<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq</link><pubDate>Wed, 03 Jul 2024 05:04:38 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>Maggie Deppe-Walker</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Current Revision posted to Appian Knowledge Base by Maggie Deppe-Walker on 7/3/2024 5:04:38 AM&lt;br /&gt;
&lt;p&gt;The purpose of this article is to provide answers to common questions and testing&amp;nbsp;issues regarding SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Common SAML Questions&lt;/b&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20Service%20Provider%20Certificate%20and%20where%20can%20I%20find%20it?"&gt;What is the Service Provider Certificate and where can I find it?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Appian%20is%20the%20service%20provider.%20Why%20do%20customers%20provide%20the%20service%20provider%20certificate?"&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Once%20the%20service%20provider%20certificate%20is%20generated,%20how%20should%20this%20be%20integrated%20with%20the%20identity%20provider?"&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#How%20can%20I%20find%20the%20Assertion%20Consumer%20Service%20(ACS)%20and%20Single%20Log%20Out%20(SLO)%20URLs%20to%20provide%20to%20the%20IdP?"&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#My%20identity%20provider%20does%20not%20have%20a%20field%20to%20upload%20a%20service%20provider%20metadata%20file.%20How%20do%20I%20configure%20SAML?"&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20have%20noticed%20that%20clicking%20%22Sign%20Out%22%20button%20in%20Appian%20is%20only%20logging%20users%20out%20of%20Appian%20(not%20the%20IdP).%20How%20can%20I%20configure%20SAML%20to%20log%20users%20out%20of%20both%20Appian%20and%20the%20IdP%20when%20clicking%20%22Sign%20Out%22%20in%20Appian?"&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20have%20noticed%20that%20logging%20out%20of%20my%20IdP%20does%20not%20end%20my%20session%20in%20Appian.%20How%20can%20I%20configure%20this%20to%20end%20my%20session%20in%20Appian%20too?"&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#relaystate"&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Why%20does%20a%20process%20model%20published%20as%20web%20service%20fail%20after%20configuring%20SAML?"&gt;Why does a process model published as web service fail after configuring SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20see%20%22Authentication%20was%20successful%22%20in%20the%20SAML%20test%20window,%20but%20admin%20console%20says%20%22Login%20failed...%22.%20Why%20is%20this?"&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20purpose%20of%20the%20checkbox%20called%20%22Use%20Identity%20Provider&amp;#39;s%20login%20page%22?"&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#saml-user-in-multiple-SAML-groups"&gt;Can I have a SAML user in multiple SAML groups?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#samlfields"&gt;What fields need to be included in the SAML Assertion?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Why%20does%20accessing%20a%20servlet%20plug-in%20or%20web%20API%20fail,%20even%20when%20using%20credentials%20of%20a%20user%20who%20isn&amp;#39;t%20in%20the%20SAML%20users%20group?"&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20should%20we%20set%20the%20%22common%20name%22%20to%20be%20when%20generating%20a%20certificate?"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20private%20key%20used%20for%20when%20generating%20the%20certificate?"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Can%20the%20certificate%20be%20signed%20by%20any%20trusted%20Certificate%20Authority%20(CA),%20like%20our%20internal%20Microsoft%20CA,%20or%20does%20it%20need%20to%20be%20a%20mutually-trusted%20cert,%20like%20Symantec%20or%20other%20CA?"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Does%20Appian%20support%20encrypted%20SAML%20assertions?"&gt;Does Appian support encrypted SAML assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20dropdown%20called%20%22Authentication%20Method%22?"&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#customlogout"&gt;Is a custom logout page supported in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Common SAML Certificate Questions&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#commonname"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#privatekey"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#encryptionandkeysize"&gt;What are the supported encryption algorithms and key sizes for the SP Signing certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#trustedauthority"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted certificate, such as a certificate signed by Symantec or another CA?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Common SAML Testing&amp;nbsp;Issues&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;/strong&gt;&lt;a href="#The-user-tested-with-was-invalid"&gt;The user tested with was invalid&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Unexpected-error-occurred-during-SAML-auth-test"&gt;&lt;span&gt;Unexpected error occurred during SAML authentication test&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Assertion-failed-security-policy-check"&gt;&lt;span&gt;Assertion failed security policy check&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#You-must-test-as-your-current-appian-user"&gt;&lt;span&gt;You must test as your current Appian user&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#failed-to-decode-assertion"&gt;&lt;span&gt;Failed to decode assertion&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#saml-testing-on-cloud-sites-redirect-to-appian.com"&gt;SAML test on Appian Cloud sites redirect to Appian.com&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Common SAML Questions&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the Service Provider Certificate and where can I find it?"&gt;&lt;/a&gt;What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to create this.&lt;/p&gt;
&lt;p&gt;See&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" rel="noopener noreferrer" target="_blank"&gt;KB-1108&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Appian is the service provider. Why do customers provide the service provider certificate?"&gt;&lt;/a&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Once the service provider certificate is generated, how should this be integrated with the identity provider?"&gt;&lt;/a&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The public key is provided as part of the service provider metadata. It is necessary to provide the service provider metadata file to the IdP team to be uploaded per the IdP&amp;#39;s documentation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?"&gt;&lt;/a&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;ACS and SLO&amp;nbsp;URLs can be found in the Service Provider (SP) metadata file that is generated in the Admin Console during SAML setup. To generate the SP metadata file, follow the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#how-to-add-a-saml-identity-provider" rel="nofollow noopener noreferrer" target="_blank"&gt;How to Add a SAML Identity Provider&lt;/a&gt;&amp;nbsp;instructions. After completing steps 1-7, the SP metadata file is generated in step 8. The URLs are in this generated file, which needs to be uploaded to the IdP.&lt;/p&gt;
&lt;p&gt;If your IdP does not have a field&amp;nbsp;to upload the SP metadata file, please refer to the following question.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?"&gt;&lt;/a&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag.&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?"&gt;&lt;/a&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To&amp;nbsp;sign the user out of both Appian AND the IdP entity, this is the corresponding flow (the single logout service must be defined):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;If a Single Log Out (SLO) service is defined in the IdP metadata, Appian will send a logout request to the specified logout URL when the &amp;quot;Sign Out&amp;quot; button is clicked in Appian.&lt;/li&gt;
&lt;li&gt;The IdP needs to process the logout request and send a successful logout response to Appian.&lt;/li&gt;
&lt;li&gt;After Appian receives a successful response from the IdP, Appian terminates the user&amp;#39;s session.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If there is no SLO URL defined in the IdP metadata file, then the Appian &amp;quot;Sign Out&amp;quot; button will only end the user&amp;#39;s Appian session. This is because Appian has not been instructed to send the logout request to another entity (e.g. the IdP). In other words, if the IdP wants Appian to contact it upon logout, it is upon the IdP to expose the single logout service, as Appian does not have control over ending user sessions for another entity. This behavior is in line with the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="http://saml.xml.org/saml-specifications" rel="nofollow noopener noreferrer" target="_blank"&gt;SAML 2.0 specifications&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?"&gt;&lt;/a&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When logging out of the IdP, it is necessary for the IdP to then send a valid logout request to Appian. Once Appian receives a valid logout request from the IdP, Appian will terminate the user&amp;#39;s session.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="relaystate"&gt;&lt;/a&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, Appian does not support the use of the &amp;quot;RelayState&amp;quot; parameter. To set up a redirect to a specified URL, provide the URL in the &amp;#39;inResponseTo&amp;#39; parameter.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does a process model published as web service fail after configuring SAML?"&gt;&lt;/a&gt;Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;do not&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?"&gt;&lt;/a&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the purpose of the checkbox called &amp;quot;Use Identity Provider's login page&amp;quot;?"&gt;&lt;/a&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;?signin=[identifier]&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;to the site URL, where&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;identifier&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a id="saml-user-in-multiple-SAML-groups"&gt;&lt;/a&gt;Can I have a SAML user in multiple SAML groups?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;It is not recommended to have a user in more than one SAML group. The only supported use case for a user in multiple SAML groups is for failover purposes. However, a user will only be able to authenticate with the configuration listed higher in the&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#identity-provider-ordering"&gt;Identity Provider Ordering&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="samlfields"&gt;&lt;/a&gt;What fields need to be included in the SAML Assertion?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian always requires the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-location"&gt;NameID&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;or&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-attribute"&gt;username&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;attribute to be provided based on which&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-location"&gt;Username Location&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is selected in the&amp;nbsp;SAML configuration. If&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#create-new-users-upon-sign-in"&gt;Create New Users Upon Sign-In&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is also selected, Appian requires the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#email-attribute"&gt;email&lt;/a&gt;,&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#first-name-attribute"&gt;first name&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#last-name-attribute"&gt;last name&lt;/a&gt;&amp;nbsp;attributes as well. These required fields&amp;nbsp;are equivalent to &amp;quot;Claim Rules&amp;quot; used by some Identity Providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn't in the SAML users group?"&gt;&lt;/a&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the private key used for when generating the certificate?"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Does Appian support encrypted SAML assertions?"&gt;&lt;/a&gt;Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, self-managed environments will need to be running OpenJDK 8 or have the JCE security JAR installed for the Oracle Java JDK. Once the JCE security JAR is installed, perform the following steps in the Appian self-managed environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Starting_and_Stopping_Appian.html" rel="noopener noreferrer" target="_blank"&gt;Restart Appian&lt;/a&gt;, so that it picks up the newly installed JCE security JAR.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the dropdown called &amp;quot;Authentication Method&amp;quot;?"&gt;&lt;/a&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="customlogout"&gt;&lt;/a&gt;Is a custom logout page supported in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no out-of-the-box configuration in Appian to redirect users to a logout page other than the Appian logout page. Check with your IdP to see if the IdP has functionality that can redirect users upon logout from Appian.&lt;/p&gt;
&lt;h3&gt;Common SAML Certificate Questions&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="commonname"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The common name can be any desired value. There is no restriction on common name from the Appian side.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="privatekey"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The private key will only be used for signing SAML assertions. It will NOT be used for SSL encryption for HTTPS communications.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="encryptionandkeysize"&gt;&lt;/a&gt;What are the supported encryption algorithms and key sizes for the SP Signing certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Due to the wide variety of encryption algorithms and key size combination available, Appian recommends customers test encryption algorithm and key size combinations for compatibility.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="trustedauthority"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted certificate, such as a certificate signed by Symantec or another CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA-signed certificate from the Appian side. For a production environment, Appian Technical Support recommends using a CA signed certificate.&lt;/p&gt;
&lt;h3&gt;Common SAML Testing Issues&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="The-user-tested-with-was-invalid"&gt;&lt;/a&gt;The user tested with was invalid&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;Username attribute was correctly configured but&amp;nbsp;does not contain a valid Appian user as its&amp;nbsp;value did not match any usernames&amp;nbsp;within Appian. Please note that usernames are case sensitive.&amp;nbsp;See &lt;a href="/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#gather-saml-trace"&gt;KB-1450&lt;/a&gt;&amp;nbsp;for how to gather a SAML trace to&amp;nbsp;identify the Appian username shown in the SAML assertion.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Unexpected-error-occurred-during-SAML-auth-test"&gt;&lt;/a&gt;Unexpected error occurred during SAML authentication test&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Please review&amp;nbsp;the application server log for more information about the error:&lt;code&gt;&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;SAML Assertion contained no valid Username&lt;/code&gt; -&amp;nbsp;The username attribute was not found in the SAML assertion. Please make sure the correct attribute name is being sent from your&amp;nbsp;IdP and that there are no leading/trailing spaces.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;java.lang.IllegalArgumentException: Given URL is not well formed&lt;/code&gt;&amp;nbsp;-&amp;nbsp;The SAML response URL is empty or invalid. Make sure your&amp;nbsp;IdP settings&amp;nbsp;have the correct URL for the SAML endpoint configured.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;java.lang.IndexOutOfBoundsException: Index: 0&lt;/code&gt; - The SAML assertion did not return with a subject that Appian was expecting.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Assertion-failed-security-policy-check"&gt;&lt;/a&gt;Assertion failed security policy check&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The date-time of the Service Provider and Identity Provider do not match. Please make sure that the server times&amp;nbsp;on both ends&amp;nbsp;are synchronized. Appian will check the timestamps in SAML assertions to make sure they are not stale.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="You-must-test-as-your-current-appian-user"&gt;&lt;/a&gt;You must test as your current Appian user&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Your IdP username and Appian username&amp;nbsp;do not match.&amp;nbsp;Please make sure that the&amp;nbsp;user testing the SAML configuration&amp;nbsp;has an account on your&amp;nbsp;IdP side, and&amp;nbsp;that the username attribute value from the SAML assertion matches the user&amp;#39;s Appian username.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="failed-to-decode-assertion"&gt;&lt;/a&gt;Failed to decode assertion&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The application server log may show a message like:&lt;/p&gt;
&lt;pre&gt;SAML message intended destination endpoint &amp;#39;&lt;a href="https://xxxx.appiancloud.com/SSO/SAML2/POST" rel="noopener noreferrer" target="_blank"&gt;https://xxxx.appiancloud.com/SSO/SAML2/POST&lt;/a&gt;&amp;#39; did not match the recipient endpoint &amp;#39;&lt;a href="https://xxxx.appiancloud.com/suite/saml/AssertionConsumer" rel="noopener noreferrer" target="_blank"&gt;https://xxxx.appiancloud.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;#39;&lt;/pre&gt;
&lt;p&gt;Appian receives SAML responses only&amp;nbsp;at the URL &lt;code&gt;/suite/saml/AssertionConsumer&lt;/code&gt;, and your IdP may be using an older version of the SP metadata that contains the old URL. Please create a new SP connection&amp;nbsp;within your IdP&amp;nbsp;if SAML&amp;nbsp;has not been configured since Appian 7.11 or earlier.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="saml-testing-on-cloud-sites-redirect-to-appian.com"&gt;&lt;/a&gt;SAML Test on Appian Cloud sites redirect to Appian.com&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The response URL was not resolved correctly by your IdP. Please make sure that the URLs on your IdP side are valid.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2021&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, integration, authentication, FAQ&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/27</link><pubDate>Wed, 14 Jun 2023 21:49:25 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 27 posted to Appian Knowledge Base by Elly Meng on 6/14/2023 9:49:25 PM&lt;br /&gt;
&lt;p&gt;The purpose of this article is to provide answers to common questions and testing&amp;nbsp;issues regarding SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Common SAML Questions&lt;/b&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20Service%20Provider%20Certificate%20and%20where%20can%20I%20find%20it?"&gt;What is the Service Provider Certificate and where can I find it?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Appian%20is%20the%20service%20provider.%20Why%20do%20customers%20provide%20the%20service%20provider%20certificate?"&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Once%20the%20service%20provider%20certificate%20is%20generated,%20how%20should%20this%20be%20integrated%20with%20the%20identity%20provider?"&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#How%20can%20I%20find%20the%20Assertion%20Consumer%20Service%20(ACS)%20and%20Single%20Log%20Out%20(SLO)%20URLs%20to%20provide%20to%20the%20IdP?"&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#My%20identity%20provider%20does%20not%20have%20a%20field%20to%20upload%20a%20service%20provider%20metadata%20file.%20How%20do%20I%20configure%20SAML?"&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20have%20noticed%20that%20clicking%20%22Sign%20Out%22%20button%20in%20Appian%20is%20only%20logging%20users%20out%20of%20Appian%20(not%20the%20IdP).%20How%20can%20I%20configure%20SAML%20to%20log%20users%20out%20of%20both%20Appian%20and%20the%20IdP%20when%20clicking%20%22Sign%20Out%22%20in%20Appian?"&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20have%20noticed%20that%20logging%20out%20of%20my%20IdP%20does%20not%20end%20my%20session%20in%20Appian.%20How%20can%20I%20configure%20this%20to%20end%20my%20session%20in%20Appian%20too?"&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#relaystate"&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Why%20does%20a%20process%20model%20published%20as%20web%20service%20fail%20after%20configuring%20SAML?"&gt;Why does a process model published as web service fail after configuring SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20see%20%22Authentication%20was%20successful%22%20in%20the%20SAML%20test%20window,%20but%20admin%20console%20says%20%22Login%20failed...%22.%20Why%20is%20this?"&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20purpose%20of%20the%20checkbox%20called%20%22Use%20Identity%20Provider&amp;#39;s%20login%20page%22?"&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#saml-user-in-multiple-SAML-groups"&gt;Can I have a SAML user in multiple SAML groups?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#samlfields"&gt;What fields need to be included in the SAML Assertion?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Why%20does%20accessing%20a%20servlet%20plug-in%20or%20web%20API%20fail,%20even%20when%20using%20credentials%20of%20a%20user%20who%20isn&amp;#39;t%20in%20the%20SAML%20users%20group?"&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20should%20we%20set%20the%20%22common%20name%22%20to%20be%20when%20generating%20a%20certificate?"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20private%20key%20used%20for%20when%20generating%20the%20certificate?"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Can%20the%20certificate%20be%20signed%20by%20any%20trusted%20Certificate%20Authority%20(CA),%20like%20our%20internal%20Microsoft%20CA,%20or%20does%20it%20need%20to%20be%20a%20mutually-trusted%20cert,%20like%20Symantec%20or%20other%20CA?"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Does%20Appian%20support%20encrypted%20SAML%20assertions?"&gt;Does Appian support encrypted SAML assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20dropdown%20called%20%22Authentication%20Method%22?"&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#customlogout"&gt;Is a custom logout page supported in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Common SAML Certificate Questions&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#commonname"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#privatekey"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#encryptionandkeysize"&gt;What are the supported encryption algorithms and key sizes for the SP Signing certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#trustedauthority"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted certificate, such as a certificate signed by Symantec or another CA?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Common SAML Testing&amp;nbsp;Issues&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;/strong&gt;&lt;a href="#The-user-tested-with-was-invalid"&gt;The user tested with was invalid&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Unexpected-error-occurred-during-SAML-auth-test"&gt;&lt;span&gt;Unexpected error occurred during SAML authentication test&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Assertion-failed-security-policy-check"&gt;&lt;span&gt;Assertion failed security policy check&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#You-must-test-as-your-current-appian-user"&gt;&lt;span&gt;You must test as your current Appian user&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#failed-to-decode-assertion"&gt;&lt;span&gt;Failed to decode assertion&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#saml-testing-on-cloud-sites-redirect-to-appian.com"&gt;SAML test on Appian Cloud sites redirect to Appian.com&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Common SAML Questions&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the Service Provider Certificate and where can I find it?"&gt;&lt;/a&gt;What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" rel="noopener noreferrer" target="_blank"&gt;KB-1108&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Appian is the service provider. Why do customers provide the service provider certificate?"&gt;&lt;/a&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Once the service provider certificate is generated, how should this be integrated with the identity provider?"&gt;&lt;/a&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The public key is provided as part of the service provider metadata. It is necessary to provide the service provider metadata file to the IdP team to be uploaded per the IdP&amp;#39;s documentation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?"&gt;&lt;/a&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;ACS and SLO&amp;nbsp;URLs can be found in the Service Provider (SP) metadata file that is generated in the Admin Console during SAML setup. To generate the SP metadata file, follow the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#how-to-add-a-saml-identity-provider" rel="nofollow noopener noreferrer" target="_blank"&gt;How to Add a SAML Identity Provider&lt;/a&gt;&amp;nbsp;instructions. After completing steps 1-7, the SP metadata file is generated in step 8. The URLs are in this generated file, which needs to be uploaded to the IdP.&lt;/p&gt;
&lt;p&gt;If your IdP does not have a field&amp;nbsp;to upload the SP metadata file, please refer to the following question.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?"&gt;&lt;/a&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag.&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?"&gt;&lt;/a&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To&amp;nbsp;sign the user out of both Appian AND the IdP entity, this is the corresponding flow (the single logout service must be defined):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;If a Single Log Out (SLO) service is defined in the IdP metadata, Appian will send a logout request to the specified logout URL when the &amp;quot;Sign Out&amp;quot; button is clicked in Appian.&lt;/li&gt;
&lt;li&gt;The IdP needs to process the logout request and send a successful logout response to Appian.&lt;/li&gt;
