<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2272 PKIX path building failed for Appian RPA agent connection due to a missing certificate in the Java Truststore</title><link>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2272 PKIX path building failed for Appian RPA agent connection due to a missing certificate in the Java Truststore</title><link>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore</link><pubDate>Thu, 09 Nov 2023 17:50:17 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bb13ceed-b54f-4075-ab72-beab18949839</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore#comments</comments><description>Current Revision posted to Appian Knowledge Base by pauline.delacruz on 11/9/2023 5:50:17 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Symptoms&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;When starting the Appian RPA agent, the icon will appear to be gray, which indicates that there is no connection to the site. From the&amp;nbsp;&lt;strong&gt;jidoka-client.log&lt;/strong&gt;&amp;nbsp;in the same folder where the agent was installed, the following trace can be seen:&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span style="font-weight:400;"&gt;&lt;b&gt;|ERROR|com.novayre.jidoka.client.JidokaClient.connect:1043|java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt; &lt;b&gt;|...|&lt;/b&gt; &lt;b&gt;java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;&amp;hellip;&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;Caused&lt;/b&gt; &lt;b&gt;by:&lt;/b&gt; &lt;b&gt;javax.net.ssl.SSLHandshakeException:&lt;/b&gt; &lt;b&gt;sun.security.validator.ValidatorException:&lt;/b&gt; &lt;b&gt;PKIX&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;building&lt;/b&gt; &lt;b&gt;failed:&lt;/b&gt; &lt;b&gt;sun.security.provider.certpath.SunCertPathBuilderException:&lt;/b&gt; &lt;b&gt;unable&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;find&lt;/b&gt; &lt;b&gt;valid&lt;/b&gt; &lt;b&gt;certification&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;requested&lt;/b&gt; &lt;b&gt;target&lt;/b&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Cause&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This is usually&amp;nbsp;occurs because there is a certificate not trusted by the JVM in your host machine for one of the following reasons:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;The certificate is self-signed or signed by a private authority. This can happen by injecting the certificate via an external component such as an antivirus, firewall, proxy, etc.&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;The certificate is signed by a Public Certificate Authority, but the server is not presenting the full certificate chain with all intermediate certs up to the CA root cert.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Action&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Since the agent is running in the JVM, the certificate must be added to the Java Truststore. In order to identify the missing certificates, follow the steps below:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Add the &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; line to the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt; file. &lt;/span&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;strong&gt;Note:&lt;/strong&gt; If this file does not exist in your Appian RPA agent folder, please create it.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Open a command line window and navigate to your Appian RPA agent folder.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Run the following command as is &lt;code&gt;AppianRPAagent.exe &amp;gt; jidoka-client-ssl.log 2&amp;gt;&amp;amp;1&lt;br /&gt;&lt;/code&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent after 1 minute.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Remove the line previously added &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; from the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Open the newly generated &lt;strong&gt;jidoka-client-ssl.log&lt;/strong&gt; to see all the information related with the communication attempt performed and all the certificates failed to validate. The following terms&amp;nbsp;will help you find the&amp;nbsp;required information.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;trustStore is&lt;/code&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;- You will find the path of the truststore used in your JVM.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;adding as trusted certificates&lt;/code&gt;&lt;b&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;After this sentence, you will find all the certificates currently included in your truststore.&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;PKIX path building failed&lt;/code&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;In the lines previous to this message, you can see the different certificates failed to be validated with the labels &amp;quot;Issuer&amp;quot; or &amp;quot;subject&amp;quot;.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Once the missing certificate has been located, it needs to be added to the Java Truststore.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Locate the keystore location in the JRE.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;strong&gt;Note:&lt;/strong&gt; Typically this keystore is found in&lt;/span&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;code&gt;JAVA_HOME\jre\lib\security\&lt;/code&gt; and the default file is &lt;strong&gt;cacerts&lt;/strong&gt;.&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Use the default Java&amp;nbsp;keytool to import the certificate.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;code&gt;JRE_HOME/bin/keytool&amp;nbsp; -import&amp;nbsp; -trustcacerts -alias &amp;lt;certAlias&amp;gt;&amp;nbsp; -file &amp;lt;certFile&amp;gt; -keystore &amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;Please ensure you use the right values in&amp;nbsp;&lt;span&gt;&lt;code&gt;&amp;lt;certAlias&amp;gt;,&amp;nbsp;&amp;lt;certFile&amp;gt; and&amp;nbsp;&amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;When prompted, follow the required steps.&lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Enter keystore password:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Default keystore password is: &amp;quot;changeit&amp;quot;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span&gt;When prompted, follow the required steps.&lt;/span&gt;&lt;br /&gt;
&lt;pre&gt;&lt;b&gt;Trust this certificate? [no]:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Enter &amp;quot;yes&amp;quot;.&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;This imports the certificate into the keystore and displays the message: &lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Certificate was added to keystore&lt;/b&gt;&lt;/pre&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Please open a support case if you have any questions with any of these steps.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Workaround&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;If the certificate is injected by an external application in the host machine, such as an antivirus or firewall, then the external application can be reconfigured to skip the certificate injection.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: November&amp;nbsp;2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: java, Appian RPA, infrastructure, Certificate&lt;/div&gt;
</description></item><item><title>KB-2272 PKIX path building failed for Appian RPA agent connection due to a missing certificate in the Java Truststore</title><link>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore/revision/9</link><pubDate>Thu, 09 Nov 2023 17:49:33 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bb13ceed-b54f-4075-ab72-beab18949839</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore#comments</comments><description>Revision 9 posted to Appian Knowledge Base by pauline.delacruz on 11/9/2023 5:49:33 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Symptoms&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;When starting the Appian RPA agent, the icon will appear to be gray, which indicates that there is no connection to the site. From the&amp;nbsp;&lt;strong&gt;jidoka-client.log&lt;/strong&gt;&amp;nbsp;in the same folder where the agent was installed, the following trace can be seen:&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span style="font-weight:400;"&gt;&lt;b&gt;|ERROR|com.novayre.jidoka.client.JidokaClient.connect:1043|java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt; &lt;b&gt;|...