<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-1108 How to create a self-signed certificate for SAML authentication</title><link>https://community.appian.com/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-1108 How to create a self-signed certificate for SAML authentication</title><link>https://community.appian.com/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication</link><pubDate>Mon, 04 Dec 2023 19:56:26 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:1f16d2b8-cb63-45d8-a439-62ec0a692299</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication#comments</comments><description>Current Revision posted to Appian Knowledge Base by pauline.delacruz on 12/4/2023 7:56:26 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;Starting in Appian 7.11, SAML Authentication is configurable through the Administration Console. This configuration requires a Service Provider Signing Certificate to be provided. This article describes some options for generating a self-signed certificate in the required PEM format. Note that this certificate is only used for signing SAML requests and responses.&amp;nbsp;For more information, review the&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#SAML_Authentication" rel="noopener noreferrer" target="_blank"&gt;SAML Configuration&lt;/a&gt;&amp;nbsp;documentation as well as &lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq" rel="noopener noreferrer" target="_blank"&gt;KB-1153 SAML Authentication FAQ&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id="certificate-generation"&gt;Instructions&lt;/h2&gt;
&lt;p&gt;A certificate in the PEM format can be generated using an OpenSSL-compatible tool, or a certificate in a different format can be converted into the PEM format.&lt;/p&gt;
&lt;p&gt;To generate a certificate using Apache OpenSSL:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Install Apache OpenSSL&amp;nbsp;which is commonly distributed with the Apache web server, available&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.apachelounge.com/download/"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Take note of the location of the OpenSSL configuration file, e.g.&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;C:\apache\conf\openssl.cnf&lt;/code&gt;. This will be referred to as&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;CONFIG_FILE_LOCATION&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Open a terminal or command prompt and navigate to the OpenSSL&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;bin&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;directory.&lt;/li&gt;
&lt;li&gt;Execute the following command:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;openssl req -x509 -newkey rsa:2048 -keyout my-certificate.pem -out my-certificate.pem -days 3650 -config CONFIG_FILE_LOCATION&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Follow the prompts to create the certificate file. This will create the file&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;in the current directory.&lt;/li&gt;
&lt;li&gt;Open the newly generated&amp;nbsp;&lt;span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&amp;nbsp;in a text editor, such as Notepad++.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;If the certificate begins with&amp;nbsp;&lt;code&gt;-----BEGIN RSA PRIVATE KEY-----&lt;/code&gt;, proceed to step 9.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Open a terminal or command prompt, and within the OpenSSL&amp;nbsp;&lt;code&gt;bin&lt;/code&gt;&amp;nbsp;directory execute the following to unencrypt your key:&amp;nbsp;&lt;code&gt;openssl rsa -in my-certificate.pem&lt;/code&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Copy the output, beginning&amp;nbsp;with&amp;nbsp;&lt;code&gt;-----BEGIN RSA PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and ending with&amp;nbsp;&lt;code&gt;-----END RSA PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and replace the section in your certificate beginning with&amp;nbsp;&lt;code&gt;-----BEGIN ENCRYPTED PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and ending with&amp;nbsp;&lt;code&gt;-----END ENCRYPTED PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and save the certificate.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;strong&gt;Note:&lt;/strong&gt;&amp;nbsp;You must include the header and footer!&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Upload&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;as the Service Provider Signing Certificate in the SAML Authentication configuration page. If necessary, enter the PEM pass phrase you selected in the certificate creation wizard as the Service Provider Signing Certificate Password.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;To generate a certificate using Windows Internet Information Services (IIS):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In the IIS Manager, navigate to the Features view and double-click Server Certificates.&lt;/li&gt;
&lt;li&gt;In the Actions pane, click Create Self-Signed Certificate&lt;/li&gt;
&lt;li&gt;On the Create Self-Signed Certificate page, specify a name for the certificate, and then click OK.&lt;/li&gt;
&lt;li&gt;The certificate will now be listed on the Server Certificates page. Select the new certificate and click Export in the Actions pane.&lt;/li&gt;
&lt;li&gt;Select a directory to export the certificate to and enter a password for the certificate.&lt;/li&gt;
&lt;li&gt;This will create a certificate file in the PFX format. To convert this to the PEM format, either use an online tool such as this&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.sslshopper.com/ssl-converter.html"&gt;SSL Converter&lt;/a&gt;, or use OpenSSL with the following steps:
&lt;ol&gt;