&lt;li&gt;After Appian receives a successful response from the IdP, Appian terminates the user&amp;#39;s session.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If there is no SLO URL defined in the IdP metadata file, then the Appian &amp;quot;Sign Out&amp;quot; button will only end the user&amp;#39;s Appian session. This is because Appian has not been instructed to send the logout request to another entity (e.g. the IdP). In other words, if the IdP wants Appian to contact it upon logout, it is upon the IdP to expose the single logout service, as Appian does not have control over ending user sessions for another entity. This behavior is in line with the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="http://saml.xml.org/saml-specifications" rel="nofollow noopener noreferrer" target="_blank"&gt;SAML 2.0 specifications&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?"&gt;&lt;/a&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When logging out of the IdP, it is necessary for the IdP to then send a valid logout request to Appian. Once Appian receives a valid logout request from the IdP, Appian will terminate the user&amp;#39;s session.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="relaystate"&gt;&lt;/a&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, Appian does not support the use of the &amp;quot;RelayState&amp;quot; parameter. To set up a redirect to a specified URL, provide the URL in the &amp;#39;inResponseTo&amp;#39; parameter.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does a process model published as web service fail after configuring SAML?"&gt;&lt;/a&gt;Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;do not&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?"&gt;&lt;/a&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the purpose of the checkbox called &amp;quot;Use Identity Provider's login page&amp;quot;?"&gt;&lt;/a&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;?signin=[identifier]&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;to the site URL, where&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;identifier&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a id="saml-user-in-multiple-SAML-groups"&gt;&lt;/a&gt;Can I have a SAML user in multiple SAML groups?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;It is not recommended to have a user in more than one SAML group. The only supported use case for a user in multiple SAML groups is for failover purposes. However, a user will only be able to authenticate with the configuration listed higher in the&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#identity-provider-ordering"&gt;Identity Provider Ordering&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="samlfields"&gt;&lt;/a&gt;What fields need to be included in the SAML Assertion?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian always requires the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-location"&gt;NameID&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;or&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-attribute"&gt;username&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;attribute to be provided based on which&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-location"&gt;Username Location&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is selected in the&amp;nbsp;SAML configuration. If&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#create-new-users-upon-sign-in"&gt;Create New Users Upon Sign-In&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is also selected, Appian requires the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#email-attribute"&gt;email&lt;/a&gt;,&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#first-name-attribute"&gt;first name&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#last-name-attribute"&gt;last name&lt;/a&gt;&amp;nbsp;attributes as well. These required fields&amp;nbsp;are equivalent to &amp;quot;Claim Rules&amp;quot; used by some Identity Providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn't in the SAML users group?"&gt;&lt;/a&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the private key used for when generating the certificate?"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Does Appian support encrypted SAML assertions?"&gt;&lt;/a&gt;Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, self-managed environments will need to be running OpenJDK 8 or have the JCE security JAR installed for the Oracle Java JDK. Once the JCE security JAR is installed, perform the following steps in the Appian self-managed environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Starting_and_Stopping_Appian.html" rel="noopener noreferrer" target="_blank"&gt;Restart Appian&lt;/a&gt;, so that it picks up the newly installed JCE security JAR.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the dropdown called &amp;quot;Authentication Method&amp;quot;?"&gt;&lt;/a&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="customlogout"&gt;&lt;/a&gt;Is a custom logout page supported in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no out-of-the-box configuration in Appian to redirect users to a logout page other than the Appian logout page. Check with your IdP to see if the IdP has functionality that can redirect users upon logout from Appian.&lt;/p&gt;
&lt;h3&gt;Common SAML Certificate Questions&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="commonname"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The common name can be any desired value. There is no restriction on common name from the Appian side.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="privatekey"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The private key will only be used for signing SAML assertions. It will NOT be used for SSL encryption for HTTPS communications.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="encryptionandkeysize"&gt;&lt;/a&gt;What are the supported encryption algorithms and key sizes for the SP Signing certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Due to the wide variety of encryption algorithms and key size combination available, Appian recommends customers test encryption algorithm and key size combinations for compatibility.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="trustedauthority"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted certificate, such as a certificate signed by Symantec or another CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA-signed certificate from the Appian side. For a production environment, Appian Technical Support recommends using a CA signed certificate.&lt;/p&gt;
&lt;h3&gt;Common SAML Testing Issues&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="The-user-tested-with-was-invalid"&gt;&lt;/a&gt;The user tested with was invalid&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;Username attribute was correctly configured but&amp;nbsp;does not contain a valid Appian user as its&amp;nbsp;value did not match any usernames&amp;nbsp;within Appian. Please note that usernames are case sensitive.&amp;nbsp;See &lt;a href="/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#gather-saml-trace"&gt;KB-1450&lt;/a&gt;&amp;nbsp;for how to gather a SAML trace to&amp;nbsp;identify the Appian username shown in the SAML assertion.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Unexpected-error-occurred-during-SAML-auth-test"&gt;&lt;/a&gt;Unexpected error occurred during SAML authentication test&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Please review&amp;nbsp;the application server log for more information about the error:&lt;code&gt;&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;SAML Assertion contained no valid Username&lt;/code&gt; -&amp;nbsp;The username attribute was not found in the SAML assertion. Please make sure the correct attribute name is being sent from your&amp;nbsp;IdP and that there are no leading/trailing spaces.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;java.lang.IllegalArgumentException: Given URL is not well formed&lt;/code&gt;&amp;nbsp;-&amp;nbsp;The SAML response URL is empty or invalid. Make sure your&amp;nbsp;IdP settings&amp;nbsp;have the correct URL for the SAML endpoint configured.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;java.lang.IndexOutOfBoundsException: Index: 0&lt;/code&gt; - The SAML assertion did not return with a subject that Appian was expecting.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Assertion-failed-security-policy-check"&gt;&lt;/a&gt;Assertion failed security policy check&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The date-time of the Service Provider and Identity Provider do not match. Please make sure that the server times&amp;nbsp;on both ends&amp;nbsp;are synchronized. Appian will check the timestamps in SAML assertions to make sure they are not stale.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="You-must-test-as-your-current-appian-user"&gt;&lt;/a&gt;You must test as your current Appian user&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Your IdP username and Appian username&amp;nbsp;do not match.&amp;nbsp;Please make sure that the&amp;nbsp;user testing the SAML configuration&amp;nbsp;has an account on your&amp;nbsp;IdP side, and&amp;nbsp;that the username attribute value from the SAML assertion matches the user&amp;#39;s Appian username.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="failed-to-decode-assertion"&gt;&lt;/a&gt;Failed to decode assertion&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The application server log may show a message like:&lt;/p&gt;
&lt;pre&gt;SAML message intended destination endpoint &amp;#39;&lt;a href="https://xxxx.appiancloud.com/SSO/SAML2/POST" rel="noopener noreferrer" target="_blank"&gt;https://xxxx.appiancloud.com/SSO/SAML2/POST&lt;/a&gt;&amp;#39; did not match the recipient endpoint &amp;#39;&lt;a href="https://xxxx.appiancloud.com/suite/saml/AssertionConsumer" rel="noopener noreferrer" target="_blank"&gt;https://xxxx.appiancloud.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;#39;&lt;/pre&gt;
&lt;p&gt;Appian receives SAML responses only&amp;nbsp;at the URL &lt;code&gt;/suite/saml/AssertionConsumer&lt;/code&gt;, and your IdP may be using an older version of the SP metadata that contains the old URL. Please create a new SP connection&amp;nbsp;within your IdP&amp;nbsp;if SAML&amp;nbsp;has not been configured since Appian 7.11 or earlier.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="saml-testing-on-cloud-sites-redirect-to-appian.com"&gt;&lt;/a&gt;SAML Test on Appian Cloud sites redirect to Appian.com&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The response URL was not resolved correctly by your IdP. Please make sure that the URLs on your IdP side are valid.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2021&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, integration, authentication, FAQ&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/26</link><pubDate>Mon, 12 Apr 2021 05:06:13 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 26 posted to Appian Knowledge Base by Parmida Borhani on 4/12/2021 5:06:13 AM&lt;br /&gt;
&lt;div class="content"&gt;
&lt;div class="content"&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to common questions and testing&amp;nbsp;issues regarding SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Common SAML Questions&lt;/b&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20Service%20Provider%20Certificate%20and%20where%20can%20I%20find%20it?"&gt;What is the Service Provider Certificate and where can I find it?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Appian%20is%20the%20service%20provider.%20Why%20do%20customers%20provide%20the%20service%20provider%20certificate?"&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Once%20the%20service%20provider%20certificate%20is%20generated,%20how%20should%20this%20be%20integrated%20with%20the%20identity%20provider?"&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#How%20can%20I%20find%20the%20Assertion%20Consumer%20Service%20(ACS)%20and%20Single%20Log%20Out%20(SLO)%20URLs%20to%20provide%20to%20the%20IdP?"&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#My%20identity%20provider%20does%20not%20have%20a%20field%20to%20upload%20a%20service%20provider%20metadata%20file.%20How%20do%20I%20configure%20SAML?"&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20have%20noticed%20that%20clicking%20%22Sign%20Out%22%20button%20in%20Appian%20is%20only%20logging%20users%20out%20of%20Appian%20(not%20the%20IdP).%20How%20can%20I%20configure%20SAML%20to%20log%20users%20out%20of%20both%20Appian%20and%20the%20IdP%20when%20clicking%20%22Sign%20Out%22%20in%20Appian?"&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20have%20noticed%20that%20logging%20out%20of%20my%20IdP%20does%20not%20end%20my%20session%20in%20Appian.%20How%20can%20I%20configure%20this%20to%20end%20my%20session%20in%20Appian%20too?"&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#relaystate"&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Why%20does%20a%20process%20model%20published%20as%20web%20service%20fail%20after%20configuring%20SAML?"&gt;Why does a process model published as web service fail after configuring SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20see%20%22Authentication%20was%20successful%22%20in%20the%20SAML%20test%20window,%20but%20admin%20console%20says%20%22Login%20failed...%22.%20Why%20is%20this?"&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20purpose%20of%20the%20checkbox%20called%20%22Use%20Identity%20Provider&amp;#39;s%20login%20page%22?"&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#saml-user-in-multiple-SAML-groups"&gt;Can I have a SAML user in multiple SAML groups?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#samlfields"&gt;What fields need to be included in the SAML Assertion?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Why%20does%20accessing%20a%20servlet%20plug-in%20or%20web%20API%20fail,%20even%20when%20using%20credentials%20of%20a%20user%20who%20isn&amp;#39;t%20in%20the%20SAML%20users%20group?"&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20should%20we%20set%20the%20%22common%20name%22%20to%20be%20when%20generating%20a%20certificate?"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20private%20key%20used%20for%20when%20generating%20the%20certificate?"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Can%20the%20certificate%20be%20signed%20by%20any%20trusted%20Certificate%20Authority%20(CA),%20like%20our%20internal%20Microsoft%20CA,%20or%20does%20it%20need%20to%20be%20a%20mutually-trusted%20cert,%20like%20Symantec%20or%20other%20CA?"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Does%20Appian%20support%20encrypted%20SAML%20assertions?"&gt;Does Appian support encrypted SAML assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20dropdown%20called%20%22Authentication%20Method%22?"&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#customlogout"&gt;Is a custom logout page supported in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Common SAML Certificate Questions&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#commonname"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#privatekey"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#encryptionandkeysize"&gt;What are the supported encryption algorithms and key sizes for the SP Signing certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#trustedauthority"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted certificate, such as a certificate signed by Symantec or another CA?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Common SAML Testing&amp;nbsp;Issues&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;/strong&gt;&lt;a href="#The-user-tested-with-was-invalid"&gt;The user tested with was invalid&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Unexpected-error-occurred-during-SAML-auth-test"&gt;&lt;span&gt;Unexpected error occurred during SAML authentication test&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Assertion-failed-security-policy-check"&gt;&lt;span&gt;Assertion failed security policy check&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#You-must-test-as-your-current-appian-user"&gt;&lt;span&gt;You must test as your current Appian user&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#failed-to-decode-assertion"&gt;&lt;span&gt;Failed to decode assertion&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#saml-testing-on-cloud-sites-redirect-to-appian.com"&gt;SAML test on Appian Cloud sites redirect to Appian.com&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Common SAML Questions&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the Service Provider Certificate and where can I find it?"&gt;&lt;/a&gt;What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" rel="noopener noreferrer" target="_blank"&gt;KB-1108&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Appian is the service provider. Why do customers provide the service provider certificate?"&gt;&lt;/a&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Once the service provider certificate is generated, how should this be integrated with the identity provider?"&gt;&lt;/a&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The public key is provided as part of the service provider metadata. It is necessary to provide the service provider metadata file to the IdP team to be uploaded per the IdP&amp;#39;s documentation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?"&gt;&lt;/a&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;ACS and SLO&amp;nbsp;URLs can be found in the Service Provider (SP) metadata file that is generated in the Admin Console during SAML setup. To generate the SP metadata file, follow the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#how-to-add-a-saml-identity-provider" rel="nofollow noopener noreferrer" target="_blank"&gt;How to Add a SAML Identity Provider&lt;/a&gt;&amp;nbsp;instructions. After completing steps 1-7, the SP metadata file is generated in step 8. The URLs are in this generated file, which needs to be uploaded to the IdP.&lt;/p&gt;
&lt;p&gt;If your IdP does not have a field&amp;nbsp;to upload the SP metadata file, please refer to the following question.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?"&gt;&lt;/a&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag.&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?"&gt;&lt;/a&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To&amp;nbsp;sign the user out of both Appian AND the IdP entity, this is the corresponding flow (the single logout service must be defined):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;If a Single Log Out (SLO) service is defined in the IdP metadata, Appian will send a logout request to the specified logout URL when the &amp;quot;Sign Out&amp;quot; button is clicked in Appian.&lt;/li&gt;
&lt;li&gt;The IdP needs to process the logout request and send a successful logout response to Appian.&lt;/li&gt;
&lt;li&gt;After Appian receives a successful response from the IdP, Appian terminates the user&amp;#39;s session.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If there is no SLO URL defined in the IdP metadata file, then the Appian &amp;quot;Sign Out&amp;quot; button will only end the user&amp;#39;s Appian session. This is because Appian has not been instructed to send the logout request to another entity (e.g. the IdP). In other words, if the IdP wants Appian to contact it upon logout, it is upon the IdP to expose the single logout service, as Appian does not have control over ending user sessions for another entity. This behavior is in line with the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="http://saml.xml.org/saml-specifications" rel="nofollow noopener noreferrer" target="_blank"&gt;SAML 2.0 specifications&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?"&gt;&lt;/a&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When logging out of the IdP, it is necessary for the IdP to then send a valid logout request to Appian. Once Appian receives a valid logout request from the IdP, Appian will terminate the user&amp;#39;s session.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="relaystate"&gt;&lt;/a&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, Appian does not support the use of the &amp;quot;RelayState&amp;quot; parameter. To set up a redirect to a specified URL, provide the URL in the &amp;#39;inResponseTo&amp;#39; parameter.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does a process model published as web service fail after configuring SAML?"&gt;&lt;/a&gt;Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;do not&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?"&gt;&lt;/a&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the purpose of the checkbox called &amp;quot;Use Identity Provider's login page&amp;quot;?"&gt;&lt;/a&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;?signin=[identifier]&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;to the site URL, where&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;identifier&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a id="saml-user-in-multiple-SAML-groups"&gt;&lt;/a&gt;Can I have a SAML user in multiple SAML groups?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;It is not recommended to have a user in more than one SAML group. The only supported use case for a user in multiple SAML groups is for failover purposes. However, a user will only be able to authenticate with the configuration listed higher in the&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#identity-provider-ordering"&gt;Identity Provider Ordering&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="samlfields"&gt;&lt;/a&gt;What fields need to be included in the SAML Assertion?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian always requires the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-location"&gt;NameID&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;or&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-attribute"&gt;username&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;attribute to be provided based on which&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-location"&gt;Username Location&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is selected in the&amp;nbsp;SAML configuration. If&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#create-new-users-upon-sign-in"&gt;Create New Users Upon Sign-In&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is also selected, Appian requires the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#email-attribute"&gt;email&lt;/a&gt;,&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#first-name-attribute"&gt;first name&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#last-name-attribute"&gt;last name&lt;/a&gt;&amp;nbsp;attributes as well. These required fields&amp;nbsp;are equivalent to &amp;quot;Claim Rules&amp;quot; used by some Identity Providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn't in the SAML users group?"&gt;&lt;/a&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the private key used for when generating the certificate?"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Does Appian support encrypted SAML assertions?"&gt;&lt;/a&gt;Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, self-managed environments will need to be running OpenJDK 8 or have the JCE security JAR installed for the Oracle Java JDK. Once the JCE security JAR is installed, perform the following steps in the Appian self-managed environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Starting_and_Stopping_Appian.html" rel="noopener noreferrer" target="_blank"&gt;Restart Appian&lt;/a&gt;, so that it picks up the newly installed JCE security JAR.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the dropdown called &amp;quot;Authentication Method&amp;quot;?"&gt;&lt;/a&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="customlogout"&gt;&lt;/a&gt;Is a custom logout page supported in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no out-of-the-box configuration in Appian to redirect users to a logout page other than the Appian logout page. Check with your IdP to see if the IdP has functionality that can redirect users upon logout from Appian.&lt;/p&gt;
&lt;h3&gt;Common SAML Certificate Questions&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="commonname"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The common name can be any desired value. There is no restriction on common name from the Appian side.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="privatekey"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The private key will only be used for signing SAML assertions. It will NOT be used for SSL encryption for HTTPS communications.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="encryptionandkeysize"&gt;&lt;/a&gt;What are the supported encryption algorithms and key sizes for the SP Signing certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Due to the wide variety of encryption algorithms and key size combination available, Appian recommends customers test encryption algorithm and key size combinations for compatibility.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="trustedauthority"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted certificate, such as a certificate signed by Symantec or another CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA-signed certificate from the Appian side. For a production environment, Appian Technical Support recommends using a CA signed certificate.&lt;/p&gt;
&lt;h3&gt;Common SAML Testing Issues&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="The-user-tested-with-was-invalid"&gt;&lt;/a&gt;The user tested with was invalid&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;Username attribute was correctly configured but&amp;nbsp;does not contain a valid Appian user as its&amp;nbsp;value did not match any usernames&amp;nbsp;within Appian. Please note that usernames are case sensitive.&amp;nbsp;See &lt;a href="/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#gather-saml-trace"&gt;KB-1450&lt;/a&gt;&amp;nbsp;for how to gather a SAML trace to&amp;nbsp;identify the Appian username shown in the SAML assertion.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Unexpected-error-occurred-during-SAML-auth-test"&gt;&lt;/a&gt;Unexpected error occurred during SAML authentication test&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Please review&amp;nbsp;the application server log for more information about the error:&lt;code&gt;&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;SAML Assertion contained no valid Username&lt;/code&gt; -&amp;nbsp;The username attribute was not found in the SAML assertion. Please make sure the correct attribute name is being sent from your&amp;nbsp;IdP and that there are no leading/trailing spaces.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;java.lang.IllegalArgumentException: Given URL is not well formed&lt;/code&gt;&amp;nbsp;-&amp;nbsp;The SAML response URL is empty or invalid. Make sure your&amp;nbsp;IdP settings&amp;nbsp;have the correct URL for the SAML endpoint configured.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;java.lang.IndexOutOfBoundsException: Index: 0&lt;/code&gt; - The SAML assertion did not return with a subject that Appian was expecting.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Assertion-failed-security-policy-check"&gt;&lt;/a&gt;Assertion failed security policy check&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The date-time of the Service Provider and Identity Provider do not match. Please make sure that the server times&amp;nbsp;on both ends&amp;nbsp;are synchronized. Appian will check the timestamps in SAML assertions to make sure they are not stale.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="You-must-test-as-your-current-appian-user"&gt;&lt;/a&gt;You must test as your current Appian user&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Your IdP username and Appian username&amp;nbsp;do not match.&amp;nbsp;Please make sure that the&amp;nbsp;user testing the SAML configuration&amp;nbsp;has an account on your&amp;nbsp;IdP side, and&amp;nbsp;that the username attribute value from the SAML assertion matches the user&amp;#39;s Appian username.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="failed-to-decode-assertion"&gt;&lt;/a&gt;Failed to decode assertion&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The application server log may show a message like:&lt;/p&gt;