|&lt;/b&gt; &lt;b&gt;java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;&amp;hellip;&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;Caused&lt;/b&gt; &lt;b&gt;by:&lt;/b&gt; &lt;b&gt;javax.net.ssl.SSLHandshakeException:&lt;/b&gt; &lt;b&gt;sun.security.validator.ValidatorException:&lt;/b&gt; &lt;b&gt;PKIX&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;building&lt;/b&gt; &lt;b&gt;failed:&lt;/b&gt; &lt;b&gt;sun.security.provider.certpath.SunCertPathBuilderException:&lt;/b&gt; &lt;b&gt;unable&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;find&lt;/b&gt; &lt;b&gt;valid&lt;/b&gt; &lt;b&gt;certification&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;requested&lt;/b&gt; &lt;b&gt;target&lt;/b&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Cause&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This is usually&amp;nbsp;occurs because there is a certificate not trusted by the JVM in your host machine for one of the following reasons:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;The certificate is self-signed or signed by a private authority. This can happen by injecting the certificate via an external component such as an antivirus, firewall, proxy, etc.&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;The certificate is signed by a Public Certificate Authority, but the server is not presenting the full certificate chain with all intermediate certs up to the CA root cert.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Action&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Since the agent is running in the JVM, the certificate must be added to the Java Truststore. In order to identify the missing certificates, follow the steps below:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Add the &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; line to the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt; file. &lt;/span&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;strong&gt;Note:&lt;/strong&gt; If this file does not exist in your Appian RPA agent folder, please create it.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Open a command line window and navigate to your Appian RPA agent folder.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Run the following command as is &lt;code&gt;AppianRPAagent.exe &amp;gt; jidoka-client-ssl.log 2&amp;gt;&amp;amp;1&lt;br /&gt;&lt;/code&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent after 1 minute.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Remove the line previously added &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; from the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Open the newly generated &lt;strong&gt;jidoka-client-ssl.log&lt;/strong&gt; to see all the information related with the communication attempt performed and all the certificates failed to validate. The following terms&amp;nbsp;will help you find the information required.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;trustStore is&lt;/code&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;- You will find the path of the truststore used in your JVM.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;adding as trusted certificates&lt;/code&gt;&lt;b&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;After this sentence, you will find all the certificates currently included in your truststore.&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;PKIX path building failed&lt;/code&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;In the lines previous to this message, you can see the different certificates failed to be validated with the labels &amp;quot;Issuer&amp;quot; or &amp;quot;subject&amp;quot;.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Once the missing certificate has been located, it needs to be added to the Java Truststore.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Locate the keystore location in the JRE.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;strong&gt;Note:&lt;/strong&gt; Typically this keystore is found in&lt;/span&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;code&gt;JAVA_HOME\jre\lib\security\&lt;/code&gt; and the default file is &lt;strong&gt;cacerts&lt;/strong&gt;.&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Use the default Java&amp;nbsp;keytool to import the certificate.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;code&gt;JRE_HOME/bin/keytool&amp;nbsp; -import&amp;nbsp; -trustcacerts -alias &amp;lt;certAlias&amp;gt;&amp;nbsp; -file &amp;lt;certFile&amp;gt; -keystore &amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;Please ensure you use the right values in&amp;nbsp;&lt;span&gt;&lt;code&gt;&amp;lt;certAlias&amp;gt;,&amp;nbsp;&amp;lt;certFile&amp;gt; and&amp;nbsp;&amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;When prompted, follow the required steps.&lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Enter keystore password:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Default keystore password is: &amp;quot;changeit&amp;quot;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span&gt;When prompted, follow the required steps.&lt;/span&gt;&lt;br /&gt;
&lt;pre&gt;&lt;b&gt;Trust this certificate? [no]:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Enter &amp;quot;yes&amp;quot;.&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;This imports the certificate into the keystore and displays the message: &lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Certificate was added to keystore&lt;/b&gt;&lt;/pre&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Please open a support case if you have any questions with any of these steps.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Workaround&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;If the certificate is injected by an external application in the host machine, such as an antivirus or firewall, then the external application can be reconfigured to skip the certificate injection.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: November&amp;nbsp;2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: java, Appian RPA, infrastructure, Certificate&lt;/div&gt;
</description></item><item><title>KB-2272 PKIX path building failed for Appian RPA agent connection due to a missing certificate in the Java Truststore</title><link>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore/revision/8</link><pubDate>Thu, 09 Nov 2023 17:43:54 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bb13ceed-b54f-4075-ab72-beab18949839</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore#comments</comments><description>Revision 8 posted to Appian Knowledge Base by pauline.delacruz on 11/9/2023 5:43:54 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Symptoms&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;When starting the Appian RPA agent, the icon will appear to be gray, which indicates that there is no connection to the site. From the&amp;nbsp;&lt;strong&gt;jidoka-client.log&lt;/strong&gt;&amp;nbsp;in the same folder where the agent was installed, the following trace can be seen:&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span style="font-weight:400;"&gt;&lt;b&gt;|ERROR|com.novayre.jidoka.client.JidokaClient.connect:1043|java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt; &lt;b&gt;|...|&lt;/b&gt; &lt;b&gt;java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;&amp;hellip;&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;Caused&lt;/b&gt; &lt;b&gt;by:&lt;/b&gt; &lt;b&gt;javax.net.ssl.SSLHandshakeException:&lt;/b&gt; &lt;b&gt;sun.security.validator.ValidatorException:&lt;/b&gt; &lt;b&gt;PKIX&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;building&lt;/b&gt; &lt;b&gt;failed:&lt;/b&gt; &lt;b&gt;sun.security.provider.certpath.SunCertPathBuilderException:&lt;/b&gt; &lt;b&gt;unable&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;find&lt;/b&gt; &lt;b&gt;valid&lt;/b&gt; &lt;b&gt;certification&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;requested&lt;/b&gt; &lt;b&gt;target&lt;/b&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Cause&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This is usually&amp;nbsp;occurs because there is a certificate not trusted by the JVM in your host machine for one of the following reasons:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;The certificate is self-signed or signed by a private authority. This can happen by injecting the certificate via an external component such as an antivirus, firewall, proxy, etc.&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;The certificate is signed by a Public Certificate Authority, but the server is not presenting the full certificate chain with all intermediate certs up to the CA root cert.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Action&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Since the agent is running in the JVM, the certificate must be added to the Java Truststore. In order to identify the missing certificates, follow the steps below:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Add the &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; line to the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt; file. &lt;/span&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;strong&gt;Note:&lt;/strong&gt; If this file does not exist in your Appian RPA agent folder, please create it.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Open a command line window and navigate to your Appian RPA agent folder.