&lt;li&gt;Open a terminal or command prompt and navigate to the OpenSSL directory. Place the new PFX certificate&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pfx&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;in the same directory.&lt;/li&gt;
&lt;li&gt;Execute the following command:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;openssl pkcs12 -in my-certificate.pfx -out my-certificate.pem -nodes&lt;/code&gt;. When prompted, enter the password for the certificate. This will create the file&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;in the current directory.&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;Upload&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;as the Service Provider Signing Certificate in the SAML Authentication configuration page. If necessary, enter the PEM pass phrase you selected in the certificate creation wizard as the Service Provider Signing Certificate Password.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="common-questions-regarding-saml-certificates"&gt;&lt;/h2&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: December 2023&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, admin console, how-to, authentication&lt;/div&gt;
</description></item><item><title>KB-1108 How to create a self-signed certificate for SAML authentication</title><link>https://community.appian.com/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication/revision/6</link><pubDate>Tue, 13 Jun 2023 14:48:16 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:1f16d2b8-cb63-45d8-a439-62ec0a692299</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication#comments</comments><description>Revision 6 posted to Appian Knowledge Base by Elly Meng on 6/13/2023 2:48:16 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;Starting in Appian 7.11, SAML Authentication is configurable through the Administration Console. This configuration requires a Service Provider Signing Certificate to be provided. This article describes some options for generating a self-signed certificate in the required PEM format. Note that this certificate is only used for signing SAML requests and responses.&amp;nbsp;For more information, review the&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#SAML_Authentication" rel="noopener noreferrer" target="_blank"&gt;SAML Configuration&lt;/a&gt;&amp;nbsp;documentation as well as &lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq" rel="noopener noreferrer" target="_blank"&gt;KB-1153 SAML Authentication FAQ&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id="certificate-generation"&gt;Instructions&lt;/h2&gt;
&lt;p&gt;A certificate in the PEM format can be generated using an OpenSSL-compatible tool, or a certificate in a different format can be converted into the PEM format.&lt;/p&gt;
&lt;p&gt;To generate a certificate using Apache OpenSSL:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Install Apache OpenSSL&amp;nbsp;which is commonly distributed with the Apache web server, available&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.apachehaus.com/cgi-bin/download.plx"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Take note of the location of the OpenSSL configuration file, e.g.&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;C:\apache\conf\openssl.cnf&lt;/code&gt;. This will be referred to as&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;CONFIG_FILE_LOCATION&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Open a terminal or command prompt and navigate to the OpenSSL&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;bin&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;directory.&lt;/li&gt;
&lt;li&gt;Execute the following command:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;openssl req -x509 -newkey rsa:2048 -keyout my-certificate.pem -out my-certificate.pem -days 3650 -config CONFIG_FILE_LOCATION&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Follow the prompts to create the certificate file. This will create the file&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;in the current directory.&lt;/li&gt;
&lt;li&gt;Open the newly generated&amp;nbsp;&lt;span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&amp;nbsp;in a text editor, such as Notepad++.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;If the certificate begins with&amp;nbsp;&lt;code&gt;-----BEGIN RSA PRIVATE KEY-----&lt;/code&gt;, proceed to step 9.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Open a terminal or command prompt, and within the OpenSSL&amp;nbsp;&lt;code&gt;bin&lt;/code&gt;&amp;nbsp;directory execute the following to unencrypt your key:&amp;nbsp;&lt;code&gt;openssl rsa -in my-certificate.pem&lt;/code&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Copy the output, beginning&amp;nbsp;with&amp;nbsp;&lt;code&gt;-----BEGIN RSA PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and ending with&amp;nbsp;&lt;code&gt;-----END RSA PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and replace the section in your certificate beginning with&amp;nbsp;&lt;code&gt;-----BEGIN ENCRYPTED PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and ending with&amp;nbsp;&lt;code&gt;-----END ENCRYPTED PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and save the certificate.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;strong&gt;Note:&lt;/strong&gt;&amp;nbsp;You must include the header and footer!&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Upload&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;as the Service Provider Signing Certificate in the SAML Authentication configuration page. If necessary, enter the PEM pass phrase you selected in the certificate creation wizard as the Service Provider Signing Certificate Password.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;To generate a certificate using Windows Internet Information Services (IIS):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In the IIS Manager, navigate to the Features view and double-click Server Certificates.&lt;/li&gt;