&lt;pre&gt;SAML message intended destination endpoint &amp;#39;&lt;a href="https://xxxx.appiancloud.com/SSO/SAML2/POST" rel="noopener noreferrer" target="_blank"&gt;https://xxxx.appiancloud.com/SSO/SAML2/POST&lt;/a&gt;&amp;#39; did not match the recipient endpoint &amp;#39;&lt;a href="https://xxxx.appiancloud.com/suite/saml/AssertionConsumer" rel="noopener noreferrer" target="_blank"&gt;https://xxxx.appiancloud.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;#39;&lt;/pre&gt;
&lt;p&gt;Appian receives SAML responses only&amp;nbsp;at the URL &lt;code&gt;/suite/saml/AssertionConsumer&lt;/code&gt;, and your IdP may be using an older version of the SP metadata that contains the old URL. Please create a new SP connection&amp;nbsp;within your IdP&amp;nbsp;if SAML&amp;nbsp;has not been configured since Appian 7.11 or earlier.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="saml-testing-on-cloud-sites-redirect-to-appian.com"&gt;&lt;/a&gt;SAML Test on Appian Cloud sites redirect to Appian.com&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The response URL was not resolved correctly by your IdP. Please make sure that the URLs on your IdP side are valid.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: April 2021&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, integration, authentication, FAQ&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/25</link><pubDate>Mon, 12 Apr 2021 05:05:40 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 25 posted to Appian Knowledge Base by Parmida Borhani on 4/12/2021 5:05:40 AM&lt;br /&gt;
&lt;div class="content"&gt;
&lt;div class="content"&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to common questions and testing&amp;nbsp;issues regarding SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Common SAML Questions&lt;/b&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20Service%20Provider%20Certificate%20and%20where%20can%20I%20find%20it?"&gt;What is the Service Provider Certificate and where can I find it?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Appian%20is%20the%20service%20provider.%20Why%20do%20customers%20provide%20the%20service%20provider%20certificate?"&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Once%20the%20service%20provider%20certificate%20is%20generated,%20how%20should%20this%20be%20integrated%20with%20the%20identity%20provider?"&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#How%20can%20I%20find%20the%20Assertion%20Consumer%20Service%20(ACS)%20and%20Single%20Log%20Out%20(SLO)%20URLs%20to%20provide%20to%20the%20IdP?"&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#My%20identity%20provider%20does%20not%20have%20a%20field%20to%20upload%20a%20service%20provider%20metadata%20file.%20How%20do%20I%20configure%20SAML?"&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20have%20noticed%20that%20clicking%20%22Sign%20Out%22%20button%20in%20Appian%20is%20only%20logging%20users%20out%20of%20Appian%20(not%20the%20IdP).%20How%20can%20I%20configure%20SAML%20to%20log%20users%20out%20of%20both%20Appian%20and%20the%20IdP%20when%20clicking%20%22Sign%20Out%22%20in%20Appian?"&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20have%20noticed%20that%20logging%20out%20of%20my%20IdP%20does%20not%20end%20my%20session%20in%20Appian.%20How%20can%20I%20configure%20this%20to%20end%20my%20session%20in%20Appian%20too?"&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#relaystate"&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Why%20does%20a%20process%20model%20published%20as%20web%20service%20fail%20after%20configuring%20SAML?"&gt;Why does a process model published as web service fail after configuring SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20see%20%22Authentication%20was%20successful%22%20in%20the%20SAML%20test%20window,%20but%20admin%20console%20says%20%22Login%20failed...%22.%20Why%20is%20this?"&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20purpose%20of%20the%20checkbox%20called%20%22Use%20Identity%20Provider&amp;#39;s%20login%20page%22?"&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#saml-user-in-multiple-SAML-groups"&gt;Can I have a SAML user in multiple SAML groups?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#samlfields"&gt;What fields need to be included in the SAML Assertion?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Why%20does%20accessing%20a%20servlet%20plug-in%20or%20web%20API%20fail,%20even%20when%20using%20credentials%20of%20a%20user%20who%20isn&amp;#39;t%20in%20the%20SAML%20users%20group?"&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20should%20we%20set%20the%20%22common%20name%22%20to%20be%20when%20generating%20a%20certificate?"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20private%20key%20used%20for%20when%20generating%20the%20certificate?"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Can%20the%20certificate%20be%20signed%20by%20any%20trusted%20Certificate%20Authority%20(CA),%20like%20our%20internal%20Microsoft%20CA,%20or%20does%20it%20need%20to%20be%20a%20mutually-trusted%20cert,%20like%20Symantec%20or%20other%20CA?"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Does%20Appian%20support%20encrypted%20SAML%20assertions?"&gt;Does Appian support encrypted SAML assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20dropdown%20called%20%22Authentication%20Method%22?"&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#customlogout"&gt;Is a custom logout page supported in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Common SAML Certificate Questions
&lt;ul&gt;
&lt;li&gt;&lt;a href="#commonname"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#privatekey"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#encryptionandkeysize"&gt;What are the supported encryption algorithms and key sizes for the SP Signing certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#trustedauthority"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted certificate, such as a certificate signed by Symantec or another CA?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Common SAML Testing&amp;nbsp;Issues&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;/strong&gt;&lt;a href="#The-user-tested-with-was-invalid"&gt;The user tested with was invalid&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Unexpected-error-occurred-during-SAML-auth-test"&gt;&lt;span&gt;Unexpected error occurred during SAML authentication test&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Assertion-failed-security-policy-check"&gt;&lt;span&gt;Assertion failed security policy check&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#You-must-test-as-your-current-appian-user"&gt;&lt;span&gt;You must test as your current Appian user&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#failed-to-decode-assertion"&gt;&lt;span&gt;Failed to decode assertion&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#saml-testing-on-cloud-sites-redirect-to-appian.com"&gt;SAML test on Appian Cloud sites redirect to Appian.com&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Common SAML Questions&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the Service Provider Certificate and where can I find it?"&gt;&lt;/a&gt;What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" rel="noopener noreferrer" target="_blank"&gt;KB-1108&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Appian is the service provider. Why do customers provide the service provider certificate?"&gt;&lt;/a&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Once the service provider certificate is generated, how should this be integrated with the identity provider?"&gt;&lt;/a&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The public key is provided as part of the service provider metadata. It is necessary to provide the service provider metadata file to the IdP team to be uploaded per the IdP&amp;#39;s documentation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?"&gt;&lt;/a&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;ACS and SLO&amp;nbsp;URLs can be found in the Service Provider (SP) metadata file that is generated in the Admin Console during SAML setup. To generate the SP metadata file, follow the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#how-to-add-a-saml-identity-provider" rel="nofollow noopener noreferrer" target="_blank"&gt;How to Add a SAML Identity Provider&lt;/a&gt;&amp;nbsp;instructions. After completing steps 1-7, the SP metadata file is generated in step 8. The URLs are in this generated file, which needs to be uploaded to the IdP.&lt;/p&gt;
&lt;p&gt;If your IdP does not have a field&amp;nbsp;to upload the SP metadata file, please refer to the following question.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?"&gt;&lt;/a&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag.&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?"&gt;&lt;/a&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To&amp;nbsp;sign the user out of both Appian AND the IdP entity, this is the corresponding flow (the single logout service must be defined):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;If a Single Log Out (SLO) service is defined in the IdP metadata, Appian will send a logout request to the specified logout URL when the &amp;quot;Sign Out&amp;quot; button is clicked in Appian.&lt;/li&gt;
&lt;li&gt;The IdP needs to process the logout request and send a successful logout response to Appian.&lt;/li&gt;
&lt;li&gt;After Appian receives a successful response from the IdP, Appian terminates the user&amp;#39;s session.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If there is no SLO URL defined in the IdP metadata file, then the Appian &amp;quot;Sign Out&amp;quot; button will only end the user&amp;#39;s Appian session. This is because Appian has not been instructed to send the logout request to another entity (e.g. the IdP). In other words, if the IdP wants Appian to contact it upon logout, it is upon the IdP to expose the single logout service, as Appian does not have control over ending user sessions for another entity. This behavior is in line with the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="http://saml.xml.org/saml-specifications" rel="nofollow noopener noreferrer" target="_blank"&gt;SAML 2.0 specifications&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?"&gt;&lt;/a&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When logging out of the IdP, it is necessary for the IdP to then send a valid logout request to Appian. Once Appian receives a valid logout request from the IdP, Appian will terminate the user&amp;#39;s session.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="relaystate"&gt;&lt;/a&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, Appian does not support the use of the &amp;quot;RelayState&amp;quot; parameter. To set up a redirect to a specified URL, provide the URL in the &amp;#39;inResponseTo&amp;#39; parameter.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does a process model published as web service fail after configuring SAML?"&gt;&lt;/a&gt;Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;do not&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?"&gt;&lt;/a&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the purpose of the checkbox called &amp;quot;Use Identity Provider's login page&amp;quot;?"&gt;&lt;/a&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;?signin=[identifier]&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;to the site URL, where&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;identifier&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a id="saml-user-in-multiple-SAML-groups"&gt;&lt;/a&gt;Can I have a SAML user in multiple SAML groups?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;It is not recommended to have a user in more than one SAML group. The only supported use case for a user in multiple SAML groups is for failover purposes. However, a user will only be able to authenticate with the configuration listed higher in the&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#identity-provider-ordering"&gt;Identity Provider Ordering&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="samlfields"&gt;&lt;/a&gt;What fields need to be included in the SAML Assertion?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian always requires the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-location"&gt;NameID&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;or&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-attribute"&gt;username&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;attribute to be provided based on which&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-location"&gt;Username Location&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is selected in the&amp;nbsp;SAML configuration. If&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#create-new-users-upon-sign-in"&gt;Create New Users Upon Sign-In&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is also selected, Appian requires the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#email-attribute"&gt;email&lt;/a&gt;,&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#first-name-attribute"&gt;first name&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#last-name-attribute"&gt;last name&lt;/a&gt;&amp;nbsp;attributes as well. These required fields&amp;nbsp;are equivalent to &amp;quot;Claim Rules&amp;quot; used by some Identity Providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn't in the SAML users group?"&gt;&lt;/a&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the private key used for when generating the certificate?"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Does Appian support encrypted SAML assertions?"&gt;&lt;/a&gt;Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, self-managed environments will need to be running OpenJDK 8 or have the JCE security JAR installed for the Oracle Java JDK. Once the JCE security JAR is installed, perform the following steps in the Appian self-managed environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Starting_and_Stopping_Appian.html" rel="noopener noreferrer" target="_blank"&gt;Restart Appian&lt;/a&gt;, so that it picks up the newly installed JCE security JAR.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the dropdown called &amp;quot;Authentication Method&amp;quot;?"&gt;&lt;/a&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="customlogout"&gt;&lt;/a&gt;Is a custom logout page supported in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no out-of-the-box configuration in Appian to redirect users to a logout page other than the Appian logout page. Check with your IdP to see if the IdP has functionality that can redirect users upon logout from Appian.&lt;/p&gt;
&lt;h3&gt;Common SAML Certificate Questions&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="commonname"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The common name can be any desired value. There is no restriction on common name from the Appian side.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="privatekey"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The private key will only be used for signing SAML assertions. It will NOT be used for SSL encryption for HTTPS communications.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="encryptionandkeysize"&gt;&lt;/a&gt;What are the supported encryption algorithms and key sizes for the SP Signing certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Due to the wide variety of encryption algorithms and key size combination available, Appian recommends customers test encryption algorithm and key size combinations for compatibility.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="trustedauthority"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted certificate, such as a certificate signed by Symantec or another CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA-signed certificate from the Appian side. For a production environment, Appian Technical Support recommends using a CA signed certificate.&lt;/p&gt;
&lt;h3&gt;Common SAML Testing issues&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="The-user-tested-with-was-invalid"&gt;&lt;/a&gt;The user tested with was invalid&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;Username attribute was correctly configured but&amp;nbsp;does not contain a valid Appian user as its&amp;nbsp;value did not match any usernames&amp;nbsp;within Appian. Please note that usernames are case sensitive.&amp;nbsp;See &lt;a href="/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#gather-saml-trace"&gt;KB-1450&lt;/a&gt;&amp;nbsp;for how to gather a SAML trace to&amp;nbsp;identify the Appian username shown in the SAML assertion.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Unexpected-error-occurred-during-SAML-auth-test"&gt;&lt;/a&gt;Unexpected error occurred during SAML authentication test&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Please review&amp;nbsp;the application server log for more information about the error:&lt;code&gt;&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;SAML Assertion contained no valid Username&lt;/code&gt; -&amp;nbsp;The username attribute was not found in the SAML assertion. Please make sure the correct attribute name is being sent from your&amp;nbsp;IdP and that there are no leading/trailing spaces.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;java.lang.IllegalArgumentException: Given URL is not well formed&lt;/code&gt;&amp;nbsp;-&amp;nbsp;The SAML response URL is empty or invalid. Make sure your&amp;nbsp;IdP settings&amp;nbsp;have the correct URL for the SAML endpoint configured.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;java.lang.IndexOutOfBoundsException: Index: 0&lt;/code&gt; - The SAML assertion did not return with a subject that Appian was expecting.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Assertion-failed-security-policy-check"&gt;&lt;/a&gt;Assertion failed security policy check&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The date-time of the Service Provider and Identity Provider do not match. Please make sure that the server times&amp;nbsp;on both ends&amp;nbsp;are synchronized. Appian will check the timestamps in SAML assertions to make sure they are not stale.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="You-must-test-as-your-current-appian-user"&gt;&lt;/a&gt;You must test as your current Appian user&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Your IdP username and Appian username&amp;nbsp;do not match.&amp;nbsp;Please make sure that the&amp;nbsp;user testing the SAML configuration&amp;nbsp;has an account on your&amp;nbsp;IdP side, and&amp;nbsp;that the username attribute value from the SAML assertion matches the user&amp;#39;s Appian username.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="failed-to-decode-assertion"&gt;&lt;/a&gt;Failed to decode assertion&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The application server log may show a message like:&lt;/p&gt;
&lt;pre&gt;SAML message intended destination endpoint &amp;#39;&lt;a href="https://xxxx.appiancloud.com/SSO/SAML2/POST" rel="noopener noreferrer" target="_blank"&gt;https://xxxx.appiancloud.com/SSO/SAML2/POST&lt;/a&gt;&amp;#39; did not match the recipient endpoint &amp;#39;&lt;a href="https://xxxx.appiancloud.com/suite/saml/AssertionConsumer" rel="noopener noreferrer" target="_blank"&gt;https://xxxx.appiancloud.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;#39;&lt;/pre&gt;
&lt;p&gt;Appian receives SAML responses only&amp;nbsp;at the URL &lt;code&gt;/suite/saml/AssertionConsumer&lt;/code&gt;, and your IdP may be using an older version of the SP metadata that contains the old URL. Please create a new SP connection&amp;nbsp;within your IdP&amp;nbsp;if SAML&amp;nbsp;has not been configured since Appian 7.11 or earlier.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="saml-testing-on-cloud-sites-redirect-to-appian.com"&gt;&lt;/a&gt;SAML Test on Appian Cloud sites redirect to Appian.com&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The response URL was not resolved correctly by your IdP. Please make sure that the URLs on your IdP side are valid.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: April 2021&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, integration, authentication, FAQ&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/24</link><pubDate>Mon, 12 Apr 2021 05:05:09 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 24 posted to Appian Knowledge Base by Parmida Borhani on 4/12/2021 5:05:09 AM&lt;br /&gt;
&lt;div class="content"&gt;
&lt;div class="content"&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to common questions and testing&amp;nbsp;issues regarding SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Common SAML Questions&lt;/b&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20Service%20Provider%20Certificate%20and%20where%20can%20I%20find%20it?"&gt;What is the Service Provider Certificate and where can I find it?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Appian%20is%20the%20service%20provider.%20Why%20do%20customers%20provide%20the%20service%20provider%20certificate?"&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Once%20the%20service%20provider%20certificate%20is%20generated,%20how%20should%20this%20be%20integrated%20with%20the%20identity%20provider?"&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#How%20can%20I%20find%20the%20Assertion%20Consumer%20Service%20(ACS)%20and%20Single%20Log%20Out%20(SLO)%20URLs%20to%20provide%20to%20the%20IdP?"&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#My%20identity%20provider%20does%20not%20have%20a%20field%20to%20upload%20a%20service%20provider%20metadata%20file.%20How%20do%20I%20configure%20SAML?"&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20have%20noticed%20that%20clicking%20%22Sign%20Out%22%20button%20in%20Appian%20is%20only%20logging%20users%20out%20of%20Appian%20(not%20the%20IdP).%20How%20can%20I%20configure%20SAML%20to%20log%20users%20out%20of%20both%20Appian%20and%20the%20IdP%20when%20clicking%20%22Sign%20Out%22%20in%20Appian?"&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20have%20noticed%20that%20logging%20out%20of%20my%20IdP%20does%20not%20end%20my%20session%20in%20Appian.%20How%20can%20I%20configure%20this%20to%20end%20my%20session%20in%20Appian%20too?"&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#relaystate"&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Why%20does%20a%20process%20model%20published%20as%20web%20service%20fail%20after%20configuring%20SAML?"&gt;Why does a process model published as web service fail after configuring SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20see%20%22Authentication%20was%20successful%22%20in%20the%20SAML%20test%20window,%20but%20admin%20console%20says%20%22Login%20failed...%22.%20Why%20is%20this?"&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20purpose%20of%20the%20checkbox%20called%20%22Use%20Identity%20Provider&amp;#39;s%20login%20page%22?"&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#saml-user-in-multiple-SAML-groups"&gt;Can I have a SAML user in multiple SAML groups?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#samlfields"&gt;What fields need to be included in the SAML Assertion?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Why%20does%20accessing%20a%20servlet%20plug-in%20or%20web%20API%20fail,%20even%20when%20using%20credentials%20of%20a%20user%20who%20isn&amp;#39;t%20in%20the%20SAML%20users%20group?"&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20should%20we%20set%20the%20%22common%20name%22%20to%20be%20when%20generating%20a%20certificate?"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20private%20key%20used%20for%20when%20generating%20the%20certificate?"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Can%20the%20certificate%20be%20signed%20by%20any%20trusted%20Certificate%20Authority%20(CA),%20like%20our%20internal%20Microsoft%20CA,%20or%20does%20it%20need%20to%20be%20a%20mutually-trusted%20cert,%20like%20Symantec%20or%20other%20CA?"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Does%20Appian%20support%20encrypted%20SAML%20assertions?"&gt;Does Appian support encrypted SAML assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20dropdown%20called%20%22Authentication%20Method%22?"&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#customlogout"&gt;Is a custom logout page supported in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Common SAML Certificate Questions&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#commonname"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#privatekey"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#encryptionandkeysize"&gt;What are the supported encryption algorithms and key sizes for the SP Signing certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#trustedauthority"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted certificate, such as a certificate signed by Symantec or another CA?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Common SAML Testing&amp;nbsp;Issues&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;/strong&gt;&lt;a href="#The-user-tested-with-was-invalid"&gt;The user tested with was invalid&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Unexpected-error-occurred-during-SAML-auth-test"&gt;&lt;span&gt;Unexpected error occurred during SAML authentication test&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Assertion-failed-security-policy-check"&gt;&lt;span&gt;Assertion failed security policy check&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#You-must-test-as-your-current-appian-user"&gt;&lt;span&gt;You must test as your current Appian user&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#failed-to-decode-assertion"&gt;&lt;span&gt;Failed to decode assertion&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#saml-testing-on-cloud-sites-redirect-to-appian.com"&gt;SAML test on Appian Cloud sites redirect to Appian.com&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Common SAML Questions&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the Service Provider Certificate and where can I find it?"&gt;&lt;/a&gt;What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" rel="noopener noreferrer" target="_blank"&gt;KB-1108&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Appian is the service provider. Why do customers provide the service provider certificate?"&gt;&lt;/a&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Once the service provider certificate is generated, how should this be integrated with the identity provider?"&gt;&lt;/a&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The public key is provided as part of the service provider metadata. It is necessary to provide the service provider metadata file to the IdP team to be uploaded per the IdP&amp;#39;s documentation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?"&gt;&lt;/a&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;ACS and SLO&amp;nbsp;URLs can be found in the Service Provider (SP) metadata file that is generated in the Admin Console during SAML setup. To generate the SP metadata file, follow the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#how-to-add-a-saml-identity-provider" rel="nofollow noopener noreferrer" target="_blank"&gt;How to Add a SAML Identity Provider&lt;/a&gt;&amp;nbsp;instructions. After completing steps 1-7, the SP metadata file is generated in step 8. The URLs are in this generated file, which needs to be uploaded to the IdP.&lt;/p&gt;
