<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-1067 Web service call authentication fails over HTTPS</title><link>https://community.appian.com/support/w/kb/292/kb-1067-web-service-call-authentication-fails-over-https</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-1067 Web service call authentication fails over HTTPS</title><link>https://community.appian.com/support/w/kb/292/kb-1067-web-service-call-authentication-fails-over-https</link><pubDate>Mon, 30 Jul 2018 03:42:17 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:2a409c99-8d3b-4310-b47f-704193925d7e</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/292/kb-1067-web-service-call-authentication-fails-over-https#comments</comments><description>Current Revision posted to Appian Knowledge Base by Parmida Borhani on 7/30/2018 3:42:17 AM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;table style="background-color:#bcedaf;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;This issue has been resolved in an Appian hotfix/new Appian version. Please apply the latest hotfix to your Appian installation or upgrade to the latest version of Appian.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;When using the Call Web Service smart service, it fails to connect to the web service endpoint and the following error is generated in application server log:&lt;/p&gt;
&lt;pre&gt;INFO  [stdout] (ajp-/0.0.0.0:8009-7) com.appiancorp.ws.WSClientException: The WSDL cannot be processed because the remote server&amp;#39;s certificate is invalid.  Check that the certificate has not expired. (APNX-1-4045-005)
...
INFO  [stdout] (ajp-/0.0.0.0:8009-7) Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
&lt;/pre&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;The server hosting the web service is not configured to send back a list of client certificate CA names to the client attempting to authenticate. This can be determined by running the following command, where &lt;code&gt;&amp;lt;IP_ADDRESS&amp;gt;&lt;/code&gt; and &lt;code&gt;&amp;lt;PORT&amp;gt;&lt;/code&gt; are the IP and port used by the server hosting the web service:&lt;/p&gt;
&lt;pre&gt;openssl s_client -showcerts -connect &amp;lt;IP_ADDRESS&amp;gt;:&amp;lt;PORT&amp;gt;
&lt;/pre&gt;
&lt;p&gt;This will generate an output similar to the following (note that the output shown here has omitted the certificate strings and other information for readability):&lt;/p&gt;
&lt;pre&gt;CONNECTED(00000003)
---
Server certificate
subject=&amp;lt;SERVER&amp;gt;
issuer=&amp;lt;ISSUING CA&amp;gt;
---
No client certificate CA names sent
---
SSL handshake has read 4567 bytes and written 288 bytes
---
New, TLSv1/SSLv3, Cipher is EDH-RSA-DES-CBC3-SHA
Server public key is 1024 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol  : TLSv1
Cipher    : EDH-RSA-DES-CBC3-SHA
Session-ID: XXXX
Session-ID-ctx: 
Master-Key: YYYY
Key-Arg   : None
Start Time: 1447147689
Timeout   : 300 (sec)
Verify return code: 19 (self signed certificate in certificate chain)
---
&lt;/pre&gt;
&lt;p&gt;Notice the section that states &lt;strong&gt;&amp;quot;No client certificate CA names sent&amp;quot;&lt;/strong&gt;. This indicates that the server is not sending back a list of client certificate CA names, which Appian requires in order to authenticate properly.&lt;/p&gt;
&lt;p&gt;This issue has been resolved via&amp;nbsp;&lt;strong&gt;AN-57245&lt;/strong&gt; in the following Appian hotfixes/versions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Appian 7.10 Hotfix Package O&lt;/li&gt;
&lt;li&gt;Appian 7.11 Hotfix Package L&lt;/li&gt;
&lt;li&gt;Appian 16.1 Hotfix Package K&lt;/li&gt;
&lt;li&gt;Appian 16.2 Hotfix Package H&lt;/li&gt;
&lt;li&gt;Appian 16.3 Hotfix Package D&lt;/li&gt;
&lt;li&gt;Appian 17.1 Hotfix Package A&lt;/li&gt;
&lt;li&gt;Appian 17.2&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;p&gt;Apply the latest hotfix to your Appian installation or upgrade to the latest version of Appian.&lt;/p&gt;
&lt;h2&gt;Workaround&lt;/h2&gt;
&lt;p&gt;The following workarounds can resolve this issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Modify the web service to accept basic authentication. Once the web service accepts basic authentication, users can place the credentials specific to the web service in &lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#Third-Party_Credentials"&gt;Third-Party Credentials&lt;/a&gt; in Tempo. This can be configured in Appian using the &lt;a href="https://docs.appian.com/suite/help/latest/Secure_Credentials_Store.html"&gt;Secure Credentials Store&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Configure the server hosting the web service to send back a list of client certificate CA names. Note that this can work with either a certificate signed using an internal Certificate Authority, or one signed using a public, trusted Certificate Authority.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 17.1 and older.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: July 2017&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: known issues, third-party, integration, web services, fixed issues&lt;/div&gt;