&lt;li&gt;In the Actions pane, click Create Self-Signed Certificate&lt;/li&gt;
&lt;li&gt;On the Create Self-Signed Certificate page, specify a name for the certificate, and then click OK.&lt;/li&gt;
&lt;li&gt;The certificate will now be listed on the Server Certificates page. Select the new certificate and click Export in the Actions pane.&lt;/li&gt;
&lt;li&gt;Select a directory to export the certificate to and enter a password for the certificate.&lt;/li&gt;
&lt;li&gt;This will create a certificate file in the PFX format. To convert this to the PEM format, either use an online tool such as this&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.sslshopper.com/ssl-converter.html"&gt;SSL Converter&lt;/a&gt;, or use OpenSSL with the following steps:
&lt;ol&gt;
&lt;li&gt;Open a terminal or command prompt and navigate to the OpenSSL directory. Place the new PFX certificate&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pfx&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;in the same directory.&lt;/li&gt;
&lt;li&gt;Execute the following command:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;openssl pkcs12 -in my-certificate.pfx -out my-certificate.pem -nodes&lt;/code&gt;. When prompted, enter the password for the certificate. This will create the file&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;in the current directory.&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;Upload&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;as the Service Provider Signing Certificate in the SAML Authentication configuration page. If necessary, enter the PEM pass phrase you selected in the certificate creation wizard as the Service Provider Signing Certificate Password.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="common-questions-regarding-saml-certificates"&gt;&lt;/h2&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2021&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, admin console, how-to, authentication&lt;/div&gt;
</description></item><item><title>KB-1108 How to create a self-signed certificate for SAML authentication</title><link>https://community.appian.com/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication/revision/5</link><pubDate>Mon, 12 Apr 2021 05:09:23 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:1f16d2b8-cb63-45d8-a439-62ec0a692299</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication#comments</comments><description>Revision 5 posted to Appian Knowledge Base by Parmida Borhani on 4/12/2021 5:09:23 AM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;div class="row content_container"&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;Starting in Appian 7.11, SAML Authentication is configurable through the Administration Console. This configuration requires a Service Provider Signing Certificate to be provided. This article describes some options for generating a self-signed certificate in the required PEM format. Note that this certificate is only used for signing SAML requests and responses.&amp;nbsp;For more information, review the&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#SAML_Authentication" rel="noopener noreferrer" target="_blank"&gt;SAML Configuration&lt;/a&gt;&amp;nbsp;documentation as well as &lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq" rel="noopener noreferrer" target="_blank"&gt;KB-1153 SAML Authentication FAQ&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id="certificate-generation"&gt;Instructions&lt;/h2&gt;
&lt;p&gt;A certificate in the PEM format can be generated using an OpenSSL-compatible tool, or a certificate in a different format can be converted into the PEM format.&lt;/p&gt;
&lt;p&gt;To generate a certificate using Apache OpenSSL:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Install Apache OpenSSL&amp;nbsp;which is commonly distributed with the Apache web server, available&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.apachehaus.com/cgi-bin/download.plx"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Take note of the location of the OpenSSL configuration file, e.g.&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;C:\apache\conf\openssl.cnf&lt;/code&gt;. This will be referred to as&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;CONFIG_FILE_LOCATION&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Open a terminal or command prompt and navigate to the OpenSSL&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;bin&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;directory.&lt;/li&gt;
&lt;li&gt;Execute the following command:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;openssl req -x509 -newkey rsa:2048 -keyout my-certificate.pem -out my-certificate.pem -days 3650 -config CONFIG_FILE_LOCATION&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Follow the prompts to create the certificate file. This will create the file&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;in the current directory.&lt;/li&gt;