&lt;p&gt;If your IdP does not have a field&amp;nbsp;to upload the SP metadata file, please refer to the following question.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?"&gt;&lt;/a&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag.&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?"&gt;&lt;/a&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To&amp;nbsp;sign the user out of both Appian AND the IdP entity, this is the corresponding flow (the single logout service must be defined):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;If a Single Log Out (SLO) service is defined in the IdP metadata, Appian will send a logout request to the specified logout URL when the &amp;quot;Sign Out&amp;quot; button is clicked in Appian.&lt;/li&gt;
&lt;li&gt;The IdP needs to process the logout request and send a successful logout response to Appian.&lt;/li&gt;
&lt;li&gt;After Appian receives a successful response from the IdP, Appian terminates the user&amp;#39;s session.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If there is no SLO URL defined in the IdP metadata file, then the Appian &amp;quot;Sign Out&amp;quot; button will only end the user&amp;#39;s Appian session. This is because Appian has not been instructed to send the logout request to another entity (e.g. the IdP). In other words, if the IdP wants Appian to contact it upon logout, it is upon the IdP to expose the single logout service, as Appian does not have control over ending user sessions for another entity. This behavior is in line with the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="http://saml.xml.org/saml-specifications" rel="nofollow noopener noreferrer" target="_blank"&gt;SAML 2.0 specifications&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?"&gt;&lt;/a&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When logging out of the IdP, it is necessary for the IdP to then send a valid logout request to Appian. Once Appian receives a valid logout request from the IdP, Appian will terminate the user&amp;#39;s session.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="relaystate"&gt;&lt;/a&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, Appian does not support the use of the &amp;quot;RelayState&amp;quot; parameter. To set up a redirect to a specified URL, provide the URL in the &amp;#39;inResponseTo&amp;#39; parameter.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does a process model published as web service fail after configuring SAML?"&gt;&lt;/a&gt;Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;do not&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?"&gt;&lt;/a&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the purpose of the checkbox called &amp;quot;Use Identity Provider's login page&amp;quot;?"&gt;&lt;/a&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;?signin=[identifier]&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;to the site URL, where&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;identifier&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a id="saml-user-in-multiple-SAML-groups"&gt;&lt;/a&gt;Can I have a SAML user in multiple SAML groups?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;It is not recommended to have a user in more than one SAML group. The only supported use case for a user in multiple SAML groups is for failover purposes. However, a user will only be able to authenticate with the configuration listed higher in the&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#identity-provider-ordering"&gt;Identity Provider Ordering&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="samlfields"&gt;&lt;/a&gt;What fields need to be included in the SAML Assertion?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian always requires the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-location"&gt;NameID&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;or&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-attribute"&gt;username&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;attribute to be provided based on which&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-location"&gt;Username Location&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is selected in the&amp;nbsp;SAML configuration. If&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#create-new-users-upon-sign-in"&gt;Create New Users Upon Sign-In&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is also selected, Appian requires the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#email-attribute"&gt;email&lt;/a&gt;,&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#first-name-attribute"&gt;first name&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#last-name-attribute"&gt;last name&lt;/a&gt;&amp;nbsp;attributes as well. These required fields&amp;nbsp;are equivalent to &amp;quot;Claim Rules&amp;quot; used by some Identity Providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn't in the SAML users group?"&gt;&lt;/a&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the private key used for when generating the certificate?"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Does Appian support encrypted SAML assertions?"&gt;&lt;/a&gt;Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, self-managed environments will need to be running OpenJDK 8 or have the JCE security JAR installed for the Oracle Java JDK. Once the JCE security JAR is installed, perform the following steps in the Appian self-managed environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Starting_and_Stopping_Appian.html" rel="noopener noreferrer" target="_blank"&gt;Restart Appian&lt;/a&gt;, so that it picks up the newly installed JCE security JAR.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the dropdown called &amp;quot;Authentication Method&amp;quot;?"&gt;&lt;/a&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="customlogout"&gt;&lt;/a&gt;Is a custom logout page supported in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no out-of-the-box configuration in Appian to redirect users to a logout page other than the Appian logout page. Check with your IdP to see if the IdP has functionality that can redirect users upon logout from Appian.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Common SAML Certificate Questions&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="commonname"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The common name can be any desired value. There is no restriction on common name from the Appian side.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="privatekey"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The private key will only be used for signing SAML assertions. It will NOT be used for SSL encryption for HTTPS communications.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="encryptionandkeysize"&gt;&lt;/a&gt;What are the supported encryption algorithms and key sizes for the SP Signing certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Due to the wide variety of encryption algorithms and key size combination available, Appian recommends customers test encryption algorithm and key size combinations for compatibility.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="trustedauthority"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted certificate, such as a certificate signed by Symantec or another CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA-signed certificate from the Appian side. For a production environment, Appian Technical Support recommends using a CA signed certificate.&lt;/p&gt;
&lt;h3&gt;Common SAML Testing issues&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="The-user-tested-with-was-invalid"&gt;&lt;/a&gt;The user tested with was invalid&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;Username attribute was correctly configured but&amp;nbsp;does not contain a valid Appian user as its&amp;nbsp;value did not match any usernames&amp;nbsp;within Appian. Please note that usernames are case sensitive.&amp;nbsp;See &lt;a href="/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#gather-saml-trace"&gt;KB-1450&lt;/a&gt;&amp;nbsp;for how to gather a SAML trace to&amp;nbsp;identify the Appian username shown in the SAML assertion.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Unexpected-error-occurred-during-SAML-auth-test"&gt;&lt;/a&gt;Unexpected error occurred during SAML authentication test&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Please review&amp;nbsp;the application server log for more information about the error:&lt;code&gt;&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;SAML Assertion contained no valid Username&lt;/code&gt; -&amp;nbsp;The username attribute was not found in the SAML assertion. Please make sure the correct attribute name is being sent from your&amp;nbsp;IdP and that there are no leading/trailing spaces.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;java.lang.IllegalArgumentException: Given URL is not well formed&lt;/code&gt;&amp;nbsp;-&amp;nbsp;The SAML response URL is empty or invalid. Make sure your&amp;nbsp;IdP settings&amp;nbsp;have the correct URL for the SAML endpoint configured.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;java.lang.IndexOutOfBoundsException: Index: 0&lt;/code&gt; - The SAML assertion did not return with a subject that Appian was expecting.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Assertion-failed-security-policy-check"&gt;&lt;/a&gt;Assertion failed security policy check&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The date-time of the Service Provider and Identity Provider do not match. Please make sure that the server times&amp;nbsp;on both ends&amp;nbsp;are synchronized. Appian will check the timestamps in SAML assertions to make sure they are not stale.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="You-must-test-as-your-current-appian-user"&gt;&lt;/a&gt;You must test as your current Appian user&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Your IdP username and Appian username&amp;nbsp;do not match.&amp;nbsp;Please make sure that the&amp;nbsp;user testing the SAML configuration&amp;nbsp;has an account on your&amp;nbsp;IdP side, and&amp;nbsp;that the username attribute value from the SAML assertion matches the user&amp;#39;s Appian username.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="failed-to-decode-assertion"&gt;&lt;/a&gt;Failed to decode assertion&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The application server log may show a message like:&lt;/p&gt;
&lt;pre&gt;SAML message intended destination endpoint &amp;#39;&lt;a href="https://xxxx.appiancloud.com/SSO/SAML2/POST" rel="noopener noreferrer" target="_blank"&gt;https://xxxx.appiancloud.com/SSO/SAML2/POST&lt;/a&gt;&amp;#39; did not match the recipient endpoint &amp;#39;&lt;a href="https://xxxx.appiancloud.com/suite/saml/AssertionConsumer" rel="noopener noreferrer" target="_blank"&gt;https://xxxx.appiancloud.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;#39;&lt;/pre&gt;
&lt;p&gt;Appian receives SAML responses only&amp;nbsp;at the URL &lt;code&gt;/suite/saml/AssertionConsumer&lt;/code&gt;, and your IdP may be using an older version of the SP metadata that contains the old URL. Please create a new SP connection&amp;nbsp;within your IdP&amp;nbsp;if SAML&amp;nbsp;has not been configured since Appian 7.11 or earlier.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="saml-testing-on-cloud-sites-redirect-to-appian.com"&gt;&lt;/a&gt;SAML Test on Appian Cloud sites redirect to Appian.com&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The response URL was not resolved correctly by your IdP. Please make sure that the URLs on your IdP side are valid.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: April 2021&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, integration, authentication, FAQ&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/23</link><pubDate>Fri, 15 Jan 2021 17:33:09 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 23 posted to Appian Knowledge Base by Elly Meng on 1/15/2021 5:33:09 PM&lt;br /&gt;
&lt;div class="content"&gt;
&lt;div class="content"&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to common questions and testing&amp;nbsp;issues regarding SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Common SAML Questions&lt;/b&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20Service%20Provider%20Certificate%20and%20where%20can%20I%20find%20it?"&gt;What is the Service Provider Certificate and where can I find it?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Appian%20is%20the%20service%20provider.%20Why%20do%20customers%20provide%20the%20service%20provider%20certificate?"&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Once%20the%20service%20provider%20certificate%20is%20generated,%20how%20should%20this%20be%20integrated%20with%20the%20identity%20provider?"&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#How%20can%20I%20find%20the%20Assertion%20Consumer%20Service%20(ACS)%20and%20Single%20Log%20Out%20(SLO)%20URLs%20to%20provide%20to%20the%20IdP?"&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#My%20identity%20provider%20does%20not%20have%20a%20field%20to%20upload%20a%20service%20provider%20metadata%20file.%20How%20do%20I%20configure%20SAML?"&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20have%20noticed%20that%20clicking%20%22Sign%20Out%22%20button%20in%20Appian%20is%20only%20logging%20users%20out%20of%20Appian%20(not%20the%20IdP).%20How%20can%20I%20configure%20SAML%20to%20log%20users%20out%20of%20both%20Appian%20and%20the%20IdP%20when%20clicking%20%22Sign%20Out%22%20in%20Appian?"&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20have%20noticed%20that%20logging%20out%20of%20my%20IdP%20does%20not%20end%20my%20session%20in%20Appian.%20How%20can%20I%20configure%20this%20to%20end%20my%20session%20in%20Appian%20too?"&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#relaystate"&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Why%20does%20a%20process%20model%20published%20as%20web%20service%20fail%20after%20configuring%20SAML?"&gt;Why does a process model published as web service fail after configuring SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20see%20%22Authentication%20was%20successful%22%20in%20the%20SAML%20test%20window,%20but%20admin%20console%20says%20%22Login%20failed...%22.%20Why%20is%20this?"&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20purpose%20of%20the%20checkbox%20called%20%22Use%20Identity%20Provider&amp;#39;s%20login%20page%22?"&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#saml-user-in-multiple-SAML-groups"&gt;Can I have a SAML user in multiple SAML groups?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#samlfields"&gt;What fields need to be included in the SAML Assertion?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Why%20does%20accessing%20a%20servlet%20plug-in%20or%20web%20API%20fail,%20even%20when%20using%20credentials%20of%20a%20user%20who%20isn&amp;#39;t%20in%20the%20SAML%20users%20group?"&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20should%20we%20set%20the%20%22common%20name%22%20to%20be%20when%20generating%20a%20certificate?"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20private%20key%20used%20for%20when%20generating%20the%20certificate?"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Can%20the%20certificate%20be%20signed%20by%20any%20trusted%20Certificate%20Authority%20(CA),%20like%20our%20internal%20Microsoft%20CA,%20or%20does%20it%20need%20to%20be%20a%20mutually-trusted%20cert,%20like%20Symantec%20or%20other%20CA?"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Does%20Appian%20support%20encrypted%20SAML%20assertions?"&gt;Does Appian support encrypted SAML assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20dropdown%20called%20%22Authentication%20Method%22?"&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#customlogout"&gt;Is a custom logout page supported in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Common SAML Testing&amp;nbsp;Issues&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;/strong&gt;&lt;a href="#The-user-tested-with-was-invalid"&gt;The user tested with was invalid&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Unexpected-error-occurred-during-SAML-auth-test"&gt;&lt;span&gt;Unexpected error occurred during SAML authentication test&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Assertion-failed-security-policy-check"&gt;&lt;span&gt;Assertion failed security policy check&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#You-must-test-as-your-current-appian-user"&gt;&lt;span&gt;You must test as your current Appian user&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#failed-to-decode-assertion"&gt;&lt;span&gt;Failed to decode assertion&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#saml-testing-on-cloud-sites-redirect-to-appian.com"&gt;SAML test on Appian Cloud sites redirect to Appian.com&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Common SAML Questions&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the Service Provider Certificate and where can I find it?"&gt;&lt;/a&gt;What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" rel="noopener noreferrer" target="_blank"&gt;KB-1108&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Appian is the service provider. Why do customers provide the service provider certificate?"&gt;&lt;/a&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Once the service provider certificate is generated, how should this be integrated with the identity provider?"&gt;&lt;/a&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The public key is provided as part of the service provider metadata. It is necessary to provide the service provider metadata file to the IdP team to be uploaded per the IdP&amp;#39;s documentation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?"&gt;&lt;/a&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;ACS and SLO&amp;nbsp;URLs can be found in the Service Provider (SP) metadata file that is generated in the Admin Console during SAML setup. To generate the SP metadata file, follow the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#how-to-add-a-saml-identity-provider" rel="nofollow noopener noreferrer" target="_blank"&gt;How to Add a SAML Identity Provider&lt;/a&gt;&amp;nbsp;instructions. After completing steps 1-7, the SP metadata file is generated in step 8. The URLs are in this generated file, which needs to be uploaded to the IdP.&lt;/p&gt;
&lt;p&gt;If your IdP does not have a field&amp;nbsp;to upload the SP metadata file, please refer to the following question.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?"&gt;&lt;/a&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag.&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?"&gt;&lt;/a&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To&amp;nbsp;sign the user out of both Appian AND the IdP entity, this is the corresponding flow (the single logout service must be defined):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;If a Single Log Out (SLO) service is defined in the IdP metadata, Appian will send a logout request to the specified logout URL when the &amp;quot;Sign Out&amp;quot; button is clicked in Appian.&lt;/li&gt;
&lt;li&gt;The IdP needs to process the logout request and send a successful logout response to Appian.&lt;/li&gt;
&lt;li&gt;After Appian receives a successful response from the IdP, Appian terminates the user&amp;#39;s session.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If there is no SLO URL defined in the IdP metadata file, then the Appian &amp;quot;Sign Out&amp;quot; button will only end the user&amp;#39;s Appian session. This is because Appian has not been instructed to send the logout request to another entity (e.g. the IdP). In other words, if the IdP wants Appian to contact it upon logout, it is upon the IdP to expose the single logout service, as Appian does not have control over ending user sessions for another entity. This behavior is in line with the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="http://saml.xml.org/saml-specifications" rel="nofollow noopener noreferrer" target="_blank"&gt;SAML 2.0 specifications&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?"&gt;&lt;/a&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When logging out of the IdP, it is necessary for the IdP to then send a valid logout request to Appian. Once Appian receives a valid logout request from the IdP, Appian will terminate the user&amp;#39;s session.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="relaystate"&gt;&lt;/a&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, Appian does not support the use of the &amp;quot;RelayState&amp;quot; parameter. To set up a redirect to a specified URL, provide the URL in the &amp;#39;inResponseTo&amp;#39; parameter.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does a process model published as web service fail after configuring SAML?"&gt;&lt;/a&gt;Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;do not&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?"&gt;&lt;/a&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the purpose of the checkbox called &amp;quot;Use Identity Provider's login page&amp;quot;?"&gt;&lt;/a&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;?signin=[identifier]&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;to the site URL, where&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;identifier&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a id="saml-user-in-multiple-SAML-groups"&gt;&lt;/a&gt;Can I have a SAML user in multiple SAML groups?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;It is not recommended to have a user in more than one SAML group. The only supported use case for a user in multiple SAML groups is for failover purposes. However, a user will only be able to authenticate with the configuration listed higher in the&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#identity-provider-ordering"&gt;Identity Provider Ordering&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="samlfields"&gt;&lt;/a&gt;What fields need to be included in the SAML Assertion?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian always requires the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-location"&gt;NameID&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;or&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-attribute"&gt;username&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;attribute to be provided based on which&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-location"&gt;Username Location&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is selected in the&amp;nbsp;SAML configuration. If&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#create-new-users-upon-sign-in"&gt;Create New Users Upon Sign-In&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is also selected, Appian requires the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#email-attribute"&gt;email&lt;/a&gt;,&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#first-name-attribute"&gt;first name&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#last-name-attribute"&gt;last name&lt;/a&gt;&amp;nbsp;attributes as well. These required fields&amp;nbsp;are equivalent to &amp;quot;Claim Rules&amp;quot; used by some Identity Providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn't in the SAML users group?"&gt;&lt;/a&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the private key used for when generating the certificate?"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Does Appian support encrypted SAML assertions?"&gt;&lt;/a&gt;Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, self-managed environments will need to be running OpenJDK 8 or have the JCE security JAR installed for the Oracle Java JDK. Once the JCE security JAR is installed, perform the following steps in the Appian self-managed environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Starting_and_Stopping_Appian.html" rel="noopener noreferrer" target="_blank"&gt;Restart Appian&lt;/a&gt;, so that it picks up the newly installed JCE security JAR.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the dropdown called &amp;quot;Authentication Method&amp;quot;?"&gt;&lt;/a&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="customlogout"&gt;&lt;/a&gt;Is a custom logout page supported in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no out-of-the-box configuration in Appian to redirect users to a logout page other than the Appian logout page. Check with your IdP to see if the IdP has functionality that can redirect users upon logout from Appian.&lt;/p&gt;
&lt;h3&gt;Common SAML Testing issues&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="The-user-tested-with-was-invalid"&gt;&lt;/a&gt;The user tested with was invalid&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;Username attribute was correctly configured but&amp;nbsp;does not contain a valid Appian user as its&amp;nbsp;value did not match any usernames&amp;nbsp;within Appian. Please note that usernames are case sensitive.&amp;nbsp;See &lt;a href="/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#gather-saml-trace"&gt;KB-1450&lt;/a&gt;&amp;nbsp;for how to gather a SAML trace to&amp;nbsp;identify the Appian username shown in the SAML assertion.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Unexpected-error-occurred-during-SAML-auth-test"&gt;&lt;/a&gt;Unexpected error occurred during SAML authentication test&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Please review&amp;nbsp;the application server log for more information about the error:&lt;code&gt;&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;SAML Assertion contained no valid Username&lt;/code&gt; -&amp;nbsp;The username attribute was not found in the SAML assertion. Please make sure the correct attribute name is being sent from your&amp;nbsp;IdP and that there are no leading/trailing spaces.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;java.lang.IllegalArgumentException: Given URL is not well formed&lt;/code&gt;&amp;nbsp;-&amp;nbsp;The SAML response URL is empty or invalid. Make sure your&amp;nbsp;IdP settings&amp;nbsp;have the correct URL for the SAML endpoint configured.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;java.lang.IndexOutOfBoundsException: Index: 0&lt;/code&gt; - The SAML assertion did not return with a subject that Appian was expecting.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Assertion-failed-security-policy-check"&gt;&lt;/a&gt;Assertion failed security policy check&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The date-time of the Service Provider and Identity Provider do not match. Please make sure that the server times&amp;nbsp;on both ends&amp;nbsp;are synchronized. Appian will check the timestamps in SAML assertions to make sure they are not stale.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="You-must-test-as-your-current-appian-user"&gt;&lt;/a&gt;You must test as your current Appian user&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Your IdP username and Appian username&amp;nbsp;do not match.&amp;nbsp;Please make sure that the&amp;nbsp;user testing the SAML configuration&amp;nbsp;has an account on your&amp;nbsp;IdP side, and&amp;nbsp;that the username attribute value from the SAML assertion matches the user&amp;#39;s Appian username.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="failed-to-decode-assertion"&gt;&lt;/a&gt;Failed to decode assertion&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The application server log may show a message like:&lt;/p&gt;