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Run the following command as is &lt;code&gt;AppianRPAagent.exe &amp;gt; jidoka-client-ssl.log 2&amp;gt;&amp;amp;1&lt;br /&gt;&lt;/code&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent after 1 minute.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Remove the line previously added &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; from the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Open the newly generated &lt;strong&gt;jidoka-client-ssl.log&lt;/strong&gt; to see all the information related with the communication attempt performed and all the certificates failed to validate. The following terms&amp;nbsp;will help you find the information required.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;trustStore is&lt;/code&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;- You will find the path of the truststore used in your JVM.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;adding as trusted certificates&lt;/code&gt;&lt;b&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;After this sentence, you will find all the certificates currently included in your truststore.&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;PKIX path building failed&lt;/code&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;In the lines previous to this message, you can see the different certificates failed to be validated with the labels &amp;quot;Issuer&amp;quot; or &amp;quot;subject&amp;quot;.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Once the missing certificate has been located, it needs to be added to the Java Truststore.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Locate the keystore location in the JRE.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;strong&gt;Note:&lt;/strong&gt; Typically this keystore is found in&lt;/span&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;code&gt;JAVA_HOME\jre\lib\security\&lt;/code&gt; and the default file is &lt;strong&gt;cacerts&lt;/strong&gt;.&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Use the default Java&amp;nbsp;keytool to import the certificate.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;code&gt;JRE_HOME/bin/keytool&amp;nbsp; -import&amp;nbsp; -trustcacerts -alias &amp;lt;certAlias&amp;gt;&amp;nbsp; -file &amp;lt;certFile&amp;gt; -keystore &amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;Please ensure you use the right values in&amp;nbsp;&lt;span&gt;&lt;code&gt;&amp;lt;certAlias&amp;gt;,&amp;nbsp;&amp;lt;certFile&amp;gt; and&amp;nbsp;&amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;When prompted, follow the required steps.&lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Enter keystore password:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Default keystore password is: &amp;quot;changeit&amp;quot;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span&gt;When prompted, follow the required steps.&lt;/span&gt;&lt;br /&gt;
&lt;pre&gt;&lt;b&gt;Trust this certificate? [no]:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Enter &amp;quot;yes&amp;quot;.&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;This imports the certificate into the keystore and displays the message: &lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Certificate was added to keystore&lt;/b&gt;&lt;/pre&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Please open a support case if you have any questions with any of these steps.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Workaround&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;If the certificate is injected by any specific application in the host machine, such as an antivirus or firewall, they can be&amp;nbsp;configured in order to allow the connection.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: November&amp;nbsp;2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: java, Appian RPA, infrastructure, Certificate&lt;/div&gt;
</description></item><item><title>[DRAFT SP-8344] KB-XXXX PKIX path building failed for Appian RPA agent connection due to a missing certificate in the Java Truststore</title><link>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore/revision/7</link><pubDate>Tue, 05 Sep 2023 20:37:16 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bb13ceed-b54f-4075-ab72-beab18949839</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore#comments</comments><description>Revision 7 posted to Appian Knowledge Base by pauline.delacruz on 9/5/2023 8:37:16 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Symptoms&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;When starting the Appian RPA agent, the icon will appear to be gray, which indicates that there is no connection to the site. From the&amp;nbsp;&lt;strong&gt;jidoka-client.log&lt;/strong&gt;&amp;nbsp;in the same folder where the agent was installed, the following trace can be seen:&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span style="font-weight:400;"&gt;&lt;b&gt;|ERROR|com.novayre.jidoka.client.JidokaClient.connect:1043|java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt; &lt;b&gt;|...|&lt;/b&gt; &lt;b&gt;java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;&amp;hellip;&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;Caused&lt;/b&gt; &lt;b&gt;by:&lt;/b&gt; &lt;b&gt;javax.net.ssl.SSLHandshakeException:&lt;/b&gt; &lt;b&gt;sun.security.validator.ValidatorException:&lt;/b&gt; &lt;b&gt;PKIX&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;building&lt;/b&gt; &lt;b&gt;failed:&lt;/b&gt; &lt;b&gt;sun.security.provider.certpath.SunCertPathBuilderException:&lt;/b&gt; &lt;b&gt;unable&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;find&lt;/b&gt; &lt;b&gt;valid&lt;/b&gt; &lt;b&gt;certification&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;requested&lt;/b&gt; &lt;b&gt;target&lt;/b&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Cause&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This is usually&amp;nbsp;occurs because there is a certificate not trusted by the JVM in your host machine for one of the following reasons:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;The certificate is self-signed or signed by a private authority, which can be injected by an external component such as an antivirus, firewall, proxy, etc.&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;The certificate is signed by a Public Certificate Authority, but the server is not presenting the full certificate chain with all intermediate certs up to the CA root cert.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Action&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Since the agent is running in the JVM, the certificate must be added to the Java Truststore. In order to identify the missing certificates, follow the steps below:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Add the &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; line to the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt; file. &lt;/span&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;strong&gt;Note:&lt;/strong&gt; If this file does not exists in your Appian RPA agent folder, please create it.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Open a command line window and navigate to your Appian RPA agent folder.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Run the following command as is &lt;code&gt;AppianRPAagent.exe &amp;gt; jidoka-client-ssl.log 2&amp;gt;&amp;amp;1&lt;br /&gt;&lt;/code&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent after 1 minute.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Remove the line previously added &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; from the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Open the newly generated &lt;strong&gt;jidoka-client-ssl.log&lt;/strong&gt; to see all the information related with the communication attempt performed and all the certificates failed to validate. The following terms&amp;nbsp;will help you find the information required.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;trustStore is&lt;/code&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;- You will find the path of the truststore used in your JVM.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;adding as trusted certificates&lt;/code&gt;&lt;b&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;After this sentence, you will find all the certificates currently included in your truststore.&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;PKIX path building failed&lt;/code&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;In the lines previous to this message, you can see the different certificates failed to be validated with the labels &amp;quot;Issuer&amp;quot; or &amp;quot;subject&amp;quot;.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Once the missing certificate has been located, it needs to be added to the Java Truststore.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Locate the keystore location in the JRE.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;strong&gt;Note:&lt;/strong&gt; Typically this keystore is found in&lt;/span&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;code&gt;JAVA_HOME\jre\lib\security\&lt;/code&gt; and the default file is &lt;strong&gt;cacerts&lt;/strong&gt;.&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Use the default Java&amp;nbsp;keytool to import the certificate.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;code&gt;JRE_HOME/bin/keytool&amp;nbsp; -import&amp;nbsp; -trustcacerts -alias &amp;lt;certAlias&amp;gt;&amp;nbsp; -file &amp;lt;certFile&amp;gt; -keystore &amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;Please ensure you use the right values in&amp;nbsp;&lt;span&gt;&lt;code&gt;&amp;lt;certAlias&amp;gt;,&amp;nbsp;&amp;lt;certFile&amp;gt; and&amp;nbsp;&amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;When prompted, follow the required steps.&lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Enter keystore password:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Default keystore password is: &amp;quot;changeit&amp;quot;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span&gt;When prompted, follow the required steps.&lt;/span&gt;&lt;br /&gt;