</description></item><item><title>KB-1067 Web service call authentication fails over HTTPS</title><link>https://community.appian.com/support/w/kb/292/kb-1067-web-service-call-authentication-fails-over-https/revision/4</link><pubDate>Thu, 13 Jul 2017 14:57:43 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:2a409c99-8d3b-4310-b47f-704193925d7e</guid><dc:creator>Nick Vigilante</dc:creator><comments>https://community.appian.com/support/w/kb/292/kb-1067-web-service-call-authentication-fails-over-https#comments</comments><description>Revision 4 posted to Appian Knowledge Base by Nick Vigilante on 7/13/2017 2:57:43 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;table style="background-color:#bcedaf;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;This issue has been resolved in an Appian hotfix/new Appian version. Please apply the latest hotfix to your Appian installation or upgrade to the latest version of Appian.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;When using the Call Web Service smart service, it fails to connect to the web service endpoint and the following error is generated in application server log:&lt;/p&gt;
&lt;pre&gt;INFO  [stdout] (ajp-/0.0.0.0:8009-7) com.appiancorp.ws.WSClientException: The WSDL cannot be processed because the remote server&amp;#39;s certificate is invalid.  Check that the certificate has not expired. (APNX-1-4045-005)
...
INFO  [stdout] (ajp-/0.0.0.0:8009-7) Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
&lt;/pre&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;The server hosting the web service is not configured to send back a list of client certificate CA names to the client attempting to authenticate. This can be determined by running the following command, where &lt;code&gt;&amp;lt;IP_ADDRESS&amp;gt;&lt;/code&gt; and &lt;code&gt;&amp;lt;PORT&amp;gt;&lt;/code&gt; are the IP and port used by the server hosting the web service:&lt;/p&gt;
&lt;pre&gt;openssl s_client -showcerts -connect &amp;lt;IP_ADDRESS&amp;gt;:&amp;lt;PORT&amp;gt;
&lt;/pre&gt;
&lt;p&gt;This will generate an output similar to the following (note that the output shown here has omitted the certificate strings and other information for readability):&lt;/p&gt;
&lt;pre&gt;CONNECTED(00000003)
---
Server certificate
subject=&amp;lt;SERVER&amp;gt;
issuer=&amp;lt;ISSUING CA&amp;gt;
---
No client certificate CA names sent
---
SSL handshake has read 4567 bytes and written 288 bytes
---
New, TLSv1/SSLv3, Cipher is EDH-RSA-DES-CBC3-SHA
Server public key is 1024 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol  : TLSv1
Cipher    : EDH-RSA-DES-CBC3-SHA
Session-ID: XXXX
Session-ID-ctx: 
Master-Key: YYYY
Key-Arg   : None
Start Time: 1447147689
Timeout   : 300 (sec)
Verify return code: 19 (self signed certificate in certificate chain)
---
&lt;/pre&gt;
&lt;p&gt;Notice the section that states &lt;strong&gt;&amp;quot;No client certificate CA names sent&amp;quot;&lt;/strong&gt;. This indicates that the server is not sending back a list of client certificate CA names, which Appian requires in order to authenticate properly.&lt;/p&gt;
&lt;p&gt;This issue has been resolved via&amp;nbsp;&lt;strong&gt;AN-57245&lt;/strong&gt; in the following Appian hotfixes/versions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Appian 7.10 Hotfix Package O&lt;/li&gt;
&lt;li&gt;Appian 7.11 Hotfix Package L&lt;/li&gt;
&lt;li&gt;Appian 16.1 Hotfix Package K&lt;/li&gt;
&lt;li&gt;Appian 16.2 Hotfix Package H&lt;/li&gt;
&lt;li&gt;Appian 16.3 Hotfix Package D&lt;/li&gt;
&lt;li&gt;Appian 17.1 Hotfix Package A&lt;/li&gt;
&lt;li&gt;Appian 17.2&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;p&gt;Apply the latest hotfix to your Appian installation or upgrade to the latest version of Appian.&lt;/p&gt;
&lt;h2&gt;Workaround&lt;/h2&gt;
&lt;p&gt;The following workarounds can resolve this issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Modify the web service to accept basic authentication. Once the web service accepts basic authentication, users can place the credentials specific to the web service in &lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#Third-Party_Credentials"&gt;Third-Party Credentials&lt;/a&gt; in Tempo. This can be configured in Appian using the &lt;a href="https://docs.appian.com/suite/help/latest/Secure_Credentials_Store.html"&gt;Secure Credentials Store&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Configure the server hosting the web service to send back a list of client certificate CA names. Note that this can work with either a certificate signed using an internal Certificate Authority, or one signed using a public, trusted Certificate Authority.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 17.1 and older.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: July 2017&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: known issues, third-party, web services, fixed issues&lt;/div&gt;