&lt;pre&gt;SAML message intended destination endpoint &amp;#39;&lt;a href="https://xxxx.appiancloud.com/SSO/SAML2/POST" rel="noopener noreferrer" target="_blank"&gt;https://xxxx.appiancloud.com/SSO/SAML2/POST&lt;/a&gt;&amp;#39; did not match the recipient endpoint &amp;#39;&lt;a href="https://xxxx.appiancloud.com/suite/saml/AssertionConsumer" rel="noopener noreferrer" target="_blank"&gt;https://xxxx.appiancloud.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;#39;&lt;/pre&gt;
&lt;p&gt;Appian receives SAML responses only&amp;nbsp;at the URL &lt;code&gt;/suite/saml/AssertionConsumer&lt;/code&gt;, and your IdP may be using an older version of the SP metadata that contains the old URL. Please create a new SP connection&amp;nbsp;within your IdP&amp;nbsp;if SAML&amp;nbsp;has not been configured since Appian 7.11 or earlier.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="saml-testing-on-cloud-sites-redirect-to-appian.com"&gt;&lt;/a&gt;SAML Test on Appian Cloud sites redirect to Appian.com&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The response URL was not resolved correctly by your IdP. Please make sure that the URLs on your IdP side are valid.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;January 2021&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, integration, authentication, FAQ&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/22</link><pubDate>Fri, 25 Sep 2020 15:59:02 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>April Schuppel</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 22 posted to Appian Knowledge Base by April Schuppel on 9/25/2020 3:59:02 PM&lt;br /&gt;
&lt;div class="content"&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20Service%20Provider%20Certificate%20and%20where%20can%20I%20find%20it?"&gt;What is the Service Provider Certificate and where can I find it?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Appian%20is%20the%20service%20provider.%20Why%20do%20customers%20provide%20the%20service%20provider%20certificate?"&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Once%20the%20service%20provider%20certificate%20is%20generated,%20how%20should%20this%20be%20integrated%20with%20the%20identity%20provider?"&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#How%20can%20I%20find%20the%20Assertion%20Consumer%20Service%20(ACS)%20and%20Single%20Log%20Out%20(SLO)%20URLs%20to%20provide%20to%20the%20IdP?"&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#My%20identity%20provider%20does%20not%20have%20a%20field%20to%20upload%20a%20service%20provider%20metadata%20file.%20How%20do%20I%20configure%20SAML?"&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20have%20noticed%20that%20clicking%20%22Sign%20Out%22%20button%20in%20Appian%20is%20only%20logging%20users%20out%20of%20Appian%20(not%20the%20IdP).%20How%20can%20I%20configure%20SAML%20to%20log%20users%20out%20of%20both%20Appian%20and%20the%20IdP%20when%20clicking%20%22Sign%20Out%22%20in%20Appian?"&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20have%20noticed%20that%20logging%20out%20of%20my%20IdP%20does%20not%20end%20my%20session%20in%20Appian.%20How%20can%20I%20configure%20this%20to%20end%20my%20session%20in%20Appian%20too?"&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#relaystate"&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Why%20does%20a%20process%20model%20published%20as%20web%20service%20fail%20after%20configuring%20SAML?"&gt;Why does a process model published as web service fail after configuring SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20see%20%22Authentication%20was%20successful%22%20in%20the%20SAML%20test%20window,%20but%20admin%20console%20says%20%22Login%20failed...%22.%20Why%20is%20this?"&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20purpose%20of%20the%20checkbox%20called%20%22Use%20Identity%20Provider&amp;#39;s%20login%20page%22?"&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#saml-user-in-multiple-SAML-groups"&gt;Can I have a SAML user in multiple SAML groups?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#samlfields"&gt;What fields need to be included in the SAML Assertion?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Why%20does%20accessing%20a%20servlet%20plug-in%20or%20web%20API%20fail,%20even%20when%20using%20credentials%20of%20a%20user%20who%20isn&amp;#39;t%20in%20the%20SAML%20users%20group?"&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20should%20we%20set%20the%20%22common%20name%22%20to%20be%20when%20generating%20a%20certificate?"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20private%20key%20used%20for%20when%20generating%20the%20certificate?"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Can%20the%20certificate%20be%20signed%20by%20any%20trusted%20Certificate%20Authority%20(CA),%20like%20our%20internal%20Microsoft%20CA,%20or%20does%20it%20need%20to%20be%20a%20mutually-trusted%20cert,%20like%20Symantec%20or%20other%20CA?"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Does%20Appian%20support%20encrypted%20SAML%20assertions?"&gt;Does Appian support encrypted SAML assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20dropdown%20called%20%22Authentication%20Method%22?"&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#customlogout"&gt;Is a custom logout page supported in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the Service Provider Certificate and where can I find it?"&gt;&lt;/a&gt;What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" rel="noopener noreferrer" target="_blank"&gt;KB-1108&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Appian is the service provider. Why do customers provide the service provider certificate?"&gt;&lt;/a&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Once the service provider certificate is generated, how should this be integrated with the identity provider?"&gt;&lt;/a&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The public key is provided as part of the service provider metadata. It is necessary to provide the service provider metadata file to the IdP team to be uploaded per the IdP&amp;#39;s documentation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?"&gt;&lt;/a&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;ACS and SLO&amp;nbsp;URLs can be found in the Service Provider (SP) metadata file that is generated in the Admin Console during SAML setup. To generate the SP metadata file, follow the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#how-to-add-a-saml-identity-provider" rel="nofollow noopener noreferrer" target="_blank"&gt;How to Add a SAML Identity Provider&lt;/a&gt;&amp;nbsp;instructions. After completing steps 1-7, the SP metadata file is generated in step 8. The URLs are in this generated file, which needs to be uploaded to the IdP.&lt;/p&gt;
&lt;p&gt;If your IdP does not have a field&amp;nbsp;to upload the SP metadata file, please refer to the following question.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?"&gt;&lt;/a&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag.&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?"&gt;&lt;/a&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To&amp;nbsp;sign the user out of both Appian AND the IdP entity, this is the corresponding flow (the single logout service must be defined):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;If a Single Log Out (SLO) service is defined in the IdP metadata, Appian will send a logout request to the specified logout URL when the &amp;quot;Sign Out&amp;quot; button is clicked in Appian.&lt;/li&gt;
&lt;li&gt;The IdP needs to process the logout request and send a successful logout response to Appian.&lt;/li&gt;
&lt;li&gt;After Appian receives a successful response from the IdP, Appian terminates the user&amp;#39;s session.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If there is no SLO URL defined in the IdP metadata file, then the Appian &amp;quot;Sign Out&amp;quot; button will only end the user&amp;#39;s Appian session. This is because Appian has not been instructed to send the logout request to another entity (e.g. the IdP). In other words, if the IdP wants Appian to contact it upon logout, it is upon the IdP to expose the single logout service, as Appian does not have control over ending user sessions for another entity. This behavior is in line with the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="http://saml.xml.org/saml-specifications" rel="nofollow noopener noreferrer" target="_blank"&gt;SAML 2.0 specifications&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?"&gt;&lt;/a&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When logging out of the IdP, it is necessary for the IdP to then send a valid logout request to Appian. Once Appian receives a valid logout request from the IdP, Appian will terminate the user&amp;#39;s session.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="relaystate"&gt;&lt;/a&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, Appian does not support the use of the &amp;quot;RelayState&amp;quot; parameter. To set up a redirect to a specified URL, provide the URL in the &amp;#39;inResponseTo&amp;#39; parameter.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does a process model published as web service fail after configuring SAML?"&gt;&lt;/a&gt;Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;do not&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?"&gt;&lt;/a&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the purpose of the checkbox called &amp;quot;Use Identity Provider's login page&amp;quot;?"&gt;&lt;/a&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;?signin=[identifier]&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;to the site URL, where&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;identifier&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a id="saml-user-in-multiple-SAML-groups"&gt;&lt;/a&gt;Can I have a SAML user in multiple SAML groups?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;It is not recommended to have a user in more than one SAML group. The only supported use case for a user in multiple SAML groups is for failover purposes. However, a user will only be able to authenticate with the configuration listed higher in the&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#identity-provider-ordering"&gt;Identity Provider Ordering&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="samlfields"&gt;&lt;/a&gt;What fields need to be included in the SAML Assertion?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian always requires the &lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-location"&gt;NameID&lt;/a&gt; or &lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-attribute"&gt;username&lt;/a&gt; attribute to be provided based on which &lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-location"&gt;Username Location&lt;/a&gt; is selected in the&amp;nbsp;SAML configuration. If &lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#create-new-users-upon-sign-in"&gt;Create New Users Upon Sign-In&lt;/a&gt; is also selected, Appian requires the &lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#email-attribute"&gt;email&lt;/a&gt;, &lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#first-name-attribute"&gt;first name&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#last-name-attribute"&gt;last name&lt;/a&gt;&amp;nbsp;attributes as well. These required fields&amp;nbsp;are equivalent to &amp;quot;Claim Rules&amp;quot; used by some Identity Providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn't in the SAML users group?"&gt;&lt;/a&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the private key used for when generating the certificate?"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Does Appian support encrypted SAML assertions?"&gt;&lt;/a&gt;Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, self-managed environments will need to be running OpenJDK 8 or have the JCE security JAR installed for the Oracle Java JDK. Once the JCE security JAR is installed, perform the following steps in the Appian self-managed environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Starting_and_Stopping_Appian.html" rel="noopener noreferrer" target="_blank"&gt;Restart Appian&lt;/a&gt;, so that it picks up the newly installed JCE security JAR.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the dropdown called &amp;quot;Authentication Method&amp;quot;?"&gt;&lt;/a&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="customlogout"&gt;&lt;/a&gt;Is a custom logout page supported in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no out-of-the-box configuration in Appian to redirect users to a logout page other than the Appian logout page. Check with your IdP to see if the IdP has functionality that can redirect users upon logout from Appian.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;August 2020&lt;/p&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, authentication&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/21</link><pubDate>Wed, 02 Sep 2020 19:54:44 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 21 posted to Appian Knowledge Base by Elly Meng on 9/2/2020 7:54:44 PM&lt;br /&gt;
&lt;div class="content"&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20Service%20Provider%20Certificate%20and%20where%20can%20I%20find%20it?"&gt;What is the Service Provider Certificate and where can I find it?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Appian%20is%20the%20service%20provider.%20Why%20do%20customers%20provide%20the%20service%20provider%20certificate?"&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Once%20the%20service%20provider%20certificate%20is%20generated,%20how%20should%20this%20be%20integrated%20with%20the%20identity%20provider?"&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#How%20can%20I%20find%20the%20Assertion%20Consumer%20Service%20(ACS)%20and%20Single%20Log%20Out%20(SLO)%20URLs%20to%20provide%20to%20the%20IdP?"&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#My%20identity%20provider%20does%20not%20have%20a%20field%20to%20upload%20a%20service%20provider%20metadata%20file.%20How%20do%20I%20configure%20SAML?"&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20have%20noticed%20that%20clicking%20%22Sign%20Out%22%20button%20in%20Appian%20is%20only%20logging%20users%20out%20of%20Appian%20(not%20the%20IdP).%20How%20can%20I%20configure%20SAML%20to%20log%20users%20out%20of%20both%20Appian%20and%20the%20IdP%20when%20clicking%20%22Sign%20Out%22%20in%20Appian?"&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20have%20noticed%20that%20logging%20out%20of%20my%20IdP%20does%20not%20end%20my%20session%20in%20Appian.%20How%20can%20I%20configure%20this%20to%20end%20my%20session%20in%20Appian%20too?"&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#relaystate"&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Why%20does%20a%20process%20model%20published%20as%20web%20service%20fail%20after%20configuring%20SAML?"&gt;Why does a process model published as web service fail after configuring SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#I%20see%20%22Authentication%20was%20successful%22%20in%20the%20SAML%20test%20window,%20but%20admin%20console%20says%20%22Login%20failed...%22.%20Why%20is%20this?"&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20purpose%20of%20the%20checkbox%20called%20%22Use%20Identity%20Provider&amp;#39;s%20login%20page%22?"&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#saml-user-in-multiple-SAML-groups"&gt;Can I have a SAML user in multiple SAML groups?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#samlfields"&gt;What fields need to be included in the SAML Assertion?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Why%20does%20accessing%20a%20servlet%20plug-in%20or%20web%20API%20fail,%20even%20when%20using%20credentials%20of%20a%20user%20who%20isn&amp;#39;t%20in%20the%20SAML%20users%20group?"&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20should%20we%20set%20the%20%22common%20name%22%20to%20be%20when%20generating%20a%20certificate?"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20private%20key%20used%20for%20when%20generating%20the%20certificate?"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Can%20the%20certificate%20be%20signed%20by%20any%20trusted%20Certificate%20Authority%20(CA),%20like%20our%20internal%20Microsoft%20CA,%20or%20does%20it%20need%20to%20be%20a%20mutually-trusted%20cert,%20like%20Symantec%20or%20other%20CA?"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#Does%20Appian%20support%20encrypted%20SAML%20assertions?"&gt;Does Appian support encrypted SAML assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#What%20is%20the%20dropdown%20called%20%22Authentication%20Method%22?"&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/370/kb-1153-saml-authentication-faq#customlogout"&gt;Is a custom logout page supported in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the Service Provider Certificate and where can I find it?"&gt;&lt;/a&gt;What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" rel="noopener noreferrer" target="_blank"&gt;KB-1108&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Appian is the service provider. Why do customers provide the service provider certificate?"&gt;&lt;/a&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Once the service provider certificate is generated, how should this be integrated with the identity provider?"&gt;&lt;/a&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The public key is provided as part of the service provider metadata. It is necessary to provide the service provider metadata file to the IdP team to be uploaded per the IdP&amp;#39;s documentation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?"&gt;&lt;/a&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;ACS and SLO&amp;nbsp;URLs can be found in the Service Provider (SP) metadata file that is generated in the Admin Console during SAML setup. To generate the SP metadata file, follow the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#how-to-add-a-saml-identity-provider" rel="nofollow noopener noreferrer" target="_blank"&gt;How to Add a SAML Identity Provider&lt;/a&gt;&amp;nbsp;instructions. After completing steps 1-7, the SP metadata file is generated in step 8. The URLs are in this generated file, which needs to be uploaded to the IdP.&lt;/p&gt;
&lt;p&gt;If your IdP does not have a field&amp;nbsp;to upload the SP metadata file, please refer to the following question.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?"&gt;&lt;/a&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag.&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?"&gt;&lt;/a&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To&amp;nbsp;sign the user out of both Appian AND the IdP entity, this is the corresponding flow (the single logout service must be defined):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;If a Single Log Out (SLO) service is defined in the IdP metadata, Appian will send a logout request to the specified logout URL when the &amp;quot;Sign Out&amp;quot; button is clicked in Appian.&lt;/li&gt;
&lt;li&gt;The IdP needs to process the logout request and send a successful logout response to Appian.&lt;/li&gt;
&lt;li&gt;After Appian receives a successful response from the IdP, Appian terminates the user&amp;#39;s session.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If there is no SLO URL defined in the IdP metadata file, then the Appian &amp;quot;Sign Out&amp;quot; button will only end the user&amp;#39;s Appian session. This is because Appian has not been instructed to send the logout request to another entity (e.g. the IdP). In other words, if the IdP wants Appian to contact it upon logout, it is upon the IdP to expose the single logout service, as Appian does not have control over ending user sessions for another entity. This behavior is in line with the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="http://saml.xml.org/saml-specifications" rel="nofollow noopener noreferrer" target="_blank"&gt;SAML 2.0 specifications&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?"&gt;&lt;/a&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When logging out of the IdP, it is necessary for the IdP to then send a valid logout request to Appian. Once Appian receives a valid logout request from the IdP, Appian will terminate the user&amp;#39;s session.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="relaystate"&gt;&lt;/a&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, Appian does not support the use of the &amp;quot;RelayState&amp;quot; parameter. To set up a redirect to a specified URL, provide the URL in the &amp;#39;inResponseTo&amp;#39; parameter.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does a process model published as web service fail after configuring SAML?"&gt;&lt;/a&gt;Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;do not&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?"&gt;&lt;/a&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the purpose of the checkbox called &amp;quot;Use Identity Provider's login page&amp;quot;?"&gt;&lt;/a&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;?signin=[identifier]&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;to the site URL, where&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;identifier&lt;/code&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a id="saml-user-in-multiple-SAML-groups"&gt;&lt;/a&gt;Can I have a SAML user in multiple SAML groups?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;It is not recommended to have a user in more than one SAML group. The only supported use case for a user in multiple SAML groups is for failover purposes. However, a user will only be able to authenticate with the configuration listed higher in the&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#identity-provider-ordering"&gt;Identity Provider Ordering&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="samlfields"&gt;&lt;/a&gt;What fields need to be included in the SAML Assertion?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian always requires the &lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-location"&gt;NameID&lt;/a&gt; or &lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-attribute"&gt;username&lt;/a&gt; attribute to be provided based on which &lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#username-location"&gt;Username Location&lt;/a&gt; is selected in the&amp;nbsp;SAML configuration. If &lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#create-new-users-upon-sign-in"&gt;Create New Users Upon Sign-In&lt;/a&gt; is also selected, Appian requires the &lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#email-attribute"&gt;email&lt;/a&gt;, &lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#first-name-attribute"&gt;first name&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#last-name-attribute"&gt;last name&lt;/a&gt;&amp;nbsp;attributes as well. These required fields&amp;nbsp;are equivalent to &amp;quot;Claim Rules&amp;quot; used by some Identity Providers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn't in the SAML users group?"&gt;&lt;/a&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the private key used for when generating the certificate?"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Does Appian support encrypted SAML assertions?"&gt;&lt;/a&gt;Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, on-premise environments will need to be running OpenJDK 8 or have the JCE security JAR installed for the Oracle Java JDK. Once the JCE security JAR is installed, perform the following steps in the Appian on-premise environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Starting_and_Stopping_Appian.html" rel="noopener noreferrer" target="_blank"&gt;Restart Appian&lt;/a&gt;, so that it picks up the newly installed JCE security JAR.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the dropdown called &amp;quot;Authentication Method&amp;quot;?"&gt;&lt;/a&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="customlogout"&gt;&lt;/a&gt;Is a custom logout page supported in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no out-of-the-box configuration in Appian to redirect users to a logout page other than the Appian logout page. Check with your IdP to see if the IdP has functionality that can redirect users upon logout from Appian.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;August 2020&lt;/p&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, authentication&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/20</link><pubDate>Wed, 12 Aug 2020 12:31:13 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>James Lee</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 20 posted to Appian Knowledge Base by James Lee on 8/12/2020 12:31:13 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20Service%20Provider%20Certificate%20and%20where%20can%20I%20find%20it?"&gt;What is the Service Provider Certificate and where can I find it?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Appian%20is%20the%20service%20provider.%20Why%20do%20customers%20provide%20the%20service%20provider%20certificate?"&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Once%20the%20service%20provider%20certificate%20is%20generated,%20how%20should%20this%20be%20integrated%20with%20the%20identity%20provider?"&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#How%20can%20I%20find%20the%20Assertion%20Consumer%20Service%20(ACS)%20and%20Single%20Log%20Out%20(SLO)%20URLs%20to%20provide%20to%20the%20IdP?"&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#My%20identity%20provider%20does%20not%20have%20a%20field%20to%20upload%20a%20service%20provider%20metadata%20file.%20How%20do%20I%20configure%20SAML?"&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20have%20noticed%20that%20clicking%20&amp;quot;Sign%20Out&amp;quot;%20button%20in%20Appian%20is%20only%20logging%20users%20out%20of%20Appian%20(not%20the%20IdP).%20How%20can%20I%20configure%20SAML%20to%20log%20users%20out%20of%20both%20Appian%20and%20the%20IdP%20when%20clicking%20&amp;quot;Sign%20Out&amp;quot;%20in%20Appian?"&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20have%20noticed%20that%20logging%20out%20of%20my%20IdP%20does%20not%20end%20my%20session%20in%20Appian.%20How%20can%20I%20configure%20this%20to%20end%20my%20session%20in%20Appian%20too?"&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#relaystate"&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Why%20does%20a%20process%20model%20published%20as%20web%20service%20fail%20after%20configuring%20SAML?"&gt;Why does a process model published as web service fail after configuring SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20see%20&amp;quot;Authentication%20was%20successful&amp;quot;%20in%20the%20SAML%20test%20window,%20but%20admin%20console%20says%20&amp;quot;Login%20failed...&amp;quot;.%20Why%20is%20this?"&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20purpose%20of%20the%20checkbox%20called%20&amp;quot;Use%20Identity%20Provider&amp;#39;s%20login%20page&amp;quot;?"&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#saml-user-in-multiple-SAML-groups"&gt;Can I have a SAML user in multiple SAML groups?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Why%20does%20accessing%20a%20servlet%20plug-in%20or%20web%20API%20fail,%20even%20when%20using%20credentials%20of%20a%20user%20who%20isn&amp;#39;t%20in%20the%20SAML%20users%20group?"&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20should%20we%20set%20the%20&amp;quot;common%20name&amp;quot;%20to%20be%20when%20generating%20a%20certificate?"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20private%20key%20used%20for%20when%20generating%20the%20certificate?"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20the%20certificate%20be%20signed%20by%20any%20trusted%20Certificate%20Authority%20(CA),%20like%20our%20internal%20Microsoft%20CA,%20or%20does%20it%20need%20to%20be%20a%20mutually-trusted%20cert,%20like%20Symantec%20or%20other%20CA?"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Does%20Appian%20support%20encrypted%20SAML%20assertions?"&gt;Does Appian support encrypted SAML assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20dropdown%20called%20&amp;quot;Authentication%20Method&amp;quot;?"&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#customlogout"&gt;Is a custom logout page supported in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the Service Provider Certificate and where can I find it?"&gt;&lt;/a&gt;What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See &lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" rel="noopener noreferrer" target="_blank"&gt;KB-1108&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Appian is the service provider. Why do customers provide the service provider certificate?"&gt;&lt;/a&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Once the service provider certificate is generated, how should this be integrated with the identity provider?"&gt;&lt;/a&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The public key is provided as part of the service provider metadata. It is necessary to provide the service provider metadata file to the IdP team to be uploaded per the IdP&amp;#39;s documentation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?"&gt;&lt;/a&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;ACS and SLO&amp;nbsp;URLs can be found in the Service Provider (SP) metadata file that is generated in the Admin Console during SAML setup. To generate the SP metadata file, follow the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#how-to-add-a-saml-identity-provider" rel="nofollow noopener noreferrer" target="_blank"&gt;How to Add a SAML Identity Provider&lt;/a&gt;&amp;nbsp;instructions. After completing steps 1-7, the SP metadata file is generated in step 8. The URLs are in this generated file, which needs to be uploaded to the IdP.&lt;/p&gt;