&lt;pre&gt;&lt;b&gt;Trust this certificate? [no]:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Enter &amp;quot;yes&amp;quot;.&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;This imports the certificate into the keystore and displays the message: &lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Certificate was added to keystore&lt;/b&gt;&lt;/pre&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Please open a support case if you have any questions with any of these steps.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Workaround&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;If the certificate is injected by any specific application in the host machine, such as an antivirus or firewall, they can be&amp;nbsp;configured in order to allow the connection.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed:&amp;nbsp;September&amp;nbsp;2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: java, Appian RPA, infrastructure, Certificate&lt;/div&gt;
</description></item><item><title>[DRAFT SP-8344] KB-XXXX PKIX path building failed for Appian RPA agent connection due to a missing certificate in the Java Truststore</title><link>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore/revision/6</link><pubDate>Tue, 05 Sep 2023 15:27:27 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bb13ceed-b54f-4075-ab72-beab18949839</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore#comments</comments><description>Revision 6 posted to Appian Knowledge Base by pauline.delacruz on 9/5/2023 3:27:27 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Symptoms&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;When starting the Appian RPA agent, the icon will appear to be gray, which indicates that there is no connection to the site. From the&amp;nbsp;&lt;strong&gt;jidoka-client.log&lt;/strong&gt;&amp;nbsp;in the same folder where the agent was installed, the following trace can be seen:&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span style="font-weight:400;"&gt;&lt;b&gt;|ERROR|com.novayre.jidoka.client.JidokaClient.connect:1043|java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt; &lt;b&gt;|...|&lt;/b&gt; &lt;b&gt;java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;&amp;hellip;&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;Caused&lt;/b&gt; &lt;b&gt;by:&lt;/b&gt; &lt;b&gt;javax.net.ssl.SSLHandshakeException:&lt;/b&gt; &lt;b&gt;sun.security.validator.ValidatorException:&lt;/b&gt; &lt;b&gt;PKIX&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;building&lt;/b&gt; &lt;b&gt;failed:&lt;/b&gt; &lt;b&gt;sun.security.provider.certpath.SunCertPathBuilderException:&lt;/b&gt; &lt;b&gt;unable&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;find&lt;/b&gt; &lt;b&gt;valid&lt;/b&gt; &lt;b&gt;certification&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;requested&lt;/b&gt; &lt;b&gt;target&lt;/b&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Cause&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This is usually&amp;nbsp;occurs because there is a certificate not trusted by the JVM in your host machine for one of the following reasons:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;The certificate is self-signed or signed by a private authority, which can be injected by an external component such as an antivirus, firewall, proxy, etc.&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;The certificate is signed by a Public Certificate Authority, but the server is not presenting the full certificate chain with all intermediate certs up to the CA root cert.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Action&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Since the agent is running in the JVM, the certificate must be added to the Java Truststore. In order to identify the missing certificates, follow the steps below:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Add the &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; line to the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt; file. &lt;/span&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;strong&gt;Note:&lt;/strong&gt; If this file does not exists in your Appian RPA agent folder, please create it.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Open a command line window and navigate to your Appian RPA agent folder.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Run the following command as is &lt;code&gt;AppianRPAagent.exe &amp;gt; jidoka-client-ssl.log 2&amp;gt;&amp;amp;1&lt;br /&gt;&lt;/code&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent after 1 minute.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Remove the line previously added &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; from the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Open the newly generated &lt;strong&gt;jidoka-client-ssl.log&lt;/strong&gt; to see all the information related with the communication attempt performed and all the certificates failed to validate. The following terms&amp;nbsp;will help you find the information required.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;trustStore is&lt;/code&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;- You will find the path of the truststore used in your JVM.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;adding as trusted certificates&lt;/code&gt;&lt;b&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;After this sentence, you will find all the certificates currently included in your truststore.&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;PKIX path building failed&lt;/code&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;In the lines previous to this message, you can see the different certificates failed to be validated with the labels &amp;quot;Issuer&amp;quot; or &amp;quot;subject&amp;quot;.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Once the missing certificate has been located, it needs to be added to the Java Truststore.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Locate the keystore location in the JRE.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;strong&gt;Note:&lt;/strong&gt; Typically this keystore is found in&lt;/span&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;code&gt;JAVA_HOME\jre\lib\security\&lt;/code&gt; and the default file is &lt;strong&gt;cacerts&lt;/strong&gt;.&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Use the default Java&amp;nbsp;keytool to import the certificate.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;code&gt;JRE_HOME/bin/keytool&amp;nbsp; -import&amp;nbsp; -trustcacerts -alias &amp;lt;certAlias&amp;gt;&amp;nbsp; -file &amp;lt;certFile&amp;gt; -keystore &amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;Please ensure you use the right values in&amp;nbsp;&lt;span&gt;&lt;code&gt;&amp;lt;certAlias&amp;gt;,&amp;nbsp;&amp;lt;certFile&amp;gt; and&amp;nbsp;&amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;When prompted, follow the required steps.&lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Enter keystore password:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Default keystore password is: &amp;quot;changeit&amp;quot;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span&gt;When prompted, follow the required steps.&lt;/span&gt;&lt;br /&gt;
&lt;pre&gt;&lt;b&gt;Trust this certificate? [no]:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Enter &amp;quot;yes&amp;quot;.&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;This imports the certificate into the keystore and displays the message: &lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Certificate was added to keystore&lt;/b&gt;&lt;/pre&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Please open a case with Appian Support if you have any questions with any of these steps.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Workaround&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;If the certificate is injected by any specific application in the host machine, such as an antivirus or firewall, they can be&amp;nbsp;configured in order to allow the connection.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed:&amp;nbsp;September&amp;nbsp;2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: java, Appian RPA, infrastructure, Certificate&lt;/div&gt;