</description></item><item><title>KB-1067 Web service call authentication fails over HTTPS</title><link>https://community.appian.com/support/w/kb/292/kb-1067-web-service-call-authentication-fails-over-https/revision/3</link><pubDate>Thu, 13 Jul 2017 14:55:10 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:2a409c99-8d3b-4310-b47f-704193925d7e</guid><dc:creator>Nick Vigilante</dc:creator><comments>https://community.appian.com/support/w/kb/292/kb-1067-web-service-call-authentication-fails-over-https#comments</comments><description>Revision 3 posted to Appian Knowledge Base by Nick Vigilante on 7/13/2017 2:55:10 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;table style="background-color:#bcedaf;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;This issue has been resolved in an Appian hotfix/new Appian version. Please apply the latest hotfix to your Appian installation or upgrade to the latest version of Appian.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;
&lt;h2 id="symptoms"&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;When using the Call Web Service smart service, it fails to connect to the web service endpoint and the following error is generated in application server log:&lt;/p&gt;
&lt;pre&gt;INFO  [stdout] (ajp-/0.0.0.0:8009-7) com.appiancorp.ws.WSClientException: The WSDL cannot be processed because the remote server&amp;#39;s certificate is invalid.  Check that the certificate has not expired. (APNX-1-4045-005)
...
INFO  [stdout] (ajp-/0.0.0.0:8009-7) Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
&lt;/pre&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;The server hosting the web service is not configured to send back a list of client certificate CA names to the client attempting to authenticate. This can be determined by running the following command, where &lt;code&gt;&amp;lt;IP_ADDRESS&amp;gt;&lt;/code&gt; and &lt;code&gt;&amp;lt;PORT&amp;gt;&lt;/code&gt; are the IP and port used by the server hosting the web service:&lt;/p&gt;
&lt;pre&gt;openssl s_client -showcerts -connect &amp;lt;IP_ADDRESS&amp;gt;:&amp;lt;PORT&amp;gt;
&lt;/pre&gt;
&lt;p&gt;This will generate an output similar to the following (note that the output shown here has omitted the certificate strings and other information for readability):&lt;/p&gt;
&lt;pre&gt;CONNECTED(00000003)
---
Server certificate
subject=&amp;lt;SERVER&amp;gt;
issuer=&amp;lt;ISSUING CA&amp;gt;
---
No client certificate CA names sent
---
SSL handshake has read 4567 bytes and written 288 bytes
---
New, TLSv1/SSLv3, Cipher is EDH-RSA-DES-CBC3-SHA
Server public key is 1024 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol  : TLSv1
Cipher    : EDH-RSA-DES-CBC3-SHA
Session-ID: XXXX
Session-ID-ctx: 
Master-Key: YYYY
Key-Arg   : None
Start Time: 1447147689
Timeout   : 300 (sec)
Verify return code: 19 (self signed certificate in certificate chain)
---
&lt;/pre&gt;
&lt;p&gt;Notice the section that states &lt;strong&gt;&amp;quot;No client certificate CA names sent&amp;quot;&lt;/strong&gt;. This indicates that the server is not sending back a list of client certificate CA names, which Appian requires in order to authenticate properly.&lt;/p&gt;
&lt;p&gt;This issue has been resolved via&amp;nbsp;&lt;strong&gt;AN-57245&lt;/strong&gt; in the following Appian hotfixes/versions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Appian 7.10 Hotfix Package O&lt;/li&gt;
&lt;li&gt;Appian 7.11 Hotfix Package L&lt;/li&gt;
&lt;li&gt;Appian 16.1 Hotfix Package K&lt;/li&gt;
&lt;li&gt;Appian 16.2 Hotfix Package H&lt;/li&gt;
&lt;li&gt;Appian 16.3 Hotfix Package D&lt;/li&gt;
&lt;li&gt;Appian 17.1 Hotfix Package A&lt;/li&gt;
&lt;li&gt;Appian 17.2&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;p&gt;Apply the latest hotfix to your Appian installation or upgrade to the latest version of Appian.&lt;/p&gt;
&lt;h2&gt;Workaround&lt;/h2&gt;