&lt;p&gt;If your IdP does not have a field&amp;nbsp;to upload the SP metadata file, please refer to the following question.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?"&gt;&lt;/a&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag. &lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?"&gt;&lt;/a&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To&amp;nbsp;sign the user out of both Appian AND the IdP entity, this is the corresponding flow (the single logout service must be defined):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;If a Single Log Out (SLO) service is defined in the IdP metadata, Appian will send a logout request to the specified logout URL when the &amp;quot;Sign Out&amp;quot; button is clicked in Appian.&lt;/li&gt;
&lt;li&gt;The IdP needs to process the logout request and send a successful logout response to Appian.&lt;/li&gt;
&lt;li&gt;After Appian receives a successful response from the IdP, Appian terminates the user&amp;#39;s session.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If there is no SLO URL defined in the IdP metadata file, then the Appian &amp;quot;Sign Out&amp;quot; button will only end the user&amp;#39;s Appian session. This is because Appian has not been instructed to send the logout request to another entity (e.g. the IdP). In other words, if the IdP wants Appian to contact it upon logout, it is upon the IdP to expose the single logout service, as Appian does not have control over ending user sessions for another entity. This behavior is in line with the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="http://saml.xml.org/saml-specifications" rel="nofollow noopener noreferrer" target="_blank"&gt;SAML 2.0 specifications&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?"&gt;&lt;/a&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When logging out of the IdP, it is necessary for the IdP to then send a valid logout request to Appian. Once Appian receives a valid logout request from the IdP, Appian will terminate the user&amp;#39;s session.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="relaystate"&gt;&lt;/a&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, Appian does not support the use of the &amp;quot;RelayState&amp;quot; parameter. To set up a redirect to a specified URL, provide the URL in the &amp;#39;inResponseTo&amp;#39; parameter.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does a process model published as web service fail after configuring SAML?"&gt;&lt;/a&gt;Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users &lt;strong&gt;do not&lt;/strong&gt; belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about &lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?"&gt;&lt;/a&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the purpose of the checkbox called &amp;quot;Use Identity Provider's login page&amp;quot;?"&gt;&lt;/a&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending &lt;code&gt;?signin=[identifier]&lt;/code&gt; to the site URL, where &lt;code&gt;identifier&lt;/code&gt; is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a id="saml-user-in-multiple-SAML-groups"&gt;&lt;/a&gt;Can I have a SAML user in multiple SAML groups?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;It is not recommended to have a user in more than one SAML group. The only supported use case for a user in multiple SAML groups is for failover purposes. However, a user will only be able to authenticate with the configuration listed higher in the &lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#identity-provider-ordering"&gt;Identity Provider Ordering&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn't in the SAML users group?"&gt;&lt;/a&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the private key used for when generating the certificate?"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow &lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt; to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Does Appian support encrypted SAML assertions?"&gt;&lt;/a&gt;Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, on-premise environments will need to be running OpenJDK 8 or have the JCE security JAR installed for the Oracle Java JDK. Once the JCE security JAR is installed, perform the following steps in the Appian on-premise environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Starting_and_Stopping_Appian.html" rel="noopener noreferrer" target="_blank"&gt;Restart Appian&lt;/a&gt;, so that it picks up the newly installed JCE security JAR.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the dropdown called &amp;quot;Authentication Method&amp;quot;?"&gt;&lt;/a&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="customlogout"&gt;&lt;/a&gt;Is a custom logout page supported in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no out-of-the-box configuration in Appian to redirect users to a logout page other than the Appian logout page. Check with your IdP to see if the IdP has functionality that can redirect users upon logout from Appian.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;August 2020&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, authentication&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/19</link><pubDate>Wed, 12 Aug 2020 12:29:51 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>James Lee</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 19 posted to Appian Knowledge Base by James Lee on 8/12/2020 12:29:51 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20Service%20Provider%20Certificate%20and%20where%20can%20I%20find%20it?"&gt;What is the Service Provider Certificate and where can I find it?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Appian%20is%20the%20service%20provider.%20Why%20do%20customers%20provide%20the%20service%20provider%20certificate?"&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Once%20the%20service%20provider%20certificate%20is%20generated,%20how%20should%20this%20be%20integrated%20with%20the%20identity%20provider?"&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#How%20can%20I%20find%20the%20Assertion%20Consumer%20Service%20(ACS)%20and%20Single%20Log%20Out%20(SLO)%20URLs%20to%20provide%20to%20the%20IdP?"&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#My%20identity%20provider%20does%20not%20have%20a%20field%20to%20upload%20a%20service%20provider%20metadata%20file.%20How%20do%20I%20configure%20SAML?"&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20have%20noticed%20that%20clicking%20&amp;quot;Sign%20Out&amp;quot;%20button%20in%20Appian%20is%20only%20logging%20users%20out%20of%20Appian%20(not%20the%20IdP).%20How%20can%20I%20configure%20SAML%20to%20log%20users%20out%20of%20both%20Appian%20and%20the%20IdP%20when%20clicking%20&amp;quot;Sign%20Out&amp;quot;%20in%20Appian?"&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20have%20noticed%20that%20logging%20out%20of%20my%20IdP%20does%20not%20end%20my%20session%20in%20Appian.%20How%20can%20I%20configure%20this%20to%20end%20my%20session%20in%20Appian%20too?"&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#relaystate"&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Why%20does%20a%20process%20model%20published%20as%20web%20service%20fail%20after%20configuring%20SAML?"&gt;Why does a process model published as web service fail after configuring SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20see%20&amp;quot;Authentication%20was%20successful&amp;quot;%20in%20the%20SAML%20test%20window,%20but%20admin%20console%20says%20&amp;quot;Login%20failed...&amp;quot;.%20Why%20is%20this?"&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20purpose%20of%20the%20checkbox%20called%20&amp;quot;Use%20Identity%20Provider&amp;#39;s%20login%20page&amp;quot;?"&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#saml-user-in-multiple-SAML-groups"&gt;Can I have a SAML user in multiple SAML groups?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Why%20does%20accessing%20a%20servlet%20plug-in%20or%20web%20API%20fail,%20even%20when%20using%20credentials%20of%20a%20user%20who%20isn&amp;#39;t%20in%20the%20SAML%20users%20group?"&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20should%20we%20set%20the%20&amp;quot;common%20name&amp;quot;%20to%20be%20when%20generating%20a%20certificate?"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20private%20key%20used%20for%20when%20generating%20the%20certificate?"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20the%20certificate%20be%20signed%20by%20any%20trusted%20Certificate%20Authority%20(CA),%20like%20our%20internal%20Microsoft%20CA,%20or%20does%20it%20need%20to%20be%20a%20mutually-trusted%20cert,%20like%20Symantec%20or%20other%20CA?"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Does%20Appian%20support%20encrypted%20SAML%20assertions?"&gt;Does Appian support encrypted SAML assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20dropdown%20called%20&amp;quot;Authentication%20Method&amp;quot;?"&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#customlogout"&gt;Is a custom logout page supported in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the Service Provider Certificate and where can I find it?"&gt;&lt;/a&gt;What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See &lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" rel="noopener noreferrer" target="_blank"&gt;KB-1108&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Appian is the service provider. Why do customers provide the service provider certificate?"&gt;&lt;/a&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Once the service provider certificate is generated, how should this be integrated with the identity provider?"&gt;&lt;/a&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The public key is provided as part of the service provider metadata. It is necessary to provide the service provider metadata file to the IdP team to be uploaded per the IdP&amp;#39;s documentation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?"&gt;&lt;/a&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;ACS and SLO&amp;nbsp;URLs can be found in the Service Provider (SP) metadata file that is generated in the Admin Console during SAML setup. To generate the SP metadata file, follow the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#how-to-add-a-saml-identity-provider" rel="nofollow noopener noreferrer" target="_blank"&gt;How to Add a SAML Identity Provider&lt;/a&gt;&amp;nbsp;instructions. After completing steps 1-7, the SP metadata file is generated in step 8. The URLs are in this generated file, which needs to be uploaded to the IdP.&lt;/p&gt;
&lt;p&gt;If your IdP does not have a field&amp;nbsp;to upload the SP metadata file, please refer to the following question.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?"&gt;&lt;/a&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag. &lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?"&gt;&lt;/a&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To&amp;nbsp;sign the user out of both Appian AND the IdP entity, this is the corresponding flow (the single logout service must be defined):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;If a Single Log Out (SLO) service is defined in the IdP metadata, Appian will send a logout request to the specified logout URL when the &amp;quot;Sign Out&amp;quot; button is clicked in Appian.&lt;/li&gt;
&lt;li&gt;The IdP needs to process the logout request and send a successful logout response to Appian.&lt;/li&gt;
&lt;li&gt;After Appian receives a successful response from the IdP, Appian terminates the user&amp;#39;s session.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If there is no SLO URL defined in the IdP metadata file, then the Appian &amp;quot;Sign Out&amp;quot; button will only end the user&amp;#39;s Appian session. This is because Appian has not been instructed to send the logout request to another entity (e.g. the IdP). In other words, if the IdP wants Appian to contact it upon logout, it is upon the IdP to expose the single logout service, as Appian does not have control over ending user sessions for another entity. This behavior is in line with the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="http://saml.xml.org/saml-specifications" rel="nofollow noopener noreferrer" target="_blank"&gt;SAML 2.0 specifications&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?"&gt;&lt;/a&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When logging out of the IdP, it is necessary for the IdP to then send a valid logout request to Appian. Once Appian receives a valid logout request from the IdP, Appian will terminate the user&amp;#39;s session.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="relaystate"&gt;&lt;/a&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, Appian does not support the use of the &amp;quot;RelayState&amp;quot; parameter. To set up a redirect to a specified URL, provide the URL in the &amp;#39;inResponseTo&amp;#39; parameter.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does a process model published as web service fail after configuring SAML?"&gt;&lt;/a&gt;Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users &lt;strong&gt;do not&lt;/strong&gt; belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about &lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?"&gt;&lt;/a&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the purpose of the checkbox called &amp;quot;Use Identity Provider's login page&amp;quot;?"&gt;&lt;/a&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending &lt;code&gt;?signin=[identifier]&lt;/code&gt; to the site URL, where &lt;code&gt;identifier&lt;/code&gt; is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a id="saml-user-in-multiple-SAML-groups"&gt;&lt;/a&gt;Can I have a SAML user in multiple SAML groups?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;It is not recommended to have a user in more than 1 SAML group. The only supported use case for a user in multiple SAML groups is for failover purposes. However, a user will only be able to authenticate with the configuration listed higher in the &lt;a href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#identity-provider-ordering"&gt;Identity Provider Ordering&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn't in the SAML users group?"&gt;&lt;/a&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the private key used for when generating the certificate?"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow &lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt; to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Does Appian support encrypted SAML assertions?"&gt;&lt;/a&gt;Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, on-premise environments will need to be running OpenJDK 8 or have the JCE security JAR installed for the Oracle Java JDK. Once the JCE security JAR is installed, perform the following steps in the Appian on-premise environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Starting_and_Stopping_Appian.html" rel="noopener noreferrer" target="_blank"&gt;Restart Appian&lt;/a&gt;, so that it picks up the newly installed JCE security JAR.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the dropdown called &amp;quot;Authentication Method&amp;quot;?"&gt;&lt;/a&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="customlogout"&gt;&lt;/a&gt;Is a custom logout page supported in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no out-of-the-box configuration in Appian to redirect users to a logout page other than the Appian logout page. Check with your IdP to see if the IdP has functionality that can redirect users upon logout from Appian.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;August 2020&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, authentication&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/18</link><pubDate>Fri, 15 May 2020 05:58:56 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 18 posted to Appian Knowledge Base by Parmida Borhani on 5/15/2020 5:58:56 AM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20Service%20Provider%20Certificate%20and%20where%20can%20I%20find%20it?"&gt;What is the Service Provider Certificate and where can I find it?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Appian%20is%20the%20service%20provider.%20Why%20do%20customers%20provide%20the%20service%20provider%20certificate?"&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Once%20the%20service%20provider%20certificate%20is%20generated,%20how%20should%20this%20be%20integrated%20with%20the%20identity%20provider?"&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#How%20can%20I%20find%20the%20Assertion%20Consumer%20Service%20(ACS)%20and%20Single%20Log%20Out%20(SLO)%20URLs%20to%20provide%20to%20the%20IdP?"&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#My%20identity%20provider%20does%20not%20have%20a%20field%20to%20upload%20a%20service%20provider%20metadata%20file.%20How%20do%20I%20configure%20SAML?"&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20have%20noticed%20that%20clicking%20&amp;quot;Sign%20Out&amp;quot;%20button%20in%20Appian%20is%20only%20logging%20users%20out%20of%20Appian%20(not%20the%20IdP).%20How%20can%20I%20configure%20SAML%20to%20log%20users%20out%20of%20both%20Appian%20and%20the%20IdP%20when%20clicking%20&amp;quot;Sign%20Out&amp;quot;%20in%20Appian?"&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20have%20noticed%20that%20logging%20out%20of%20my%20IdP%20does%20not%20end%20my%20session%20in%20Appian.%20How%20can%20I%20configure%20this%20to%20end%20my%20session%20in%20Appian%20too?"&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#relaystate"&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Why%20does%20a%20process%20model%20published%20as%20web%20service%20fail%20after%20configuring%20SAML?"&gt;Why does a process model published as web service fail after configuring SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20see%20&amp;quot;Authentication%20was%20successful&amp;quot;%20in%20the%20SAML%20test%20window,%20but%20admin%20console%20says%20&amp;quot;Login%20failed...&amp;quot;.%20Why%20is%20this?"&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20purpose%20of%20the%20checkbox%20called%20&amp;quot;Use%20Identity%20Provider&amp;#39;s%20login%20page&amp;quot;?"&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Why%20does%20accessing%20a%20servlet%20plug-in%20or%20web%20API%20fail,%20even%20when%20using%20credentials%20of%20a%20user%20who%20isn&amp;#39;t%20in%20the%20SAML%20users%20group?"&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20should%20we%20set%20the%20&amp;quot;common%20name&amp;quot;%20to%20be%20when%20generating%20a%20certificate?"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20private%20key%20used%20for%20when%20generating%20the%20certificate?"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20the%20certificate%20be%20signed%20by%20any%20trusted%20Certificate%20Authority%20(CA),%20like%20our%20internal%20Microsoft%20CA,%20or%20does%20it%20need%20to%20be%20a%20mutually-trusted%20cert,%20like%20Symantec%20or%20other%20CA?"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Does%20Appian%20support%20encrypted%20SAML%20assertions?"&gt;Does Appian support encrypted SAML assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20dropdown%20called%20&amp;quot;Authentication%20Method&amp;quot;?"&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#customlogout"&gt;Is a custom logout page supported in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the Service Provider Certificate and where can I find it?"&gt;&lt;/a&gt;What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See &lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" rel="noopener noreferrer" target="_blank"&gt;KB-1108&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Appian is the service provider. Why do customers provide the service provider certificate?"&gt;&lt;/a&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Once the service provider certificate is generated, how should this be integrated with the identity provider?"&gt;&lt;/a&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The public key is provided as part of the service provider metadata. It is necessary to provide the service provider metadata file to the IdP team to be uploaded per the IdP&amp;#39;s documentation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?"&gt;&lt;/a&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;ACS and SLO&amp;nbsp;URLs can be found in the Service Provider (SP) metadata file that is generated in the Admin Console during SAML setup. To generate the SP metadata file, follow the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#how-to-add-a-saml-identity-provider" rel="nofollow noopener noreferrer" target="_blank"&gt;How to Add a SAML Identity Provider&lt;/a&gt;&amp;nbsp;instructions. After completing steps 1-7, the SP metadata file is generated in step 8. The URLs are in this generated file, which needs to be uploaded to the IdP.&lt;/p&gt;
&lt;p&gt;If your IdP does not have a field&amp;nbsp;to upload the SP metadata file, please refer to the following question.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?"&gt;&lt;/a&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag. &lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?"&gt;&lt;/a&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To&amp;nbsp;sign the user out of both Appian AND the IdP entity, this is the corresponding flow (the single logout service must be defined):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;If a Single Log Out (SLO) service is defined in the IdP metadata, Appian will send a logout request to the specified logout URL when the &amp;quot;Sign Out&amp;quot; button is clicked in Appian.&lt;/li&gt;
&lt;li&gt;The IdP needs to process the logout request and send a successful logout response to Appian.&lt;/li&gt;