</description></item><item><title>[DRAFT SP-8344] KB-XXXX PKIX path building failed for Appian RPA agent connection due to a missing certificate in the Java Truststore</title><link>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore/revision/5</link><pubDate>Thu, 31 Aug 2023 14:37:22 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bb13ceed-b54f-4075-ab72-beab18949839</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore#comments</comments><description>Revision 5 posted to Appian Knowledge Base by pauline.delacruz on 8/31/2023 2:37:22 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Symptoms&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;When starting the Appian RPA agent, the icon will appear to be gray, which indicates that there is no connection to the site. From the&amp;nbsp;&lt;strong&gt;jidoka-client.log&lt;/strong&gt;&amp;nbsp;in the same folder where the agent was installed, the following trace can be seen:&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span style="font-weight:400;"&gt;&lt;b&gt;|ERROR|com.novayre.jidoka.client.JidokaClient.connect:1043|java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt; &lt;b&gt;|...|&lt;/b&gt; &lt;b&gt;java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;&amp;hellip;&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;Caused&lt;/b&gt; &lt;b&gt;by:&lt;/b&gt; &lt;b&gt;javax.net.ssl.SSLHandshakeException:&lt;/b&gt; &lt;b&gt;sun.security.validator.ValidatorException:&lt;/b&gt; &lt;b&gt;PKIX&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;building&lt;/b&gt; &lt;b&gt;failed:&lt;/b&gt; &lt;b&gt;sun.security.provider.certpath.SunCertPathBuilderException:&lt;/b&gt; &lt;b&gt;unable&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;find&lt;/b&gt; &lt;b&gt;valid&lt;/b&gt; &lt;b&gt;certification&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;requested&lt;/b&gt; &lt;b&gt;target&lt;/b&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Cause&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This is usually&amp;nbsp;occurs because there is a certificate not trusted by the JVM in your host machine for one of the following reasons:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;The certificate is self-signed or signed by a private authority, which can be injected by an external component such as an antivirus, firewall, proxy, etc.&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;The certificate is signed by a Public Certificate Authority, but the server is not presenting the full certificate chain with all intermediate certs up to the CA root cert.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Action&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Since the agent is running in the JVM, the certificate must be added to the Java Truststore. In order to identify the missing certificates, follow the steps below:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Add the &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; line to the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt; file. &lt;/span&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;strong&gt;Note:&lt;/strong&gt; If this file does not exists in your Appian RPA agent folder, please create it.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Open a command line window and navigate to your Appian RPA agent folder.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Run the following command as is &lt;code&gt;AppianRPAagent.exe &amp;gt; jidoka-client-ssl.log 2&amp;gt;&amp;amp;1&lt;br /&gt;&lt;/code&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent after 1 minute.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Remove the line previously added &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; from the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Open the newly generated &lt;strong&gt;jidoka-client-ssl.log&lt;/strong&gt; to see all the information related with the communication attempt performed and all the certificates failed to validate. The following terms&amp;nbsp;will help you find the information required.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;trustStore is&lt;/code&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;- You will find the path of the truststore used in your JVM.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;adding as trusted certificates&lt;/code&gt;&lt;b&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;After this sentence, you will find all the certificates currently included in your truststore.&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;PKIX path building failed&lt;/code&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;In the lines previous to this message, you can see the different certificates failed to be validated with the labels &amp;quot;Issuer&amp;quot; or &amp;quot;subject&amp;quot;.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Once the missing certificate has been located, it needs to be added to the Java Truststore.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Locate the keystore location in the JRE.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;strong&gt;Note:&lt;/strong&gt; Typically this keystore is found in&lt;/span&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;code&gt;JAVA_HOME\jre\lib\security\&lt;/code&gt; and the default file is &lt;strong&gt;cacerts&lt;/strong&gt;.&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Use the default Java&amp;nbsp;keytool to import the certificate.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;code&gt;JRE_HOME/bin/keytool&amp;nbsp; -import&amp;nbsp; -trustcacerts -alias &amp;lt;certAlias&amp;gt;&amp;nbsp; -file &amp;lt;certFile&amp;gt; -keystore &amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;Please ensure you use the right values in&amp;nbsp;&lt;span&gt;&lt;code&gt;&amp;lt;certAlias&amp;gt;,&amp;nbsp;&amp;lt;certFile&amp;gt; and&amp;nbsp;&amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;When prompted, follow the required steps.&lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Enter keystore password:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Default keystore password is: &amp;quot;changeit&amp;quot;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span&gt;When prompted, follow the required steps.&lt;/span&gt;&lt;br /&gt;
&lt;pre&gt;&lt;b&gt;Trust this certificate? [no]:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Enter &amp;quot;yes&amp;quot;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;This imports the certificate into the keystore and displays the message: &lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Certificate was added to keystore&lt;/b&gt;&lt;/pre&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;Please open a case with Appian Support if you have any questions with any of these steps.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Workaround&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;If the certificate is injected by any specific application in the host machine, such as an antivirus or firewall, they can be&amp;nbsp;configured in order to allow the connection.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: August 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: java, Appian RPA, infrastructure, Certificate&lt;/div&gt;
</description></item><item><title>[DRAFT SP-8344] KB-XXXX PKIX path building failed for Appian RPA agent connection due to a missing certificate in the Java Truststore</title><link>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore/revision/4</link><pubDate>Tue, 29 Aug 2023 17:56:15 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bb13ceed-b54f-4075-ab72-beab18949839</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore#comments</comments><description>Revision 4 posted to Appian Knowledge Base by pauline.delacruz on 8/29/2023 5:56:15 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Symptoms&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;When starting the Appian RPA agent, the icon will appear to be gray, which indicates that there is no connection to the site. From the&amp;nbsp;&lt;strong&gt;jidoka-client.log&lt;/strong&gt;&amp;nbsp;in the same folder where the agent was installed, the following trace can be seen:&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span style="font-weight:400;"&gt;&lt;b&gt;|ERROR|com.novayre.jidoka.client.JidokaClient.connect:1043|java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt; &lt;b&gt;|...