp;nbsp;a full file path defines a file location in an operating system. The DN pattern in conjunction with the LDAP URL will identify where your Appian users reside in your LDAP directory in order for Appian to find and authenticate users. Whatever is specified as the LDAP username attribute should be added to the DN pattern&amp;nbsp;set to {username}. {username} will be replaced by the username entered by the user.&lt;/p&gt;
&lt;p&gt;For example, in the Appian Admin console if your username attribute is set to &lt;strong&gt;cn&lt;/strong&gt; and your user&amp;#39;s Distinguished Names were made up of domain components &lt;strong&gt;ou=appianusers, dc=companyName, dc=com,&amp;nbsp;&lt;/strong&gt;provided a URL such as &lt;strong&gt;&lt;code&gt;ldap://&amp;lt;LDAP_FQDN_OR_IP_ADDRESS&amp;gt;:389/dc=companyName,dc=com&lt;/code&gt;, &lt;/strong&gt;your DN pattern would be &lt;strong&gt;cn={username},&amp;nbsp;ou=appianusers&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;span style="font-weight:400;"&gt;Can Appian implement multiple LDAP servers?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;Yes, Appian can accept multiple LDAP URLs, however the base DN must be the same.The intention is for each additional URL to serve as a backup in case the first server goes down. They are not intended to be used as multiple base DN providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;span style="font-weight:400;"&gt;Yes, if LDAP authentication is restricted to a particular group then when users are created they will be automatically added to that group. &lt;strong&gt;Note:&lt;/strong&gt; users created like this default to the Basic User type.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;span style="font-weight:400;"&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;Bind&amp;nbsp;&lt;/strong&gt;&amp;mdash; Use LDAP bind when Appian connects to the LDAP server and binds using the CN and password. (These values are the username and password of the user logging Appian). Use the bind method when your LDAP account&amp;#39;s CN field matches that of the username defined in Appian.&lt;br /&gt;&lt;strong&gt;Search and Bind&lt;/strong&gt; &amp;mdash; Use LDAP search and bind when your LDAP account&amp;#39;s CN field is a user&amp;#39;s full name or does not match the username defined in Appian. For search and bind, the username is usually in another field such as UID or sAMAccountName in a standard Active Directory environment. Search and bind requires the credentials for a service account that has full access to the base DN. This information allows Appian to log into the LDAP server and search for the specified field.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;&lt;span style="font-weight:400;"&gt;To integrate with Cloud, a VPN connection should be established between the Appian environment and your LDAP server. See our documentation on VPN integration here:&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html"&gt;https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html&lt;/a&gt;. Note that with a VPN set up, LDAPS (LDAP with SSL) is not required since the connection is already protected via the VPN tunnel. If you wish to use LDAPS,&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;DNS resolution must be configured and you&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;must use publicly signed CA certificates.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;Add the following loggers to the appian_log4j.properties file located in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources&lt;/code&gt;:&lt;/p&gt;
&lt;p&gt;log4j.logger.com.appiancorp.security=DEBUG&lt;br /&gt;log4j.logger.org.springframework.security=DEBUG&lt;/p&gt;
&lt;p&gt;log4j.logger.com.appian.directory.syncwithusernames=DEBUG&lt;/p&gt;
&lt;p&gt;log4j.logger.com.appiancorp.plugin.directory=DEBUG&lt;br /&gt;log4j.logger.org.ldaptive=DEBUG&lt;/p&gt;
&lt;p&gt;Then rerun the process and check the application server log for details on the error you may be facing. Most of the time the error stems from a connection issue from the Appian server to the LDAP server.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: August 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: LDAP, authentication, FAQ&lt;/div&gt;
</description></item><item><title>[DRAFT] KB-XXXX LDAP Authentication FAQ</title><link>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq/revision/1</link><pubDate>Wed, 22 Aug 2018 15:59:21 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:ff9bcdf1-d240-45dd-954b-788e73fd66af</guid><dc:creator>Sean Kim</dc:creator><comments>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Sean Kim on 8/22/2018 3:59:21 PM&lt;br /&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&lt;/strong&gt; Should I restrict LDAP authentication to a particular group?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; YES. This prevents getting locked out of the environment if the LDAP server is unreachable (network issue).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;What is my DN pattern?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;The DN, or Distinguished Name, is the unique list of domain components added together to define your LDAP directory structure. The DN pattern will identify where your Appian users reside in your LDAP directory in order for Appian to find and authenticate users. Whatever is specified as the LDAP username attribute should be added to the DN pattern&amp;nbsp;set to {username}. {username} will be replaced by the username entered by the user.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;span style="font-weight:400;"&gt;Can Appian implement multiple LDAP servers?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;Yes, Appian can accept multiple LDAP URLs, however the base DN must be the same.The intention is for each additional URL to serve as a backup in case the first server goes down. They are not intended to be used as multiple base DN providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;span style="font-weight:400;"&gt;Yes, if LDAP authentication is restricted to a particular group then when users are created they will be automatically added to that group. **Note: users created like this default to the Basic User type.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;span style="font-weight:400;"&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;Bind&amp;nbsp;&lt;/strong&gt;&amp;mdash; Use LDAP bind when Appian connects to the LDAP server and binds using the CN and password. (These values are the username and password of the user logging Appian). Use the bind method when your LDAP account&amp;#39;s CN field matches that of the username defined in Appian.&lt;br /&gt;&lt;strong&gt;Search and Bind&lt;/strong&gt; &amp;mdash; Use LDAP search and bind when your LDAP account&amp;#39;s CN field is a user&amp;#39;s full name or does not match the username defined in Appian. For search and bind, the username is usually in another field such as UID or sAMAccountName in a standard Active Directory environment. Search and bind requires the credentials for a service account that has full access to the base DN. This information allows Appian to log into the LDAP server and search for the specified field.