&lt;li&gt;After Appian receives a successful response from the IdP, Appian terminates the user&amp;#39;s session.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If there is no SLO URL defined in the IdP metadata file, then the Appian &amp;quot;Sign Out&amp;quot; button will only end the user&amp;#39;s Appian session. This is because Appian has not been instructed to send the logout request to another entity (e.g. the IdP). In other words, if the IdP wants Appian to contact it upon logout, it is upon the IdP to expose the single logout service, as Appian does not have control over ending user sessions for another entity. This behavior is in line with the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="http://saml.xml.org/saml-specifications" rel="nofollow noopener noreferrer" target="_blank"&gt;SAML 2.0 specifications&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?"&gt;&lt;/a&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When logging out of the IdP, it is necessary for the IdP to then send a valid logout request to Appian. Once Appian receives a valid logout request from the IdP, Appian will terminate the user&amp;#39;s session.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="relaystate"&gt;&lt;/a&gt;I&amp;#39;ve noticed Appian does not redirect to the URL provided in the &amp;quot;RelayState&amp;quot; parameter of my SAML Assertion. Does Appian support use of the &amp;quot;RelayState&amp;quot; parameter in SAML Assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, Appian does not support the use of the &amp;quot;RelayState&amp;quot; parameter. To set up a redirect to a specified URL, provide the URL in the &amp;#39;inResponseTo&amp;#39; parameter.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does a process model published as web service fail after configuring SAML?"&gt;&lt;/a&gt;Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users &lt;strong&gt;do not&lt;/strong&gt; belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about &lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?"&gt;&lt;/a&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the purpose of the checkbox called &amp;quot;Use Identity Provider's login page&amp;quot;?"&gt;&lt;/a&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending &lt;code&gt;?signin=[identifier]&lt;/code&gt; to the site URL, where &lt;code&gt;identifier&lt;/code&gt; is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn't in the SAML users group?"&gt;&lt;/a&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the private key used for when generating the certificate?"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow &lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt; to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Does Appian support encrypted SAML assertions?"&gt;&lt;/a&gt;Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, on-premise environments will need to be running OpenJDK 8 or have the JCE security JAR installed for the Oracle Java JDK. Once the JCE security JAR is installed, perform the following steps in the Appian on-premise environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Starting_and_Stopping_Appian.html" rel="noopener noreferrer" target="_blank"&gt;Restart Appian&lt;/a&gt;, so that it picks up the newly installed JCE security JAR.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the dropdown called &amp;quot;Authentication Method&amp;quot;?"&gt;&lt;/a&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="customlogout"&gt;&lt;/a&gt;Is a custom logout page supported in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no out-of-the-box configuration in Appian to redirect users to a logout page other than the Appian logout page. Check with your IdP to see if the IdP has functionality that can redirect users upon logout from Appian.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;May 2020&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, authentication&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/17</link><pubDate>Thu, 30 May 2019 01:00:08 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 17 posted to Appian Knowledge Base by Parmida Borhani on 5/30/2019 1:00:08 AM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20Service%20Provider%20Certificate%20and%20where%20can%20I%20find%20it?"&gt;What is the Service Provider Certificate and where can I find it?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Appian%20is%20the%20service%20provider.%20Why%20do%20customers%20provide%20the%20service%20provider%20certificate?"&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Once%20the%20service%20provider%20certificate%20is%20generated,%20how%20should%20this%20be%20integrated%20with%20the%20identity%20provider?"&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#How%20can%20I%20find%20the%20Assertion%20Consumer%20Service%20(ACS)%20and%20Single%20Log%20Out%20(SLO)%20URLs%20to%20provide%20to%20the%20IdP?"&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#My%20identity%20provider%20does%20not%20have%20a%20field%20to%20upload%20a%20service%20provider%20metadata%20file.%20How%20do%20I%20configure%20SAML?"&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20have%20noticed%20that%20clicking%20&amp;quot;Sign%20Out&amp;quot;%20button%20in%20Appian%20is%20only%20logging%20users%20out%20of%20Appian%20(not%20the%20IdP).%20How%20can%20I%20configure%20SAML%20to%20log%20users%20out%20of%20both%20Appian%20and%20the%20IdP%20when%20clicking%20&amp;quot;Sign%20Out&amp;quot;%20in%20Appian?"&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20have%20noticed%20that%20logging%20out%20of%20my%20IdP%20does%20not%20end%20my%20session%20in%20Appian.%20How%20can%20I%20configure%20this%20to%20end%20my%20session%20in%20Appian%20too?"&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Why%20does%20a%20process%20model%20published%20as%20web%20service%20fail%20after%20configuring%20SAML?"&gt;Why does a process model published as web service fail after configuring SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20see%20&amp;quot;Authentication%20was%20successful&amp;quot;%20in%20the%20SAML%20test%20window,%20but%20admin%20console%20says%20&amp;quot;Login%20failed...&amp;quot;.%20Why%20is%20this?"&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20purpose%20of%20the%20checkbox%20called%20&amp;quot;Use%20Identity%20Provider&amp;#39;s%20login%20page&amp;quot;?"&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Why%20does%20accessing%20a%20servlet%20plug-in%20or%20web%20API%20fail,%20even%20when%20using%20credentials%20of%20a%20user%20who%20isn&amp;#39;t%20in%20the%20SAML%20users%20group?"&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20should%20we%20set%20the%20&amp;quot;common%20name&amp;quot;%20to%20be%20when%20generating%20a%20certificate?"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20private%20key%20used%20for%20when%20generating%20the%20certificate?"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20the%20certificate%20be%20signed%20by%20any%20trusted%20Certificate%20Authority%20(CA),%20like%20our%20internal%20Microsoft%20CA,%20or%20does%20it%20need%20to%20be%20a%20mutually-trusted%20cert,%20like%20Symantec%20or%20other%20CA?"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Does%20Appian%20support%20encrypted%20SAML%20assertions?"&gt;Does Appian support encrypted SAML assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20dropdown%20called%20&amp;quot;Authentication%20Method&amp;quot;?"&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#customlogout"&gt;Is a custom logout page supported in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the Service Provider Certificate and where can I find it?"&gt;&lt;/a&gt;What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See &lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" rel="noopener noreferrer" target="_blank"&gt;KB-1108&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Appian is the service provider. Why do customers provide the service provider certificate?"&gt;&lt;/a&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Once the service provider certificate is generated, how should this be integrated with the identity provider?"&gt;&lt;/a&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The public key is provided as part of the service provider metadata. It is necessary to provide the service provider metadata file to the IdP team to be uploaded per the IdP&amp;#39;s documentation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?"&gt;&lt;/a&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;ACS and SLO&amp;nbsp;URLs can be found in the Service Provider (SP) metadata file that is generated in the Admin Console during SAML setup. To generate the SP metadata file, follow the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#how-to-add-a-saml-identity-provider" rel="nofollow noopener noreferrer" target="_blank"&gt;How to Add a SAML Identity Provider&lt;/a&gt;&amp;nbsp;instructions. After completing steps 1-7, the SP metadata file is generated in step 8. The URLs are in this generated file, which needs to be uploaded to the IdP.&lt;/p&gt;
&lt;p&gt;If your IdP does not have a field&amp;nbsp;to upload the SP metadata file, please refer to the following question.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?"&gt;&lt;/a&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag. &lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" rel="noopener noreferrer" target="_blank"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?"&gt;&lt;/a&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To&amp;nbsp;sign the user out of both Appian AND the IdP entity, this is the corresponding flow (the single logout service must be defined):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;If a Single Log Out (SLO) service is defined in the IdP metadata, Appian will send a logout request to the specified logout URL when the &amp;quot;Sign Out&amp;quot; button is clicked in Appian.&lt;/li&gt;
&lt;li&gt;The IdP needs to process the logout request and send a successful logout response to Appian.&lt;/li&gt;
&lt;li&gt;After Appian receives a successful response from the IdP, Appian terminates the user&amp;#39;s session.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If there is no SLO URL defined in the IdP metadata file, then the Appian &amp;quot;Sign Out&amp;quot; button will only end the user&amp;#39;s Appian session. This is because Appian has not been instructed to send the logout request to another entity (e.g. the IdP). In other words, if the IdP wants Appian to contact it upon logout, it is upon the IdP to expose the single logout service, as Appian does not have control over ending user sessions for another entity. This behavior is in line with the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="http://saml.xml.org/saml-specifications" rel="nofollow noopener noreferrer" target="_blank"&gt;SAML 2.0 specifications&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?"&gt;&lt;/a&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When logging out of the IdP, it is necessary for the IdP to then send a valid logout request to Appian. Once Appian receives a valid logout request from the IdP, Appian will terminate the user&amp;#39;s session.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does a process model published as web service fail after configuring SAML?"&gt;&lt;/a&gt;Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users &lt;strong&gt;do not&lt;/strong&gt; belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about &lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?"&gt;&lt;/a&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the purpose of the checkbox called &amp;quot;Use Identity Provider's login page&amp;quot;?"&gt;&lt;/a&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending &lt;code&gt;?signin=[identifier]&lt;/code&gt; to the site URL, where &lt;code&gt;identifier&lt;/code&gt; is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn't in the SAML users group?"&gt;&lt;/a&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the private key used for when generating the certificate?"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow &lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt; to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Does Appian support encrypted SAML assertions?"&gt;&lt;/a&gt;Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, on-premise environments will need to be running OpenJDK 8 or have the JCE security JAR installed for the Oracle Java JDK. Once the JCE security JAR is installed, perform the following steps in the Appian on-premise environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Starting_and_Stopping_Appian.html" rel="noopener noreferrer" target="_blank"&gt;Restart Appian&lt;/a&gt;, so that it picks up the newly installed JCE security JAR.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the dropdown called &amp;quot;Authentication Method&amp;quot;?"&gt;&lt;/a&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="customlogout"&gt;&lt;/a&gt;Is a custom logout page supported in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no out-of-the-box configuration in Appian to redirect users to a logout page other than the Appian logout page. Check with your IdP to see if the IdP has functionality that can redirect users upon logout from Appian.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;May 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, authentication&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/16</link><pubDate>Mon, 25 Mar 2019 17:45:53 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>Jordan Horwat</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 16 posted to Appian Knowledge Base by Jordan Horwat on 3/25/2019 5:45:53 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20Service%20Provider%20Certificate%20and%20where%20can%20I%20find%20it?"&gt;What is the Service Provider Certificate and where can I find it?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Appian%20is%20the%20service%20provider.%20Why%20do%20customers%20provide%20the%20service%20provider%20certificate?"&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Once%20the%20service%20provider%20certificate%20is%20generated,%20how%20should%20this%20be%20integrated%20with%20the%20identity%20provider?"&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#How%20can%20I%20find%20the%20Assertion%20Consumer%20Service%20(ACS)%20and%20Single%20Log%20Out%20(SLO)%20URLs%20to%20provide%20to%20the%20IdP?"&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#My%20identity%20provider%20does%20not%20have%20a%20field%20to%20upload%20a%20service%20provider%20metadata%20file.%20How%20do%20I%20configure%20SAML?"&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20have%20noticed%20that%20clicking%20&amp;quot;Sign%20Out&amp;quot;%20button%20in%20Appian%20is%20only%20logging%20users%20out%20of%20Appian%20(not%20the%20IdP).%20How%20can%20I%20configure%20SAML%20to%20log%20users%20out%20of%20both%20Appian%20and%20the%20IdP%20when%20clicking%20&amp;quot;Sign%20Out&amp;quot;%20in%20Appian?"&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20have%20noticed%20that%20logging%20out%20of%20my%20IdP%20does%20not%20end%20my%20session%20in%20Appian.%20How%20can%20I%20configure%20this%20to%20end%20my%20session%20in%20Appian%20too?"&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Why%20does%20a%20process%20model%20published%20as%20web%20service%20fail%20after%20configuring%20SAML?"&gt;Why does a process model published as web service fail after configuring SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20see%20&amp;quot;Authentication%20was%20successful&amp;quot;%20in%20the%20SAML%20test%20window,%20but%20admin%20console%20says%20&amp;quot;Login%20failed...&amp;quot;.%20Why%20is%20this?"&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20purpose%20of%20the%20checkbox%20called%20&amp;quot;Use%20Identity%20Provider&amp;#39;s%20login%20page&amp;quot;?"&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Why%20does%20accessing%20a%20servlet%20plug-in%20or%20web%20API%20fail,%20even%20when%20using%20credentials%20of%20a%20user%20who%20isn&amp;#39;t%20in%20the%20SAML%20users%20group?"&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20should%20we%20set%20the%20&amp;quot;common%20name&amp;quot;%20to%20be%20when%20generating%20a%20certificate?"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20private%20key%20used%20for%20when%20generating%20the%20certificate?"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20the%20certificate%20be%20signed%20by%20any%20trusted%20Certificate%20Authority%20(CA),%20like%20our%20internal%20Microsoft%20CA,%20or%20does%20it%20need%20to%20be%20a%20mutually-trusted%20cert,%20like%20Symantec%20or%20other%20CA?"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Does%20Appian%20support%20encrypted%20SAML%20assertions?"&gt;Does Appian support encrypted SAML assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20dropdown%20called%20&amp;quot;Authentication%20Method&amp;quot;?"&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the Service Provider Certificate and where can I find it?"&gt;&lt;/a&gt;What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See &lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" target="_blank"&gt;KB-1108&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Appian is the service provider. Why do customers provide the service provider certificate?"&gt;&lt;/a&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Once the service provider certificate is generated, how should this be integrated with the identity provider?"&gt;&lt;/a&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The public key is provided as part of the service provider metadata. It is necessary to provide the service provider metadata file to the IdP team to be uploaded per the IdP&amp;#39;s documentation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?"&gt;&lt;/a&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;ACS and SLO&amp;nbsp;URLs can be found in the Service Provider (SP) metadata file that is generated in the Admin Console during SAML setup. To generate the SP metadata file, follow the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#how-to-add-a-saml-identity-provider" target="_blank" rel="nofollow"&gt;How to Add a SAML Identity Provider&lt;/a&gt;&amp;nbsp;instructions. After completing steps 1-7, the SP metadata file is generated in step 8. The URLs are in this generated file, which needs to be uploaded to the IdP.&lt;/p&gt;
&lt;p&gt;If your IdP does not have a field&amp;nbsp;to upload the SP metadata file, please refer to the following question.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?"&gt;&lt;/a&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag. &lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" target="_blank" rel="noreferrer"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" target="_blank" rel="noreferrer"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?"&gt;&lt;/a&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To&amp;nbsp;sign the user out of both Appian AND the IdP entity, this is the corresponding flow (the single logout service must be defined):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;If a Single Log Out (SLO) service is defined in the IdP metadata, Appian will send a logout request to the specified logout URL when the &amp;quot;Sign Out&amp;quot; button is clicked in Appian.&lt;/li&gt;
&lt;li&gt;The IdP needs to process the logout request and send a successful logout response to Appian.&lt;/li&gt;
&lt;li&gt;After Appian receives a successful response from the IdP, Appian terminates the user&amp;#39;s session.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If there is no SLO URL defined in the IdP metadata file, then the Appian &amp;quot;Sign Out&amp;quot; button will only end the user&amp;#39;s Appian session. This is because Appian has not been instructed to send the logout request to another entity (e.g. the IdP). In other words, if the IdP wants Appian to contact it upon logout, it is upon the IdP to expose the single logout service, as Appian does not have control over ending user sessions for another entity. This behavior is in line with the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="http://saml.xml.org/saml-specifications" target="_blank" rel="nofollow"&gt;SAML 2.0 specifications&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?"&gt;&lt;/a&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When logging out of the IdP, it is necessary for the IdP to then send a valid logout request to Appian. Once Appian receives a valid logout request from the IdP, Appian will terminate the user&amp;#39;s session.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does a process model published as web service fail after configuring SAML?"&gt;&lt;/a&gt;Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users &lt;strong&gt;do not&lt;/strong&gt; belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about &lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?"&gt;&lt;/a&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the purpose of the checkbox called &amp;quot;Use Identity Provider's login page&amp;quot;?"&gt;&lt;/a&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending &lt;code&gt;?signin=[identifier]&lt;/code&gt; to the site URL, where &lt;code&gt;identifier&lt;/code&gt; is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn't in the SAML users group?"&gt;&lt;/a&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the private key used for when generating the certificate?"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow &lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt; to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Does Appian support encrypted SAML assertions?"&gt;&lt;/a&gt;Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, on-premise environments will need to be running OpenJDK 8 or have the JCE security JAR installed for the Oracle Java JDK. Once the JCE security JAR is installed, perform the following steps in the Appian on-premise environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Starting_and_Stopping_Appian.html" target="_blank"&gt;Restart Appian&lt;/a&gt;, so that it picks up the newly installed JCE security JAR.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the dropdown called &amp;quot;Authentication Method&amp;quot;?"&gt;&lt;/a&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;March 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, authentication&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/15</link><pubDate>Thu, 07 Mar 2019 02:26:42 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 15 posted to Appian Knowledge Base by Parmida Borhani on 3/7/2019 2:26:42 AM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20Service%20Provider%20Certificate%20and%20where%20can%20I%20find%20it?"&gt;What is the Service Provider Certificate and where can I find it?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Appian%20is%20the%20service%20provider.%20Why%20do%20customers%20provide%20the%20service%20provider%20certificate?"&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Once%20the%20service%20provider%20certificate%20is%20generated,%20how%20should%20this%20be%20integrated%20with%20the%20identity%20provider?"&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#How%20can%20I%20find%20the%20Assertion%20Consumer%20Service%20(ACS)%20and%20Single%20Log%20Out%20(SLO)%20URLs%20to%20provide%20to%20the%20IdP?"&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#My%20identity%20provider%20does%20not%20have%20a%20field%20to%20upload%20a%20service%20provider%20metadata%20file.%20How%20do%20I%20configure%20SAML?"&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20have%20noticed%20that%20clicking%20&amp;quot;Sign%20Out&amp;quot;%20button%20in%20Appian%20is%20only%20logging%20users%20out%20of%20Appian%20(not%20the%20IdP).%20How%20can%20I%20configure%20SAML%20to%20log%20users%20out%20of%20both%20Appian%20and%20the%20IdP%20when%20clicking%20&amp;quot;Sign%20Out&amp;quot;%20in%20Appian?"&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20have%20noticed%20that%20logging%20out%20of%20my%20IdP%20does%20not%20end%20my%20session%20in%20Appian.%20How%20can%20I%20configure%20this%20to%20end%20my%20session%20in%20Appian%20too?"&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Why%20does%20a%20process%20model%20published%20as%20web%20service%20fail%20after%20configuring%20SAML?"&gt;Why does a process model published as web service fail after configuring SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20see%20&amp;quot;Authentication%20was%20successful&amp;quot;%20in%20the%20SAML%20test%20window,%20but%20admin%20console%20says%20&amp;quot;Login%20failed...&amp;quot;.%20Why%20is%20this?"&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20purpose%20of%20the%20checkbox%20called%20&amp;quot;Use%20Identity%20Provider&amp;#39;s%20login%20page&amp;quot;?"&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Why%20does%20accessing%20a%20servlet%20plug-in%20or%20web%20API%20fail,%20even%20when%20using%20credentials%20of%20a%20user%20who%20isn&amp;#39;t%20in%20the%20SAML%20users%20group?"&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20should%20we%20set%20the%20&amp;quot;common%20name&amp;quot;%20to%20be%20when%20generating%20a%20certificate?"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20private%20key%20used%20for%20when%20generating%20the%20certificate?"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20the%20certificate%20be%20signed%20by%20any%20trusted%20Certificate%20Authority%20(CA),%20like%20our%20internal%20Microsoft%20CA,%20or%20does%20it%20need%20to%20be%20a%20mutually-trusted%20cert,%20like%20Symantec%20or%20other%20CA?"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Does%20Appian%20support%20encrypted%20SAML%20assertions?"&gt;Does Appian support encrypted SAML assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20dropdown%20called%20&amp;quot;Authentication%20Method&amp;quot;?"&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the Service Provider Certificate and where can I find it?"&gt;&lt;/a&gt;What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See &lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" target="_blank"&gt;KB-1108&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Appian is the service provider. Why do customers provide the service provider certificate?"&gt;&lt;/a&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Once the service provider certificate is generated, how should this be integrated with the identity provider?"&gt;&lt;/a&gt;Once the service provider certificate is generated, how should this be integrated with the identity provider?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The public key is provided as part of the service provider metadata. It is necessary to provide the service provider metadata file to the IdP team to be uploaded per the IdP&amp;#39;s documentation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?"&gt;&lt;/a&gt;How can I find the Assertion Consumer Service (ACS) and Single Log Out (SLO) URLs to provide to the IdP?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;ACS and SLO&amp;nbsp;URLs can be found in the Service Provider (SP) metadata file that is generated in the Admin Console during SAML setup. To generate the SP metadata file, follow the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="https://docs.appian.com/suite/help/latest/SAML_for_Single_Sign-On.html#how-to-add-a-saml-identity-provider" target="_blank" rel="nofollow"&gt;How to Add a SAML Identity Provider&lt;/a&gt;&amp;nbsp;instructions. After completing steps 1-7, the SP metadata file is generated in step 8. The URLs are in this generated file, which needs to be uploaded to the IdP.&lt;/p&gt;
&lt;p&gt;If your IdP does not have a field&amp;nbsp;to upload the SP metadata file, please refer to the following question.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?"&gt;&lt;/a&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag. &lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" target="_blank" rel="noreferrer"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" target="_blank" rel="noreferrer"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?"&gt;&lt;/a&gt;I have noticed that clicking &amp;quot;Sign Out&amp;quot; button in Appian is only logging users out of Appian (not the IdP). How can I configure SAML to log users out of both Appian and the IdP when clicking &amp;quot;Sign Out&amp;quot; in Appian?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To&amp;nbsp;sign the user out of both Appian AND the IdP entity, this is the corresponding flow (the single logout service must be defined):&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;If a Single Log Out (SLO) service is defined in the IdP metadata, Appian will send a logout request to the specified logout URL when the &amp;quot;Sign Out&amp;quot; button is clicked in Appian.&lt;/li&gt;