|&lt;/b&gt; &lt;b&gt;java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;&amp;hellip;&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;Caused&lt;/b&gt; &lt;b&gt;by:&lt;/b&gt; &lt;b&gt;javax.net.ssl.SSLHandshakeException:&lt;/b&gt; &lt;b&gt;sun.security.validator.ValidatorException:&lt;/b&gt; &lt;b&gt;PKIX&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;building&lt;/b&gt; &lt;b&gt;failed:&lt;/b&gt; &lt;b&gt;sun.security.provider.certpath.SunCertPathBuilderException:&lt;/b&gt; &lt;b&gt;unable&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;find&lt;/b&gt; &lt;b&gt;valid&lt;/b&gt; &lt;b&gt;certification&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;requested&lt;/b&gt; &lt;b&gt;target&lt;/b&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Cause&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This is usually&amp;nbsp;occurs because there is a certificate not trusted by the JVM in your host machine for one of the following reasons:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;The certificate is self-signed or signed by a private authority, which can be injected by an external component such as an antivirus, firewall, proxy, etc.&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;The certificate is signed by a Public Certificate Authority, but the server is not presenting the full certificate chain with all intermediate certs up to the CA root cert.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Action&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Since the agent is running in the JVM, the certificate must be added to the Java Truststore. In order to identify the missing certificates, follow the steps below:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Add the &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; line to the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt; file. If this file does not exists in your Appian RPA agent folder, please create it.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Open a command line window and navigate to your Appian RPA agent folder.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Run the following command as is &lt;code&gt;AppianRPAagent.exe &amp;gt; jidoka-client-ssl.log 2&amp;gt;&amp;amp;1&lt;br /&gt;&lt;/code&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent after ~30 seconds.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Remove the line previously added &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; from the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Open the newly generated &lt;strong&gt;jidoka-client-ssl.log&lt;/strong&gt; to see all the information related with the communication attempt performed and all the certificates failed to validate. The following terms&amp;nbsp;will help you find the information required.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;trustStore is&lt;/code&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;- You will find the path of the truststore used in your JVM.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;adding as trusted certificates&lt;/code&gt;&lt;b&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;After this sentence, you will find all the certificates currently included in your truststore.&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;PKIX path building failed&lt;/code&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;In the lines previous to this message, you can see the different certificates failed to be validated with the labels &amp;quot;Issuer&amp;quot; or &amp;quot;subject&amp;quot;.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Once the missing certificate has been located, it needs to be added to the Java Truststore.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Locate the keystore location in the JRE.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;Typically this keystore is at&lt;/span&gt; &lt;span style="font-weight:400;"&gt;&lt;code&gt;JAVA_HOME\jre\lib\security\&lt;/code&gt; and the default file is &lt;strong&gt;cacerts&lt;/strong&gt;.&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Run the standard keytool to import the certificate, &lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;code&gt;JRE_HOME/bin/keytool&amp;nbsp; -import&amp;nbsp; -trustcacerts -alias &amp;lt;certAlias&amp;gt;&amp;nbsp; -file &amp;lt;certFile&amp;gt; -keystore &amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;Please ensure you use the right values in&amp;nbsp;&lt;span&gt;&lt;code&gt;&amp;lt;certAlias&amp;gt;,&amp;nbsp;&amp;lt;certFile&amp;gt; and&amp;nbsp;&amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;When prompted, follow the required steps.&lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Enter keystore password:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Default keystore password is: &amp;quot;changeit&amp;quot;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span&gt;When prompted, follow the required steps.&lt;/span&gt;&lt;br /&gt;
&lt;pre&gt;&lt;b&gt;Trust this certificate? [no]:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Enter &amp;quot;yes&amp;quot;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;This imports the certificate into the keystore and displays the message: &lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Certificate was added to keystore&lt;/b&gt;&lt;/pre&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;Please open a case with Appian Support if you have any questions with any of these steps.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Workaround&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;If the certificate is injected by any specific application in the host machine, such as an antivirus or firewall, they can be configured or disabled in order to allow the connection.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: August 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: java, Appian RPA, infrastructure, Certificate&lt;/div&gt;
</description></item><item><title>[DRAFT SP-8344] KB-XXXX PKIX path building failed for Appian RPA agent connection due to a missing certificate in the Java Truststore</title><link>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore/revision/3</link><pubDate>Fri, 30 Jun 2023 16:30:58 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bb13ceed-b54f-4075-ab72-beab18949839</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore#comments</comments><description>Revision 3 posted to Appian Knowledge Base by pauline.delacruz on 6/30/2023 4:30:58 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Symptoms&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;When starting the Appian RPA agent, the icon is gray all the time, which means that there is no connection to the site. Frfom the&amp;nbsp;&lt;strong&gt;jidoka-client.log&lt;/strong&gt;&amp;nbsp;in the same folder where the agent was installed, you will see the following trace:&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span style="font-weight:400;"&gt;&lt;b&gt;|ERROR|com.novayre.jidoka.client.JidokaClient.connect:1043|java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt; &lt;b&gt;|...|&lt;/b&gt; &lt;b&gt;java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;&amp;hellip;&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;Caused&lt;/b&gt; &lt;b&gt;by:&lt;/b&gt; &lt;b&gt;javax.net.ssl.SSLHandshakeException:&lt;/b&gt; &lt;b&gt;sun.security.validator.ValidatorException:&lt;/b&gt; &lt;b&gt;PKIX&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;building&lt;/b&gt; &lt;b&gt;failed:&lt;/b&gt; &lt;b&gt;sun.security.provider.certpath.SunCertPathBuilderException:&lt;/b&gt; &lt;b&gt;unable&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;find&lt;/b&gt; &lt;b&gt;valid&lt;/b&gt; &lt;b&gt;certification&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;requested&lt;/b&gt; &lt;b&gt;target&lt;/b&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Cause&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This is usually&amp;nbsp;occurs because there is a certificate not trusted by the JVM in your host machine for one of the following reasons:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;The certificate is self-signed or signed by a private authority. This certificate could be injected by an external component like antivirus, firewall, proxy, etc.&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;The certificate is signed by a Public Certificate Authority, but the server is not presenting the full certificate chain with all intermediate certs up to the CA root cert.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Action&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Since the agent is running in the JVM, the certificate must be added to the Java Truststore. In order to identify the certificates missing, you can follow these steps:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Add the &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; line to the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt; file. If this file does not exists in your Appian RPA agent folder, please create it.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Open a command line window and navigate to your Appian RPA agent folder.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Run the following command as is &lt;code&gt;AppianRPAagent.exe &amp;gt; jidoka-client-ssl.log 2&amp;gt;&amp;amp;1&lt;br /&gt;&lt;/code&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent after ~30 seconds.