&lt;li&gt;Open the newly generated&amp;nbsp;&lt;span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&amp;nbsp;in a text editor, such as Notepad++.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;If the certificate begins with&amp;nbsp;&lt;code&gt;-----BEGIN RSA PRIVATE KEY-----&lt;/code&gt;, proceed to step 9.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Open a terminal or command prompt, and within the OpenSSL&amp;nbsp;&lt;code&gt;bin&lt;/code&gt;&amp;nbsp;directory execute the following to unencrypt your key:&amp;nbsp;&lt;code&gt;openssl rsa -in my-certificate.pem&lt;/code&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Copy the output, beginning&amp;nbsp;with&amp;nbsp;&lt;code&gt;-----BEGIN RSA PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and ending with&amp;nbsp;&lt;code&gt;-----END RSA PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and replace the section in your certificate beginning with&amp;nbsp;&lt;code&gt;-----BEGIN ENCRYPTED PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and ending with&amp;nbsp;&lt;code&gt;-----END ENCRYPTED PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and save the certificate.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;strong&gt;Note:&lt;/strong&gt;&amp;nbsp;You must include the header and footer!&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Upload&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;as the Service Provider Signing Certificate in the SAML Authentication configuration page. If necessary, enter the PEM pass phrase you selected in the certificate creation wizard as the Service Provider Signing Certificate Password.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;To generate a certificate using Windows Internet Information Services (IIS):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In the IIS Manager, navigate to the Features view and double-click Server Certificates.&lt;/li&gt;
&lt;li&gt;In the Actions pane, click Create Self-Signed Certificate&lt;/li&gt;
&lt;li&gt;On the Create Self-Signed Certificate page, specify a name for the certificate, and then click OK.&lt;/li&gt;
&lt;li&gt;The certificate will now be listed on the Server Certificates page. Select the new certificate and click Export in the Actions pane.&lt;/li&gt;
&lt;li&gt;Select a directory to export the certificate to and enter a password for the certificate.&lt;/li&gt;
&lt;li&gt;This will create a certificate file in the PFX format. To convert this to the PEM format, either use an online tool such as this&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.sslshopper.com/ssl-converter.html"&gt;SSL Converter&lt;/a&gt;, or use OpenSSL with the following steps:
&lt;ol&gt;
&lt;li&gt;Open a terminal or command prompt and navigate to the OpenSSL directory. Place the new PFX certificate&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pfx&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;in the same directory.&lt;/li&gt;
&lt;li&gt;Execute the following command:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;openssl pkcs12 -in my-certificate.pfx -out my-certificate.pem -nodes&lt;/code&gt;. When prompted, enter the password for the certificate. This will create the file&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;in the current directory.&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;Upload&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;as the Service Provider Signing Certificate in the SAML Authentication configuration page. If necessary, enter the PEM pass phrase you selected in the certificate creation wizard as the Service Provider Signing Certificate Password.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="common-questions-regarding-saml-certificates"&gt;&lt;/h2&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: April 2021&lt;/p&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, admin console, how-to, authentication&lt;/div&gt;
</description></item><item><title>KB-1108 How to create a self-signed certificate for SAML authentication</title><link>https://community.appian.com/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication/revision/4</link><pubDate>Mon, 12 Apr 2021 05:08:49 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:1f16d2b8-cb63-45d8-a439-62ec0a692299</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication#comments</comments><description>Revision 4 posted to Appian Knowledge Base by Parmida Borhani on 4/12/2021 5:08:49 AM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;div class="row content_container"&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;Starting in Appian 7.11, SAML Authentication is configurable through the Administration Console. This configuration requires a Service Provider Signing Certificate to be provided. This article describes some options for generating a self-signed certificate in the required PEM format. Note that this certificate is only used for signing SAML requests and responses.&amp;nbsp;For more information, review the&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#SAML_Authentication" rel="noopener noreferrer" target="_blank"&gt;SAML Configuration&lt;/a&gt;&amp;nbsp;documentation as well as &lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq" rel="noopener noreferrer" target="_blank"&gt;KB-1153 SAML Authentication FAQ&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id="certificate-generation"&gt;Certificate Generation&lt;/h2&gt;
&lt;p&gt;A certificate in the PEM format can be generated using an OpenSSL-compatible tool, or a certificate in a different format can be converted into the PEM format.&lt;/p&gt;
&lt;p&gt;To generate a certificate using Apache OpenSSL:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Install Apache OpenSSL&amp;nbsp;which is commonly distributed with the Apache web server, available&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.apachehaus.com/cgi-bin/download.plx"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Take note of the location of the OpenSSL configuration file, e.g.&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;C:\apache\conf\openssl.cnf&lt;/code&gt;. This will be referred to as&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;CONFIG_FILE_LOCATION&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Open a terminal or command prompt and navigate to the OpenSSL&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;bin&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;directory.&lt;/li&gt;