&lt;p&gt;The following workarounds can resolve this issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Modify the web service to accept basic authentication. Once the web service accepts basic authentication, users can place the credentials specific to the web service in &lt;a href="https://docs.appian.com/suite/help/17.1/Appian_Administration_Console.html#Third-Party_Credentials"&gt;Third-Party Credentials&lt;/a&gt; in Tempo. This can be configured in Appian using the &lt;a href="https://docs.appian.com/suite/help/17.1/Secure_Credentials_Store.html"&gt;Secure Credentials Store&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Configure the server hosting the web service to send back a list of client certificate CA names. Note that this can work with either a certificate signed using an internal Certificate Authority, or one signed using a public, trusted Certificate Authority.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 17.1 and older.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: July 2017&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: known issues, third-party, web services, fixed issues&lt;/div&gt;
</description></item><item><title>KB-1067 Web service call authentication fails over HTTPS</title><link>https://community.appian.com/support/w/kb/292/kb-1067-web-service-call-authentication-fails-over-https/revision/2</link><pubDate>Thu, 13 Jul 2017 14:42:57 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:2a409c99-8d3b-4310-b47f-704193925d7e</guid><dc:creator>Nick Vigilante</dc:creator><comments>https://community.appian.com/support/w/kb/292/kb-1067-web-service-call-authentication-fails-over-https#comments</comments><description>Revision 2 posted to Appian Knowledge Base by Nick Vigilante on 7/13/2017 2:42:57 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;h2 id="symptoms"&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;When using the Call Web Service smart service, it fails to connect to the web service endpoint and the following error is generated in application server log:&lt;/p&gt;
&lt;pre&gt;INFO  [stdout] (ajp-/0.0.0.0:8009-7) com.appiancorp.ws.WSClientException: The WSDL cannot be processed because the remote server&amp;#39;s certificate is invalid.  Check that the certificate has not expired. (APNX-1-4045-005)
...
INFO  [stdout] (ajp-/0.0.0.0:8009-7) Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
&lt;/pre&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;The server hosting the web service is not configured to send back a list of client certificate CA names to the client attempting to authenticate. This can be determined by running the following command, where &lt;code&gt;&amp;lt;IP_ADDRESS&amp;gt;&lt;/code&gt; and &lt;code&gt;&amp;lt;PORT&amp;gt;&lt;/code&gt; are the IP and port used by the server hosting the web service:&lt;/p&gt;
&lt;pre&gt;openssl s_client -showcerts -connect &amp;lt;IP_ADDRESS&amp;gt;:&amp;lt;PORT&amp;gt;
&lt;/pre&gt;
&lt;p&gt;This will generate an output similar to the following (note that the output shown here has omitted the certificate strings and other information for readability):&lt;/p&gt;
&lt;pre&gt;CONNECTED(00000003)
---
Server certificate
subject=&amp;lt;SERVER&amp;gt;
issuer=&amp;lt;ISSUING CA&amp;gt;
---
No client certificate CA names sent
---
SSL handshake has read 4567 bytes and written 288 bytes
---
New, TLSv1/SSLv3, Cipher is EDH-RSA-DES-CBC3-SHA
Server public key is 1024 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol  : TLSv1
Cipher    : EDH-RSA-DES-CBC3-SHA
Session-ID: XXXX
Session-ID-ctx: 
Master-Key: YYYY
Key-Arg   : None
Start Time: 1447147689
Timeout   : 300 (sec)
Verify return code: 19 (self signed certificate in certificate chain)
---
&lt;/pre&gt;
&lt;p&gt;Notice the section that states &lt;strong&gt;&amp;quot;No client certificate CA names sent&amp;quot;&lt;/strong&gt;. This indicates that the server is not sending back a list of client certificate CA names, which Appian requires in order to authenticate properly.&lt;/p&gt;
&lt;p&gt;This issue has been resolved via&amp;nbsp;&lt;strong&gt;AN-57245&lt;/strong&gt; in the following Appian hotfixes/versions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Appian 7.10 Hotfix Package O&lt;/li&gt;
&lt;li&gt;Appian 7.11 Hotfix Package L&lt;/li&gt;
&lt;li&gt;Appian 16.1 Hotfix Package K&lt;/li&gt;
&lt;li&gt;Appian 16.2 Hotfix Package H&lt;/li&gt;
&lt;li&gt;Appian 16.3 Hotfix Package D&lt;/li&gt;
&lt;li&gt;Appian 17.1 Hotfix Package A&lt;/li&gt;
&lt;li&gt;Appian 17.2&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;p&gt;Apply the latest hotfix to your Appian installation or upgrade to the latest version of Appian.&lt;/p&gt;
&lt;h2&gt;Workaround&lt;/h2&gt;