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Remove the line previously added &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; from the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Open the newly generated &lt;strong&gt;jidoka-client-ssl.log&lt;/strong&gt; to see all the information related with the communication attempt performed and all the certificates failed to validate. The following terms&amp;nbsp;will help you finding the information required.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;trustStore is&lt;/code&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;- You will find the path of the truststore used in your JVM.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;adding as trusted certificates&lt;/code&gt;&lt;b&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;After this sentence, you will find all the certificates currently included in your truststore.&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;PKIX path building failed&lt;/code&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;In the lines previous to this message, you can see the different certificates failed to be validated with the labels &amp;quot;Issuer&amp;quot; or &amp;quot;subject&amp;quot;.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Once located the missing certificate, it needs to be added to the Java Truststore.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Locate the keystore location in the JRE.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;Typically this keystore is at&lt;/span&gt; &lt;span style="font-weight:400;"&gt;&lt;code&gt;JAVA_HOME\jre\lib\security\&lt;/code&gt; and the default file is &lt;strong&gt;cacerts&lt;/strong&gt;.&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Run the standard keytool to import the certificate, &lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;code&gt;JRE_HOME/bin/keytool&amp;nbsp; -import&amp;nbsp; -trustcacerts -alias &amp;lt;certAlias&amp;gt;&amp;nbsp; -file &amp;lt;certFile&amp;gt; -keystore &amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;Please ensure you use the right values in&amp;nbsp;&lt;span&gt;&lt;code&gt;&amp;lt;certAlias&amp;gt;,&amp;nbsp;&amp;lt;certFile&amp;gt; and&amp;nbsp;&amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;When prompted &lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Enter keystore password:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Default keystore password is: &amp;quot;changeit&amp;quot;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;When prompted &lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Trust this certificate? [no]:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Enter &amp;quot;yes&amp;quot;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;This imports the certificate into the keystore and displays the message: &lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Certificate was added to keystore&lt;/b&gt;&lt;/pre&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;Please open a case with Appian Support if you have any questions with any of these steps.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Workaround&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;If the certificate is injected by any specific application in the host machine, such as an antivirus or firewall, they can be configured or disabled in order to allow the connection.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: June 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: java, Appian RPA, infrastructure, Certificate&lt;/div&gt;
</description></item><item><title>[DRAFT SP-8344] KB-XXXX PKIX path building failed for Appian RPA agent connection due to a missing certificate in the Java Truststore</title><link>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore/revision/2</link><pubDate>Fri, 23 Jun 2023 16:34:16 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bb13ceed-b54f-4075-ab72-beab18949839</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore#comments</comments><description>Revision 2 posted to Appian Knowledge Base by pauline.delacruz on 6/23/2023 4:34:16 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Symptoms&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;When starting the Appian RPA agent the icon is gray all the time, which means that there is no connection to the site. Looking into jidoka-client.log in the same folder where the agent was installed you will see the following trace:&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span style="font-weight:400;"&gt;&lt;b&gt;|ERROR|com.novayre.jidoka.client.JidokaClient.connect:1043|java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt; &lt;b&gt;|...|&lt;/b&gt; &lt;b&gt;java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;&amp;hellip;&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;Caused&lt;/b&gt; &lt;b&gt;by:&lt;/b&gt; &lt;b&gt;javax.net.ssl.SSLHandshakeException:&lt;/b&gt; &lt;b&gt;sun.security.validator.ValidatorException:&lt;/b&gt; &lt;b&gt;PKIX&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;building&lt;/b&gt; &lt;b&gt;failed:&lt;/b&gt; &lt;b&gt;sun.security.provider.certpath.SunCertPathBuilderException:&lt;/b&gt; &lt;b&gt;unable&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;find&lt;/b&gt; &lt;b&gt;valid&lt;/b&gt; &lt;b&gt;certification&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;requested&lt;/b&gt; &lt;b&gt;target&lt;/b&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Cause&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This is usually caused because there is a certificate not trusted by the JVM in your host machine for one of the following reasons:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;The certificate is self-signed or signed by a private authority. This certificate could be injected by an external component like antivirus, firewall, proxy, etc.&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;The certificate is signed by a Public Certificate Authority, but the server is not presenting the full certificate chain with all intermediate certs up to the CA root cert.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Action&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Since the agent is running in the JVM, the certificate must be added to the Java Truststore. In order to identify the certificates missing, you can follow these steps:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Add the &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; line to the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt; file. If this file does not exists in your Appian RPA agent folder, please create it.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Open a command line window and navigate to your Appian RPA agent folder.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Run the following command as is &lt;code&gt;AppianRPAagent.exe &amp;gt; jidoka-client-ssl.log 2&amp;gt;&amp;amp;1&lt;br /&gt;&lt;/code&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent after ~30 seconds.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Remove the line previously added &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; from the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Open the newly generated &lt;strong&gt;jidoka-client-ssl.log&lt;/strong&gt; to see all the information related with the communication attempt performed and all the certificates failed to validate. The following terms&amp;nbsp;will help you finding the information required.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;trustStore is&lt;/code&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;- You will find the path of the truststore used in your JVM.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;adding as trusted certificates&lt;/code&gt;&lt;b&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;After this sentence, you will find all the certificates currently included in your truststore.&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;PKIX path building failed&lt;/code&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;In the lines previous to this message, you can see the different certificates failed to be validated with the labels &amp;quot;Issuer&amp;quot; or &amp;quot;subject&amp;quot;.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Once located the missing certificate, it needs to be added to the Java Truststore.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Locate the keystore location in the JRE.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;Typically this keystore is at&lt;/span&gt; &lt;span style="font-weight:400;"&gt;&lt;code&gt;JAVA_HOME\jre\lib\security\&lt;/code&gt; and the default file is &lt;strong&gt;cacerts&lt;/strong&gt;.