&lt;li&gt;Execute the following command:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;openssl req -x509 -newkey rsa:2048 -keyout my-certificate.pem -out my-certificate.pem -days 3650 -config CONFIG_FILE_LOCATION&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Follow the prompts to create the certificate file. This will create the file&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;in the current directory.&lt;/li&gt;
&lt;li&gt;Open the newly generated&amp;nbsp;&lt;span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&amp;nbsp;in a text editor, such as Notepad++.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;If the certificate begins with&amp;nbsp;&lt;code&gt;-----BEGIN RSA PRIVATE KEY-----&lt;/code&gt;, proceed to step 9.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Open a terminal or command prompt, and within the OpenSSL&amp;nbsp;&lt;code&gt;bin&lt;/code&gt;&amp;nbsp;directory execute the following to unencrypt your key:&amp;nbsp;&lt;code&gt;openssl rsa -in my-certificate.pem&lt;/code&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Copy the output, beginning&amp;nbsp;with&amp;nbsp;&lt;code&gt;-----BEGIN RSA PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and ending with&amp;nbsp;&lt;code&gt;-----END RSA PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and replace the section in your certificate beginning with&amp;nbsp;&lt;code&gt;-----BEGIN ENCRYPTED PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and ending with&amp;nbsp;&lt;code&gt;-----END ENCRYPTED PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and save the certificate.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;strong&gt;Note:&lt;/strong&gt;&amp;nbsp;You must include the header and footer!&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Upload&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;as the Service Provider Signing Certificate in the SAML Authentication configuration page. If necessary, enter the PEM pass phrase you selected in the certificate creation wizard as the Service Provider Signing Certificate Password.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;To generate a certificate using Windows Internet Information Services (IIS):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In the IIS Manager, navigate to the Features view and double-click Server Certificates.&lt;/li&gt;
&lt;li&gt;In the Actions pane, click Create Self-Signed Certificate&lt;/li&gt;
&lt;li&gt;On the Create Self-Signed Certificate page, specify a name for the certificate, and then click OK.&lt;/li&gt;
&lt;li&gt;The certificate will now be listed on the Server Certificates page. Select the new certificate and click Export in the Actions pane.&lt;/li&gt;
&lt;li&gt;Select a directory to export the certificate to and enter a password for the certificate.&lt;/li&gt;
&lt;li&gt;This will create a certificate file in the PFX format. To convert this to the PEM format, either use an online tool such as this&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.sslshopper.com/ssl-converter.html"&gt;SSL Converter&lt;/a&gt;, or use OpenSSL with the following steps:
&lt;ol&gt;
&lt;li&gt;Open a terminal or command prompt and navigate to the OpenSSL directory. Place the new PFX certificate&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pfx&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;in the same directory.&lt;/li&gt;
&lt;li&gt;Execute the following command:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;openssl pkcs12 -in my-certificate.pfx -out my-certificate.pem -nodes&lt;/code&gt;. When prompted, enter the password for the certificate. This will create the file&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;in the current directory.&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;Upload&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;as the Service Provider Signing Certificate in the SAML Authentication configuration page. If necessary, enter the PEM pass phrase you selected in the certificate creation wizard as the Service Provider Signing Certificate Password.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="common-questions-regarding-saml-certificates"&gt;&lt;/h2&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: April 2021&lt;/p&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, admin console, authentication&lt;/div&gt;
</description></item><item><title>KB-1108 How to create a self-signed certificate for SAML authentication</title><link>https://community.appian.com/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication/revision/3</link><pubDate>Wed, 03 Mar 2021 01:54:03 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:1f16d2b8-cb63-45d8-a439-62ec0a692299</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication#comments</comments><description>Revision 3 posted to Appian Knowledge Base by Parmida Borhani on 3/3/2021 1:54:03 AM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;Starting in Appian 7.11, SAML Authentication is configurable through the Administration Console. This configuration requires a Service Provider Signing Certificate to be provided. This article describes some options for generating a self-signed certificate in the required PEM format. Note that this certificate is only used for signing SAML requests and responses. This article also answers some common questions regarding SAML certificates.&lt;/p&gt;
&lt;p&gt;Refer to&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#SAML_Authentication" rel="noopener noreferrer" target="_blank"&gt;SAML Configuration&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;for more information.&lt;/p&gt;
&lt;h2 id="certificate-generation"&gt;Certificate Generation&lt;/h2&gt;
&lt;p&gt;A certificate in the PEM format can be generated using an OpenSSL-compatible tool, or a certificate in a different format can be converted into the PEM format.&lt;/p&gt;