&lt;li&gt;The IdP needs to process the logout request and send a successful logout response to Appian.&lt;/li&gt;
&lt;li&gt;After Appian receives a successful response from the IdP, Appian terminates the user&amp;#39;s session.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If there is no SLO URL defined in the IdP metadata file, then the Appian &amp;quot;Sign Out&amp;quot; button will only end the user&amp;#39;s Appian session. This is because Appian has not been instructed to send the logout request to another entity (e.g. the IdP). In other words, if the IdP wants Appian to contact it upon logout, it is upon the IdP to expose the single logout service, as Appian does not have control over ending user sessions for another entity. This behavior is in line with the&amp;nbsp;&lt;a class="external-link" title="Follow link" href="http://saml.xml.org/saml-specifications" target="_blank" rel="nofollow"&gt;SAML 2.0 specifications&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?"&gt;&lt;/a&gt;I have noticed that logging out of my IdP does not end my session in Appian. How can I configure this to end my session in Appian too?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When logging out of the IdP, it is necessary for the IdP to then send a successful logout response to Appian. Once Appian receives a successful logout response from the IdP, Appian will terminate the user&amp;#39;s session.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does a process model published as web service fail after configuring SAML?"&gt;&lt;/a&gt;Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users &lt;strong&gt;do not&lt;/strong&gt; belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about &lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?"&gt;&lt;/a&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the purpose of the checkbox called &amp;quot;Use Identity Provider's login page&amp;quot;?"&gt;&lt;/a&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending &lt;code&gt;?signin=[identifier]&lt;/code&gt; to the site URL, where &lt;code&gt;identifier&lt;/code&gt; is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn't in the SAML users group?"&gt;&lt;/a&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the private key used for when generating the certificate?"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow &lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt; to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Does Appian support encrypted SAML assertions?"&gt;&lt;/a&gt;Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, on-premise environments will need to be running OpenJDK 8 or have the JCE security JAR installed for the Oracle Java JDK. Once the JCE security JAR is installed, perform the following steps in the Appian on-premise environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Starting_and_Stopping_Appian.html" target="_blank"&gt;Restart Appian&lt;/a&gt;, so that it picks up the newly installed JCE security JAR.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the dropdown called &amp;quot;Authentication Method&amp;quot;?"&gt;&lt;/a&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;March 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, authentication&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/14</link><pubDate>Wed, 12 Dec 2018 15:25:17 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>Jordan Horwat</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 14 posted to Appian Knowledge Base by Jordan Horwat on 12/12/2018 3:25:17 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20Service%20Provider%20Certificate%20and%20where%20can%20I%20find%20it?"&gt;What is the Service Provider Certificate and where can I find it?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Appian%20is%20the%20service%20provider.%20Why%20do%20customers%20provide%20the%20service%20provider%20certificate?"&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#My%20identity%20provider%20does%20not%20have%20a%20field%20to%20upload%20a%20service%20provider%20metadata%20file.%20How%20do%20I%20configure%20SAML?"&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Why%20does%20a%20process%20model%20published%20as%20web%20service%20fail%20after%20configuring%20SAML?"&gt;Why does a process model published as web service fail after configuring SAML?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#I%20see%20&amp;quot;Authentication%20was%20successful&amp;quot;%20in%20the%20SAML%20test%20window,%20but%20admin%20console%20says%20&amp;quot;Login%20failed...&amp;quot;.%20Why%20is%20this?"&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20purpose%20of%20the%20checkbox%20called%20&amp;quot;Use%20Identity%20Provider&amp;#39;s%20login%20page&amp;quot;?"&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Why%20does%20accessing%20a%20servlet%20plug-in%20or%20web%20API%20fail,%20even%20when%20using%20credentials%20of%20a%20user%20who%20isn&amp;#39;t%20in%20the%20SAML%20users%20group?"&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20should%20we%20set%20the%20&amp;quot;common%20name&amp;quot;%20to%20be%20when%20generating%20a%20certificate?"&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20private%20key%20used%20for%20when%20generating%20the%20certificate?"&gt;What is the private key used for when generating the certificate?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Can%20the%20certificate%20be%20signed%20by%20any%20trusted%20Certificate%20Authority%20(CA),%20like%20our%20internal%20Microsoft%20CA,%20or%20does%20it%20need%20to%20be%20a%20mutually-trusted%20cert,%20like%20Symantec%20or%20other%20CA?"&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#Does%20Appian%20support%20encrypted%20SAML%20assertions?"&gt;Does Appian support encrypted SAML assertions?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#What%20is%20the%20dropdown%20called%20&amp;quot;Authentication%20Method&amp;quot;?"&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the Service Provider Certificate and where can I find it?"&gt;&lt;/a&gt;What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See &lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" target="_blank"&gt;KB-1108&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Appian is the service provider. Why do customers provide the service provider certificate?"&gt;&lt;/a&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?"&gt;&lt;/a&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag. &lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" target="_blank" rel="noreferrer"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" target="_blank" rel="noreferrer"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does a process model published as web service fail after configuring SAML?"&gt;&lt;/a&gt;Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users &lt;strong&gt;do not&lt;/strong&gt; belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about &lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?"&gt;&lt;/a&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the purpose of the checkbox called &amp;quot;Use Identity Provider's login page&amp;quot;?"&gt;&lt;/a&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending &lt;code&gt;?signin=[identifier]&lt;/code&gt; to the site URL, where &lt;code&gt;identifier&lt;/code&gt; is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn't in the SAML users group?"&gt;&lt;/a&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?"&gt;&lt;/a&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the private key used for when generating the certificate?"&gt;&lt;/a&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?"&gt;&lt;/a&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow &lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt; to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="Does Appian support encrypted SAML assertions?"&gt;&lt;/a&gt;Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, on-premise environments will need to be running OpenJDK 8 or have the JCE security JAR installed for the Oracle Java JDK. Once the JCE security JAR is installed, perform the following steps in the Appian on-premise environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Starting_and_Stopping_Appian.html" target="_blank"&gt;Restart Appian&lt;/a&gt;, so that it picks up the newly installed JCE security JAR.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="What is the dropdown called &amp;quot;Authentication Method&amp;quot;?"&gt;&lt;/a&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: June 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, authentication&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/13</link><pubDate>Fri, 07 Dec 2018 15:17:02 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>Jordan Horwat</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 13 posted to Appian Knowledge Base by Jordan Horwat on 12/7/2018 3:17:02 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See &lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" target="_blank"&gt;KB-1108&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag. &lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" target="_blank" rel="noreferrer"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" target="_blank" rel="noreferrer"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users &lt;strong&gt;do not&lt;/strong&gt; belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about &lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending &lt;code&gt;?signin=[identifier]&lt;/code&gt; to the site URL, where &lt;code&gt;identifier&lt;/code&gt; is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow &lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt; to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, on-premise environments will need to be running OpenJDK 8 or have the JCE security JAR installed for the Oracle Java JDK. Once the JCE security JAR is installed, perform the following steps in the Appian on-premise environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Starting_and_Stopping_Appian.html" target="_blank"&gt;Restart Appian&lt;/a&gt;, so that it picks up the newly installed JCE security JAR.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: June 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, authentication&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/12</link><pubDate>Mon, 25 Jun 2018 04:25:30 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 12 posted to Appian Knowledge Base by Parmida Borhani on 6/25/2018 4:25:30 AM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See &lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" target="_blank"&gt;KB-1108&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag. &lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" target="_blank" rel="noreferrer"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" target="_blank" rel="noreferrer"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Q: Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users &lt;strong&gt;do not&lt;/strong&gt; belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about &lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending &lt;code&gt;?signin=[identifier]&lt;/code&gt; to the site URL, where &lt;code&gt;identifier&lt;/code&gt; is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow &lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt; to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt;&amp;nbsp;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, on-premise environments will need to be running OpenJDK 8 or have the JCE security JAR installed for the Oracle Java JDK. Once the JCE security JAR is installed, perform the following steps in the Appian on-premise environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Starting_and_Stopping_Appian.html" target="_blank"&gt;Restart Appian&lt;/a&gt;, so that it picks up the newly installed JCE security JAR.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: June 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, authentication&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/11</link><pubDate>Fri, 22 Jun 2018 18:12:30 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>Yonas Samuel</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 11 posted to Appian Knowledge Base by Yonas Samuel on 6/22/2018 6:12:30 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See &lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" target="_blank"&gt;KB-1108&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag. &lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" target="_blank" rel="noreferrer"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" target="_blank" rel="noreferrer"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Q: Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users &lt;strong&gt;do not&lt;/strong&gt; belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about &lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending &lt;code&gt;?signin=[identifier]&lt;/code&gt; to the site URL, where &lt;code&gt;identifier&lt;/code&gt; is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow &lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt; to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt;&amp;nbsp;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, on-premises environments will need to be running OpenJDK 8 or have the JCE security jar installed for the Oracle Java JDK. Once the JCE security jar is installed, perform the following steps in the Appian on-premise environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://docs.appian.com/suite/help/18.2/Starting_and_Stopping_Appian.html"&gt;Restart Appian&lt;/a&gt;, so that it picks up the newly installed JCE security jar.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: February 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, authentication&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/10</link><pubDate>Fri, 22 Jun 2018 18:11:02 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>Yonas Samuel</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 10 posted to Appian Knowledge Base by Yonas Samuel on 6/22/2018 6:11:02 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See &lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" target="_blank"&gt;KB-1108&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag. &lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" target="_blank" rel="noreferrer"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" target="_blank" rel="noreferrer"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Q: Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users &lt;strong&gt;do not&lt;/strong&gt; belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about &lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending &lt;code&gt;?signin=[identifier]&lt;/code&gt; to the site URL, where &lt;code&gt;identifier&lt;/code&gt; is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow &lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt; to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt;&amp;nbsp;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, on-premises environments will need to be running OpenJDK 8 or have the JCE security jar installed for the Oracle Java JDK. Once the JCE security jar is installed, perform the following steps in the Appian on-premise environment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Restart Appian, so that it picks up the newly installed JCE security jar.&lt;/li&gt;
&lt;li&gt;Regenerate the service provider metadata file in the Admin Console.&lt;/li&gt;
&lt;li&gt;Provide this metadata file to your identity provider.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: February 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, authentication&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/9</link><pubDate>Mon, 26 Feb 2018 13:30:16 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>Nick Vigilante</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 9 posted to Appian Knowledge Base by Nick Vigilante on 2/26/2018 1:30:16 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See &lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" target="_blank"&gt;KB-1108&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag. &lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" target="_blank" rel="noreferrer"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" target="_blank" rel="noreferrer"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Q: Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users &lt;strong&gt;do not&lt;/strong&gt; belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about &lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending &lt;code&gt;?signin=[identifier]&lt;/code&gt; to the site URL, where &lt;code&gt;identifier&lt;/code&gt; is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow &lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt; to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt;&amp;nbsp;As of 18.1, Appian supports signed, encrypted SAML assertions up to the AES-256 standard. In order to make use of this capability, the environment must be running on an Appian Cloud instance. Otherwise, on-premises environments will need to be running OpenJDK 8 or have the JCE security jar installed for the Oracle Java JDK.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: February 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, authentication&lt;/div&gt;
</description></item><item><title>KB-1153 SAML Authentication FAQ</title><link>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq/revision/8</link><pubDate>Wed, 20 Dec 2017 21:26:52 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:658995df-dbc9-4022-b156-09d04c440d59</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/370/kb-1153-saml-authentication-faq#comments</comments><description>Revision 8 posted to Appian Knowledge Base by Parmida Borhani on 12/20/2017 9:26:52 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;p&gt;The purpose of this article is to provide answers to some of the common questions related to SAML authentication in Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the Service Provider Certificate and where can I find it?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Appian requires a .PEM file as a certificate and it will not be provided by the identity provider (IdP). The certificates from an SSL enabled web server can be used, else self-signed certificates will also work if allowed by the identity provider. If a .PEM file cannot be found in the certificates then the .CRT and .KEY files can be combined to be create this.&lt;/p&gt;
&lt;p&gt;See &lt;a href="/support/w/kb/330/kb-1108-how-to-create-a-self-signed-certificate-for-saml-authentication" target="_blank"&gt;KB-1108&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Appian is the service provider. Why do customers provide the service provider certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; In the context of the cloud-based SAAS, Appian (the company) is the service provider. However, in the context of SAML authentication, Appian (their instance of the software environment) is the service provider. Therefore, since it is up to the customer to configure their environment correctly for their needs, they need to supply their own certificate so that the SAML service provider (their environment) can work correctly. Additionally, this allows the customer control over the certificate to ensure that it meets the requirements of their identity provider and security policy (e.g., number of bits).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: My identity provider does not have a field to upload a service provider metadata file. How do I configure SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; On the IdP side, if the option to upload a metadata file is not available, open the .XML file generated by Appian and configure SAML using the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;EntityID: Copy the value of the &amp;quot;entityID&amp;quot; parameter inside the &amp;quot;md:EntityDescriptor&amp;quot; tag.&lt;code&gt;&amp;lt;md:EntityDescriptor entityID=&amp;quot;mysite.example.com&amp;quot; xmlns:md=&amp;quot;urn:oasis:names:tc:SAML:2.0:metadata&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Assertion Consumer URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside the &amp;quot;md:AssertionConsumerService&amp;quot; tag. &lt;code&gt;&amp;lt;md:AssertionConsumerService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/AssertionConsumer" target="_blank" rel="noreferrer"&gt;https://mysite.example.com/suite/saml/AssertionConsumer&lt;/a&gt;&amp;quot; index=&amp;quot;0&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Logout URL: Copy the value of the &amp;quot;Location&amp;quot; parameter inside any &amp;quot;md:SingleLogoutService&amp;quot; tag.&lt;code&gt;&amp;lt;md:SingleLogoutService Binding=&amp;quot;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST&amp;quot; Location=&amp;quot;&lt;a href="https://mysite.example.com/suite/saml/LogoutConsumer" target="_blank" rel="noreferrer"&gt;https://mysite.example.com/suite/saml/LogoutConsumer&lt;/a&gt;&amp;quot;/&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Q: Why does a process model published as web service fail after configuring SAML?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Appian requires web service users to use Appian authentication, and web services will fail if these users get authenticated by SAML. To avoid the error, restrict SAML authentication to a specific group and make sure the web service users &lt;strong&gt;do not&lt;/strong&gt; belong to this group. Now, these users will be authenticated by Appian and web services should work correctly. For more details about this, please read the documentation about &lt;a href="https://docs.appian.com/suite/help/latest/Publishing_Process_Models_as_Web_Services.html"&gt;Publishing Process Models as Web Services&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: I see &amp;quot;Authentication was successful&amp;quot; in the SAML test window, but admin console says &amp;quot;Login failed...&amp;quot;. Why is this?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; This means that the identity provider did not provide a response as expected by Appian, but users will be able to log in. The behavior has been fixed in Appian 16.1 and above. In older versions, to enable SAML without testing, configure a SAML users group and use the same settings without being a part of that SAML users group.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the purpose of the checkbox called &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; When the option is checked, users navigating to the Appian environment will be redirected to the IdP login page by default. This is SP-initiated SAML authentication. If this configuration is used, users that do not get authenticated via SAML can login using Appian authentication at the URL&amp;nbsp;&lt;em&gt;&lt;a href="https://mysite.example.com/suite/portal/login.jsp"&gt;https://mysite.example.com/suite/portal/login.jsp&lt;/a&gt;.&amp;nbsp;&lt;/em&gt;If &amp;quot;Use Identity Provider&amp;#39;s login page&amp;quot; is unchecked,&amp;nbsp;all users will be directed to the Appian login page by default. Users that authenticate with SAML will need to use use one of the following approaches:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IdP-initiated SAML authentication&lt;/li&gt;
&lt;li&gt;Appending &lt;code&gt;?signin=[identifier]&lt;/code&gt; to the site URL, where &lt;code&gt;identifier&lt;/code&gt; is the value specified in the &amp;quot;Web Address Identifier&amp;quot; parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If using IdP-initiated SAML authentication, users will first need an active session with the IdP before navigating to Appian. For example, some IdPs will have the option to configure an Appian link from an internal portal/intranet page. Note that IdP-initiated SAML is not currently supported from embedded environments or mobile.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Why does accessing a servlet plug-in or web API fail, even when using credentials of a user who isn&amp;#39;t in the SAML users group?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; The plugin or service that is attempting to access the Appian resource needs to use preemptive basic auth. If you don&amp;#39;t authenticate preemptively, you will be challenged to authenticate via SAML and the authentication will fail.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What should we set the &amp;quot;common name&amp;quot; to be when generating a certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Common name can be anything that is desired and/or that one has the ability to generate; there is no restriction on common name from the Appian side&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the private key used for when generating the certificate?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Private key will only be used for signing SAML assertions; it will NOT be used for SSL encryption via HTTPS communications. Both SP and IdP each have a private key used to sign SAML assertions. The public key of each certificate is passed via the exchanged metadata files so that the SP and IdP can verify the authenticity of the assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Can the certificate be signed by any trusted Certificate Authority (CA), like our internal Microsoft CA, or does it need to be a mutually-trusted cert, like Symantec or other CA?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; There is no requirement for a CA signed certificate, so you are free to use a self-signed certificates if you desire. You can follow &lt;a href="https://docs.appian.com/suite/help/latest/kb/kb-1108.html"&gt;KB-1108&lt;/a&gt; to generate self-signed certs. For a production environment, however, Appian Technical Support recommends a CA signed certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: Does Appian support encrypted SAML assertions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; Appian currently does not support encrypted assertions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Q: What is the dropdown called &amp;quot;Authentication Method&amp;quot;?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A:&lt;/strong&gt; This is the SP preferred authentication mechanism/method. It sets the RequestAuthnContext in the AuthnRequest. With the default method selection, the RequestAuthnContext tag sets the Comparison to &amp;quot;minimum&amp;quot;, which the IdP can choose to acknowledge or ignore. If selection from drop-down is None, the AuthnRequest will not contain a RequestedAuthnContext tag. Depending on the IdP implementation, some IdPs may choose to ignore the preferred authentication mechanism&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to Appian 7.11 and later.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: November 2017&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, SAML, authentication&lt;/div&gt;
</description></item></channel></rss>