&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Run the standard keytool to import the certificate, &lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;code&gt;JRE_HOME/bin/keytool&amp;nbsp; -import&amp;nbsp; -trustcacerts -alias &amp;lt;certAlias&amp;gt;&amp;nbsp; -file &amp;lt;certFile&amp;gt; -keystore &amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;Please ensure you use the right values in&amp;nbsp;&lt;span&gt;&lt;code&gt;&amp;lt;certAlias&amp;gt;,&amp;nbsp;&amp;lt;certFile&amp;gt; and&amp;nbsp;&amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;When prompted &lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Enter keystore password:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Default keystore password is: &amp;quot;changeit&amp;quot;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;When prompted &lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Trust this certificate? [no]:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Enter &amp;quot;yes&amp;quot;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;This imports the certificate into the keystore and displays the message: &lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Certificate was added to keystore&lt;/b&gt;&lt;/pre&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;Please open a case with Appian Support if you have any questions with any of these steps.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Workaround&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;If the certificate is injected by any specific application in the host machine, like antivirus or firewall they can be configured or disabled in order to allow the connection.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: June 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: java, Appian RPA, infrastructure, Certificate&lt;/div&gt;
</description></item><item><title>PKIX path building failed for Appian RPA agent connection due to a missing certificate in the Java Truststore</title><link>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore/revision/1</link><pubDate>Sat, 03 Jun 2023 10:53:11 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bb13ceed-b54f-4075-ab72-beab18949839</guid><dc:creator>Juan Rodríguez</dc:creator><comments>https://community.appian.com/support/w/kb/3176/kb-2272-pkix-path-building-failed-for-appian-rpa-agent-connection-due-to-a-missing-certificate-in-the-java-truststore#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Juan Rodríguez on 6/3/2023 10:53:11 AM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Symptoms&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;When starting the Appian RPA agent the icon is gray all the time, which means that there is no connection to the site. Looking into jidoka-client.log in the same folder where the agent was installed you will see the following trace:&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span style="font-weight:400;"&gt;&lt;b&gt;|ERROR|com.novayre.jidoka.client.JidokaClient.connect:1043|java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt; &lt;b&gt;|...|&lt;/b&gt; &lt;b&gt;java.io.IOException:&lt;/b&gt; &lt;b&gt;Maximum&lt;/b&gt; &lt;b&gt;retry&lt;/b&gt; &lt;b&gt;attempts&lt;/b&gt; &lt;b&gt;reached&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;&amp;hellip;&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;Caused&lt;/b&gt; &lt;b&gt;by:&lt;/b&gt; &lt;b&gt;javax.net.ssl.SSLHandshakeException:&lt;/b&gt; &lt;b&gt;sun.security.validator.ValidatorException:&lt;/b&gt; &lt;b&gt;PKIX&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;building&lt;/b&gt; &lt;b&gt;failed:&lt;/b&gt; &lt;b&gt;sun.security.provider.certpath.SunCertPathBuilderException:&lt;/b&gt; &lt;b&gt;unable&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;find&lt;/b&gt; &lt;b&gt;valid&lt;/b&gt; &lt;b&gt;certification&lt;/b&gt; &lt;b&gt;path&lt;/b&gt; &lt;b&gt;to&lt;/b&gt; &lt;b&gt;requested&lt;/b&gt; &lt;b&gt;target&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Cause&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This is usually caused because there is a certificate not trusted by the JVM in your host machine for one of the following reasons:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;The certificate is self-signed or signed by a private authority. This certificate could be injected by an external component like antivirus, firewall, proxy, etc.&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;The certificate is signed by a Public Certificate Authority, but the server is not presenting the full certificate chain with all intermediate certs up to the CA root cert.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Action&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Since the agent is running in the JVM, the certificate must be added to the Java Truststore. In order to identify the certificates missing you can follow these steps:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Add the &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; line to the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt; file. If this file does not exists in your Appian RPA agent folder, please create it.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Open a command line window and navigate to your Appian RPA agent folder.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Run the following command as is &lt;code&gt;AppianRPAagent.exe &amp;gt; jidoka-client-ssl.log 2&amp;gt;&amp;amp;1&lt;br /&gt;&lt;br /&gt;&lt;/code&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Stop the agent after ~30 seconds.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Remove the line previously added &lt;code&gt;-Djavax.net.debug=all&lt;/code&gt; from the &lt;strong&gt;AppianRPAagent.l4j.ini&lt;/strong&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Open the just generated &lt;strong&gt;jidoka-client-ssl.log&lt;/strong&gt; to see all the information related with the communication attempt performed and all the certificates failed to validate.The following terms&amp;nbsp;will help you finding the information required.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;trustStore is&lt;/code&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;- You will find the path of the truststore used in your JVM&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;adding as trusted certificates&lt;/code&gt;&lt;b&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;After this sentence you will find all the certificates currently included in your truststore.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;PKIX path building failed&lt;/code&gt;&amp;nbsp;-&amp;nbsp;&lt;span style="font-weight:400;"&gt;In the lines previous to this message you can see the different certificates failed to be validated with the labels &amp;quot;Issuer&amp;quot; or &amp;quot;subject&amp;quot;.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Once located the missing certificate, it needs to be added to the Java Truststore.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Locate the keystore location in the JRE.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;Typically this keystore is at&lt;/span&gt; &lt;span style="font-weight:400;"&gt;&lt;code&gt;JAVA_HOME\jre\lib\security\&lt;/code&gt; and the default file is &lt;strong&gt;cacerts&lt;/strong&gt;.&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Run the standard keytool to import the certificate, &lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;code&gt;JRE_HOME/bin/keytool&amp;nbsp; -import&amp;nbsp; -trustcacerts -alias &amp;lt;certAlias&amp;gt;&amp;nbsp; -file &amp;lt;certFile&amp;gt; -keystore &amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;Please ensure you use the right values in&amp;nbsp;&lt;span&gt;&lt;code&gt;&amp;lt;certAlias&amp;gt;,&amp;nbsp;&amp;lt;certFile&amp;gt; and&amp;nbsp;&amp;lt;trustStoreFilePath&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;When prompted &lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Enter keystore password:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Default keystore password is: &amp;quot;changeit&amp;quot;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;When prompted &lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Trust this certificate? [no]:&lt;/b&gt;&lt;/pre&gt;
&lt;span style="font-weight:400;"&gt;Enter &amp;quot;yes&amp;quot;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;This imports the certificate into the keystore and displays the message: &lt;/span&gt;
&lt;pre&gt;&lt;b&gt;Certificate was added to keystore&lt;/b&gt;&lt;/pre&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;Please open a case with Appian Support if you have any questions with any of these steps.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;Workaround&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;If the certificate is injected by any specific application in the host machine, like antivirus or firewall they can be configured or disabled in order to allow the connection.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: Jun 2023&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span style="font-weight:400;"&gt;&lt;b&gt;&lt;i&gt;&lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/pre&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: java, Appian RPA, infrastructure, Certificate&lt;/div&gt;
</description></item></channel></rss>