&lt;p&gt;To generate a certificate using Apache OpenSSL:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Install Apache OpenSSL&amp;nbsp;which is commonly distributed with the Apache web server, available&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.apachehaus.com/cgi-bin/download.plx"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Take note of the location of the OpenSSL configuration file, e.g.&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;C:\apache\conf\openssl.cnf&lt;/code&gt;. This will be referred to as&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;CONFIG_FILE_LOCATION&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Open a terminal or command prompt and navigate to the OpenSSL&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;bin&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;directory.&lt;/li&gt;
&lt;li&gt;Execute the following command:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;openssl req -x509 -newkey rsa:2048 -keyout my-certificate.pem -out my-certificate.pem -days 3650 -config CONFIG_FILE_LOCATION&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Follow the prompts to create the certificate file. This will create the file&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;in the current directory.&lt;/li&gt;
&lt;li&gt;Open the newly generated&amp;nbsp;&lt;span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&amp;nbsp;in a text editor, such as Notepad++.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;If the certificate begins with&amp;nbsp;&lt;code&gt;-----BEGIN RSA PRIVATE KEY-----&lt;/code&gt;, proceed to step 9.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Open a terminal or command prompt, and within the OpenSSL&amp;nbsp;&lt;code&gt;bin&lt;/code&gt;&amp;nbsp;directory execute the following to unencrypt your key:&amp;nbsp;&lt;code&gt;openssl rsa -in my-certificate.pem&lt;/code&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Copy the output, beginning&amp;nbsp;with&amp;nbsp;&lt;code&gt;-----BEGIN RSA PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and ending with&amp;nbsp;&lt;code&gt;-----END RSA PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and replace the section in your certificate beginning with&amp;nbsp;&lt;code&gt;-----BEGIN ENCRYPTED PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and ending with&amp;nbsp;&lt;code&gt;-----END ENCRYPTED PRIVATE KEY-----&lt;/code&gt;&amp;nbsp;and save the certificate.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;strong&gt;Note:&lt;/strong&gt;&amp;nbsp;You must include the header and footer!&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Upload&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;as the Service Provider Signing Certificate in the SAML Authentication configuration page. If necessary, enter the PEM pass phrase you selected in the certificate creation wizard as the Service Provider Signing Certificate Password.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;To generate a certificate using Windows Internet Information Services (IIS):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In the IIS Manager, navigate to the Features view and double-click Server Certificates.&lt;/li&gt;
&lt;li&gt;In the Actions pane, click Create Self-Signed Certificate&lt;/li&gt;
&lt;li&gt;On the Create Self-Signed Certificate page, specify a name for the certificate, and then click OK.&lt;/li&gt;
&lt;li&gt;The certificate will now be listed on the Server Certificates page. Select the new certificate and click Export in the Actions pane.&lt;/li&gt;
&lt;li&gt;Select a directory to export the certificate to and enter a password for the certificate.&lt;/li&gt;
&lt;li&gt;This will create a certificate file in the PFX format. To convert this to the PEM format, either use an online tool such as this&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.sslshopper.com/ssl-converter.html"&gt;SSL Converter&lt;/a&gt;, or use OpenSSL with the following steps:
&lt;ol&gt;
&lt;li&gt;Open a terminal or command prompt and navigate to the OpenSSL directory. Place the new PFX certificate&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pfx&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;in the same directory.&lt;/li&gt;
&lt;li&gt;Execute the following command:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;openssl pkcs12 -in my-certificate.pfx -out my-certificate.pem -nodes&lt;/code&gt;. When prompted, enter the password for the certificate. This will create the file&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;in the current directory.&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;Upload&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;my-certificate.pem&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;as the Service Provider Signing Certificate in the SAML Authentication configuration page. If necessary, enter the PEM pass phrase you selected in the certificate creation wizard as the Service Provider Signing Certificate Password.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="common-questions-regarding-saml-certificates"&gt;Common Questions Regarding SAML Certificates&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The common name can be any desired value. There is no restriction on common name from the Appian side.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The private key will only be used for signing SAML assertions. It will NOT be used for SSL encryption for HTTPS communications.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted certificate, such as a certificate signed by Symantec or another CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA-signed certificate from the Appian side. For a production environment, Appian Technical Support recommends using a CA signed certificate.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;March 2021&lt;/p&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, admin console, authentication&lt;/div&gt;