&lt;p&gt;The following workarounds can resolve this issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Modify the web service to accept basic authentication. Once the web service accepts basic authentication, users can place the credentials specific to the web service in &lt;a href="https://docs.appian.com/suite/help/17.1/Appian_Administration_Console.html#Third-Party_Credentials"&gt;Third-Party Credentials&lt;/a&gt; in Tempo. This can be configured in Appian using the &lt;a href="https://docs.appian.com/suite/help/17.1/Secure_Credentials_Store.html"&gt;Secure Credentials Store&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Configure the server hosting the web service to send back a list of client certificate CA names. Note that this can work with either a certificate signed using an internal Certificate Authority, or one signed using a public, trusted Certificate Authority.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 17.1 and older.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: July 2017&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: known issues, third-party, web services, fixed issues&lt;/div&gt;
</description></item><item><title>KB-1067 Web service call authentication fails over HTTPS</title><link>https://community.appian.com/support/w/kb/292/kb-1067-web-service-call-authentication-fails-over-https/revision/1</link><pubDate>Tue, 21 Feb 2017 21:47:15 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:2a409c99-8d3b-4310-b47f-704193925d7e</guid><dc:creator>Nick Vigilante</dc:creator><comments>https://community.appian.com/support/w/kb/292/kb-1067-web-service-call-authentication-fails-over-https#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Nick Vigilante on 2/21/2017 9:47:15 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;h2 id="symptoms"&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;When using the Call Web Service smart service, it fails to connect to the web service endpoint and the following error is generated in application server log:&lt;/p&gt;
&lt;pre&gt;INFO  [stdout] (ajp-/0.0.0.0:8009-7) com.appiancorp.ws.WSClientException: The WSDL cannot be processed because the remote server&amp;#39;s certificate is invalid.  Check that the certificate has not expired. (APNX-1-4045-005)
...
INFO  [stdout] (ajp-/0.0.0.0:8009-7) Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
&lt;/pre&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;The server hosting the web service is not configured to send back a list of client certificate CA names to the client attempting to authenticate. This can be determined by running the following command, where &lt;code&gt;&amp;lt;IP_ADDRESS&amp;gt;&lt;/code&gt; and &lt;code&gt;&amp;lt;PORT&amp;gt;&lt;/code&gt; are the IP and port used by the server hosting the web service:&lt;/p&gt;
&lt;pre&gt;openssl s_client -showcerts -connect &amp;lt;IP_ADDRESS&amp;gt;:&amp;lt;PORT&amp;gt;
&lt;/pre&gt;
&lt;p&gt;This will generate an output similar to the following (note that the output shown here has omitted the certificate strings and other information for readability):&lt;/p&gt;
&lt;pre&gt;CONNECTED(00000003)
---
Server certificate
subject=&amp;lt;SERVER&amp;gt;
issuer=&amp;lt;ISSUING CA&amp;gt;
---
No client certificate CA names sent
---
SSL handshake has read 4567 bytes and written 288 bytes
---
New, TLSv1/SSLv3, Cipher is EDH-RSA-DES-CBC3-SHA
Server public key is 1024 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol  : TLSv1
Cipher    : EDH-RSA-DES-CBC3-SHA
Session-ID: XXXX
Session-ID-ctx: 
Master-Key: YYYY
Key-Arg   : None
Start Time: 1447147689
Timeout   : 300 (sec)
Verify return code: 19 (self signed certificate in certificate chain)
---
&lt;/pre&gt;
&lt;p&gt;Notice the section that states &lt;strong&gt;&amp;quot;No client certificate CA names sent&amp;quot;&lt;/strong&gt;. This indicates that the server is not sending back a list of client certificate CA names, which Appian requires in order to authenticate properly.&lt;/p&gt;
&lt;p&gt;This issue has been reported to the Appian product team. The reference number for this issue is &lt;strong&gt;AN-57245&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;p&gt;The following workarounds can resolve this issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Modify the web service to accept basic authentication. Once the web service accepts basic authentication, users can place the credentials specific to the web service in &lt;a href="https://docs.appian.com/suite/help/17.1/Appian_Administration_Console.html#Third-Party_Credentials"&gt;Third-Party Credentials&lt;/a&gt; in Tempo. This can be configured in Appian using the &lt;a href="https://docs.appian.com/suite/help/17.1/Secure_Credentials_Store.html"&gt;Secure Credentials Store&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Configure the server hosting the web service to send back a list of client certificate CA names. Note that this can work with either a certificate signed using an internal Certificate Authority, or one signed using a public, trusted Certificate Authority.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: February 2017&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: third-party, web services&lt;/div&gt;
</description></item></channel></rss>