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;&lt;span style="font-weight:400;"&gt;To integrate with Cloud, a VPN connection should be established between the Appian environment and your LDAP server. See our documentation on VPN integration here:&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html"&gt;https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html&lt;/a&gt;. Note that with a VPN set up, LDAPS (LDAP with SSL) is not required since the connection is already protected via the VPN tunnel. If you wish to use LDAPS,&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;DNS resolution must be configured and you&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;must use publicly signed CA certificates.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;Add the following loggers to the appian_log4j.properties file located in &amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;log4j.logger.com.appiancorp.security=DEBUG&lt;br /&gt;log4j.logger.org.springframework.security=DEBUG&lt;/li&gt;
&lt;li&gt;log4j.logger.com.appian.directory.syncwithusernames=DEBUG&lt;/li&gt;
&lt;li&gt;log4j.logger.com.appiancorp.plugin.directory=DEBUG&lt;br /&gt;log4j.logger.org.ldaptive=DEBUG&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Then rerun the process and check the JBoss server log for details on the error you may be facing. Most of the time the error stems from a connection issue from the Appian server to the LDAP server.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: August 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: LDAP, authentication, FAQ&lt;/div&gt;
</description></item><item><title>[DRAFT] KB-XXXX LDAP Authentication FAQ</title><link>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq/revision/2</link><pubDate>Wed, 22 Aug 2018 11:59:35 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:ff9bcdf1-d240-45dd-954b-788e73fd66af</guid><dc:creator>Sean Kim</dc:creator><comments>https://community.appian.com/support/w/kb/1091/kb-1683-ldap-authentication-faq#comments</comments><description>Revision 2 posted to Appian Knowledge Base by Sean Kim on 8/22/2018 11:59:35 AM&lt;br /&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&lt;/strong&gt; Should I restrict LDAP authentication to a particular group?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; YES. This prevents getting locked out of the environment if the LDAP server is unreachable (network issue).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;What is my DN pattern?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;The DN, or Distinguished Name, is the unique list of domain components added together to define your LDAP directory structure. The DN pattern will identify where your Appian users reside in your LDAP directory in order for Appian to find and authenticate users. Whatever is specified as the LDAP username attribute should be added to the DN pattern&amp;nbsp;set to {username}. {username} will be replaced by the username entered by the user.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;span style="font-weight:400;"&gt;Can Appian implement multiple LDAP servers?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;Yes, Appian can accept multiple LDAP URLs, however the base DN must be the same.The intention is for each additional URL to serve as a backup in case the first server goes down. They are not intended to be used as multiple base DN providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;Can Appian users who are created upon first login be placed in a group automatically?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;span style="font-weight:400;"&gt;Yes, if LDAP authentication is restricted to a particular group then when users are created they will be automatically added to that group. **Note: users created like this default to the Basic User type.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;span style="font-weight:400;"&gt;What is the difference between &amp;ldquo;Bind as user&amp;rdquo; vs. &amp;ldquo;Search for user then bind as user&amp;rdquo; options?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;Bind&amp;nbsp;&lt;/strong&gt;&amp;mdash; Use LDAP bind when Appian connects to the LDAP server and binds using the CN and password. (These values are the username and password of the user logging Appian). Use the bind method when your LDAP account&amp;#39;s CN field matches that of the username defined in Appian.&lt;br /&gt;&lt;strong&gt;Search and Bind&lt;/strong&gt; &amp;mdash; Use LDAP search and bind when your LDAP account&amp;#39;s CN field is a user&amp;#39;s full name or does not match the username defined in Appian. For search and bind, the username is usually in another field such as UID or sAMAccountName in a standard Active Directory environment. Search and bind requires the credentials for a service account that has full access to the base DN. This information allows Appian to log into the LDAP server and search for the specified field.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;Can I set up LDAP with my Appian Cloud environment?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;&lt;span style="font-weight:400;"&gt;To integrate with Cloud, a VPN connection should be established between the Appian environment and your LDAP server. See our documentation on VPN integration here:&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html"&gt;https://docs.appian.com/suite/help/latest/Cloud_VPN_Integration.html&lt;/a&gt;. Note that with a VPN set up, LDAPS (LDAP with SSL) is not required since the connection is already protected via the VPN tunnel. If you wish to use LDAPS,&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;DNS resolution must be configured and you&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;must use publicly signed CA certificates.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q:&amp;nbsp;&lt;/strong&gt;My LDAP Sync process is not working correctly. What can I do?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&amp;nbsp;&lt;/strong&gt;Add the following loggers to the appian_log4j.properties file located in &amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;log4j.logger.com.appiancorp.security=DEBUG&lt;br /&gt;log4j.logger.org.springframework.security=DEBUG&lt;/li&gt;
&lt;li&gt;log4j.logger.com.appian.directory.syncwithusernames=DEBUG&lt;/li&gt;
&lt;li&gt;log4j.logger.com.appiancorp.plugin.directory=DEBUG&lt;br /&gt;log4j.logger.org.ldaptive=DEBUG&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Then rerun the process and check the JBoss server log for details on the error you may be facing. Most of the time the error stems from a connection issue from the Appian server to the LDAP server.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: August 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: LDAP, authentication, FAQ&lt;/div&gt;
</description></item></channel></rss>