</description></item><item><title>KB-1108 How to create a self-signed certificate for SAML authentication</title><link>https://community.appian.com/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication/revision/2</link><pubDate>Thu, 03 May 2018 09:45:02 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:1f16d2b8-cb63-45d8-a439-62ec0a692299</guid><dc:creator>Nick Vigilante</dc:creator><comments>https://community.appian.com/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication#comments</comments><description>Revision 2 posted to Appian Knowledge Base by Nick Vigilante on 5/3/2018 9:45:02 AM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;Starting in Appian 7.11, SAML Authentication is configurable through the Administration Console. This configuration requires a Service Provider Signing Certificate to be provided. This article describes some options for generating a self-signed certificate in the required PEM format. Note that this certificate is only used for signing SAML requests and responses. This article also answers some common questions regarding SAML certificates.&lt;/p&gt;
&lt;p&gt;Refer to &lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#SAML_Authentication" target="_blank"&gt;SAML Configuration&lt;/a&gt; for more information.&lt;/p&gt;
&lt;h2 id="certificate-generation"&gt;Certificate Generation&lt;/h2&gt;
&lt;p&gt;A certificate in the PEM format can be generated using an OpenSSL-compatible tool, or a certificate in a different format can be converted into the PEM format.&lt;/p&gt;
&lt;p&gt;To generate a certificate using OpenSSL:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Install either an OpenSSL 1.0.1 or 1.0.2 package, freely available&amp;nbsp;&lt;a href="https://www.openssl.org/"&gt;here&lt;/a&gt;. OpenSSL is commonly distributed with the Apache web server. Please note that Appian does not currently support certificates with an encrypted private key created with OpenSSL 1.1.0.&lt;/li&gt;
&lt;li&gt;Take note of the location of the OpenSSL configuration file, e.g. &lt;code&gt;C:\apache\conf\openssl.cnf&lt;/code&gt;. This will be referred to as CONFIG_FILE_LOCATION.&lt;/li&gt;
&lt;li&gt;Open a terminal or command prompt and navigate to the OpenSSL directory.&lt;/li&gt;
&lt;li&gt;Execute the following command: &lt;code&gt;openssl req -x509 -newkey rsa:2048 -keyout my-certificate.pem -out my-certificate.pem -days 3650 -config CONFIG_FILE_LOCATION&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Follow the prompts to create the certificate file. All fields can be left blank with the exception of the PEM pass phrase. This will create the file &lt;code&gt;my-certificate.pem&lt;/code&gt; in the current directory.&lt;/li&gt;
&lt;li&gt;Upload &lt;code&gt;my-certificate.pem&lt;/code&gt; as the Service Provider Signing Certificate in the SAML Authentication configuration page. If necessary, enter the PEM pass phrase you selected in the certificate creation wizard as the Service Provider Signing Certificate Password.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;To generate a certificate using Windows Internet Information Services (IIS):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In the IIS Manager, navigate to the Features view and double-click Server Certificates.&lt;/li&gt;
&lt;li&gt;In the Actions pane, click Create Self-Signed Certificate&lt;/li&gt;
&lt;li&gt;On the Create Self-Signed Certificate page, specify a name for the certificate, and then click OK.&lt;/li&gt;
&lt;li&gt;The certificate will now be listed on the Server Certificates page. Select the new certificate and click Export in the Actions pane.&lt;/li&gt;
&lt;li&gt;Select a directory to export the certificate to and enter a password for the certificate.&lt;/li&gt;
&lt;li&gt;This will create a certificate file in the PFX format. To convert this to the PEM format, either use an online tool such as this &lt;a href="https://www.sslshopper.com/ssl-converter.html"&gt;SSL Converter&lt;/a&gt;, or use OpenSSL with the following steps:
&lt;ol&gt;
&lt;li&gt;Open a terminal or command prompt and navigate to the OpenSSL directory. Place the new PFX certificate &lt;code&gt;my-certificate.pfx&lt;/code&gt; in the same directory.&lt;/li&gt;
&lt;li&gt;Execute the following command: &lt;code&gt;openssl pkcs12 -in my-certificate.pfx -out my-certificate.pem -nodes&lt;/code&gt;. When prompted, enter the password for the certificate. This will create the file &lt;code&gt;my-certificate.pem&lt;/code&gt; in the current directory.&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;Upload &lt;code&gt;my-certificate.pem&lt;/code&gt; as the Service Provider Signing Certificate in the SAML Authentication configuration page. If necessary, enter the PEM pass phrase you selected in the certificate creation wizard as the Service Provider Signing Certificate Password.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="common-questions-regarding-saml-certificates"&gt;Common Questions Regarding SAML Certificates&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The common name can be any desired value. There is no restriction on common name from the Appian side.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The private key will only be used for signing SAML assertions. It will NOT be used for SSL encryption for HTTPS communications.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted certificate, such as a certificate signed by Symantec or another CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA-signed certificate from the Appian side. For a production environment, Appian Technical Support recommends using a CA signed certificate.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;February 2017&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, admin console, authentication&lt;/div&gt;
</description></item><item><title>KB-1108 How to create a self-signed certificate for SAML authentication</title><link>https://community.appian.com/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication/revision/1</link><pubDate>Wed, 22 Feb 2017 22:51:10 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:1f16d2b8-cb63-45d8-a439-62ec0a692299</guid><dc:creator>Nick Vigilante</dc:creator><comments>https://community.appian.com/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Nick Vigilante on 2/22/2017 10:51:10 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;Starting in Appian 7.11, SAML Authentication is configurable through the Administration Console. This configuration requires a Service Provider Signing Certificate to be provided. This article describes some options for generating a self-signed certificate in the required PEM format. Note that this certificate is only used for signing SAML requests and responses. This article also answers some common questions regarding SAML certificates.&lt;/p&gt;
&lt;p&gt;Refer to &lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#SAML_Authentication" target="_blank"&gt;SAML Configuration&lt;/a&gt; for more information.&lt;/p&gt;
&lt;h2 id="certificate-generation"&gt;Certificate Generation&lt;/h2&gt;
&lt;p&gt;A certificate in the PEM format can be generated using an OpenSSL-compatible tool, or a certificate in a different format can be converted into the PEM format.&lt;/p&gt;
&lt;p&gt;To generate a certificate using OpenSSL:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Install the OpenSSL package, freely available &lt;a href="https://www.openssl.org/"&gt;here&lt;/a&gt;. OpenSSL is commonly distributed with the Apache web server.&lt;/li&gt;
&lt;li&gt;Take note of the location of the OpenSSL configuration file, e.g. &lt;code&gt;C:\apache\conf\openssl.cnf&lt;/code&gt;. This will be referred to as CONFIG_FILE_LOCATION.&lt;/li&gt;
&lt;li&gt;Open a terminal or command prompt and navigate to the OpenSSL directory.&lt;/li&gt;
&lt;li&gt;Execute the following command: &lt;code&gt;openssl req -x509 -newkey rsa:2048 -keyout my-certificate.pem -out my-certificate.pem -days 3650 -config CONFIG_FILE_LOCATION&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Follow the prompts to create the certificate file. All fields can be left blank with the exception of the PEM pass phrase. This will create the file &lt;code&gt;my-certificate.pem&lt;/code&gt; in the current directory.&lt;/li&gt;
&lt;li&gt;Upload &lt;code&gt;my-certificate.pem&lt;/code&gt; as the Service Provider Signing Certificate in the SAML Authentication configuration page. If necessary, enter the PEM pass phrase you selected in the certificate creation wizard as the Service Provider Signing Certificate Password.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;To generate a certificate using Windows Internet Information Services (IIS):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In the IIS Manager, navigate to the Features view and double-click Server Certificates.&lt;/li&gt;
&lt;li&gt;In the Actions pane, click Create Self-Signed Certificate&lt;/li&gt;
&lt;li&gt;On the Create Self-Signed Certificate page, specify a name for the certificate, and then click OK.&lt;/li&gt;
&lt;li&gt;The certificate will now be listed on the Server Certificates page. Select the new certificate and click Export in the Actions pane.&lt;/li&gt;
&lt;li&gt;Select a directory to export the certificate to and enter a password for the certificate.&lt;/li&gt;
&lt;li&gt;This will create a certificate file in the PFX format. To convert this to the PEM format, either use an online tool such as this &lt;a href="https://www.sslshopper.com/ssl-converter.html"&gt;SSL Converter&lt;/a&gt;, or use OpenSSL with the following steps:
&lt;ol&gt;
&lt;li&gt;Open a terminal or command prompt and navigate to the OpenSSL directory. Place the new PFX certificate &lt;code&gt;my-certificate.pfx&lt;/code&gt; in the same directory.&lt;/li&gt;
&lt;li&gt;Execute the following command: &lt;code&gt;openssl pkcs12 -in my-certificate.pfx -out my-certificate.pem -nodes&lt;/code&gt;. When prompted, enter the password for the certificate. This will create the file &lt;code&gt;my-certificate.pem&lt;/code&gt; in the current directory.&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;Upload &lt;code&gt;my-certificate.pem&lt;/code&gt; as the Service Provider Signing Certificate in the SAML Authentication configuration page. If necessary, enter the PEM pass phrase you selected in the certificate creation wizard as the Service Provider Signing Certificate Password.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="common-questions-regarding-saml-certificates"&gt;Common Questions Regarding SAML Certificates&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The common name can be any desired value. There is no restriction on common name from the Appian side.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The private key will only be used for signing SAML assertions. It will NOT be used for SSL encryption for HTTPS communications.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted certificate, such as a certificate signed by Symantec or another CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA-signed certificate from the Appian side. For a production environment, Appian Technical Support recommends using a CA signed certificate.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;February 2017&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, admin console, authentication&lt;/div&gt;
</description></item></channel></rss>