<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-1187 "PKIX path building failed: error when attempting to make a call to an external server" error thrown when making web service calls over HTTPS or LDAPS</title><link>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-1187 "PKIX path building failed: error when attempting to make a call to an external server" error thrown when making web service calls over HTTPS or LDAPS</title><link>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps</link><pubDate>Tue, 17 Mar 2026 15:40:30 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:e9477483-a544-4428-9671-0f07863179cf</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps#comments</comments><description>Current Revision posted to Appian Knowledge Base by pauline.delacruz on 3/17/2026 3:40:30 PM&lt;br /&gt;
&lt;h2 id="symptoms"&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;Making a web service call to an external server fails and the&amp;nbsp;following is seen in the application server log:&lt;/p&gt;
&lt;div class="content-scrollable-wrapper content-scrollable-wrapper-scrolled"&gt;
&lt;pre class="code-java"&gt;sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target&lt;/pre&gt;
&lt;/div&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;The certificate&amp;nbsp;presented by the external server is not trusted by Appian because it has not been imported to the trust store.&lt;/p&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;h3&gt;Cloud&lt;/h3&gt;
&lt;p&gt;If the connection to the external server&amp;nbsp;originates from one of the services documented&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#trusted-server-certificates"&gt;here&lt;/a&gt;,&amp;nbsp;upload the&amp;nbsp;certificate (&lt;strong&gt;.pem&lt;/strong&gt;) to the Trusted Server Certificates section of the Admin Console. Otherwise:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;If the certificate is self-signed, obtain a new certificate from a publicly-trusted CA.&lt;/li&gt;
&lt;li&gt;If the certificate is already CA-signed, ensure that the external server is configured to present all intermediate certificates up to the CA root certificate.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Self-managed&amp;nbsp;&lt;/h3&gt;
&lt;h4&gt;&lt;span&gt;18.3 and later&lt;/span&gt;&lt;/h4&gt;
&lt;p&gt;If the connection to the external server&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;originates from one of the services documented&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#trusted-server-certificates"&gt;here&lt;/a&gt;,&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;upload the&amp;nbsp;certificate (.pem) to the Trusted Server Certificates section of the Admin Console.&amp;nbsp;Otherwise, refer to&amp;nbsp;&lt;/span&gt;&lt;span&gt;the steps below&amp;nbsp;&lt;/span&gt;&lt;span&gt;to import the certificate into the Java trust store.&amp;nbsp;&lt;/span&gt;&lt;span&gt;&lt;strong&gt;Note:&amp;nbsp;&lt;/strong&gt;In&amp;nbsp;Appian&amp;nbsp;19.1 and later, Java comes bundled with Appian so&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/java&lt;/code&gt;&amp;nbsp;should be used instead of&amp;nbsp;&lt;code&gt;JAVA_HOME&lt;/code&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;h4&gt;18.2 and earlier&lt;/h4&gt;
&lt;ol&gt;
&lt;li&gt;Import the certificate into the default Java trust store:
&lt;h5&gt;Linux&lt;/h5&gt;
&lt;div class="content-scrollable-wrapper content-scrollable-wrapper-scrolled"&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore $JAVA_HOME/jre/lib/security/cacerts&lt;/pre&gt;
&lt;/div&gt;
&lt;h5&gt;&lt;span&gt;Windows&lt;/span&gt;&lt;/h5&gt;
&lt;div class="content-scrollable-wrapper content-scrollable-wrapper-scrolled"&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot; &lt;/pre&gt;
&lt;/div&gt;
If importing multiple certificates, make sure that the alias is different for each command. The alias can be anything, usually the name this certificate was issued for.&lt;/li&gt;
&lt;li&gt;Verify that the import was successful:
&lt;h5&gt;&lt;span&gt;Linux&lt;/span&gt;&lt;/h5&gt;
&lt;div class="content-scrollable-wrapper"&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -list -keystore $JAVA_HOME/jre/lib/security/cacerts | grep ##ALIASNAME##&lt;/pre&gt;
&lt;/div&gt;
&lt;h5&gt;&lt;span&gt;Windows&lt;/span&gt;&lt;/h5&gt;
&lt;div class="content-scrollable-wrapper"&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -list -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot; | findstr ##ALIASNAME## &lt;/pre&gt;
&lt;/div&gt;
The above command (without the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;| grep ##ALIASNAME##&lt;/code&gt;&amp;nbsp;or&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;code&gt;| findstr ##ALIASNAME##&lt;/code&gt;)&amp;nbsp;can also be used to check what certificates are currently in the trust store. These are the default trusted certificates that come up with a standard Appian Installation.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Restart the application server to deploy changes.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt;&lt;span&gt;&amp;nbsp;C&lt;/span&gt;ertificates imported using the steps above&amp;nbsp;are&amp;nbsp;cleared on&amp;nbsp;hotfixes and upgrades,&amp;nbsp;after which they need to be re-imported to the trust store.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: March 2026&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, process models, integration, admin console, web services, Certificates&lt;/div&gt;
</description></item><item><title>KB-1187 "PKIX path building failed: error when attempting to make a call to an external server" error thrown when making web service calls over HTTPS or LDAPS</title><link>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps/revision/15</link><pubDate>Thu, 18 May 2023 15:21:40 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:e9477483-a544-4428-9671-0f07863179cf</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps#comments</comments><description>Revision 15 posted to Appian Knowledge Base by Elly Meng on 5/18/2023 3:21:40 PM&lt;br /&gt;
&lt;h2 id="symptoms"&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;Making a web service call to an external server fails and the&amp;nbsp;following is seen in the application server log:&lt;/p&gt;
&lt;pre class="code-java"&gt;sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target&lt;/pre&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;The certificate&amp;nbsp;presented by the external server is not trusted by Appian because it has not been imported to the trust store.&lt;/p&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;h3&gt;Cloud&lt;/h3&gt;
&lt;p&gt;If the connection to the external server&amp;nbsp;originates from one of the services documented &lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#trusted-server-certificates"&gt;here&lt;/a&gt;,&amp;nbsp;upload the&amp;nbsp;certificate (&lt;strong&gt;.pem&lt;/strong&gt;) to the Trusted Server Certificates section of the Admin Console. Otherwise:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;If the certificate is self-signed, obtain a new certificate from a publicly-trusted CA.&lt;/li&gt;
&lt;li&gt;If the certificate is already CA-signed, ensure that the external server is configured to present all intermediate certificates up to the CA root certificate.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Self-managed&amp;nbsp;&lt;/h3&gt;
&lt;h4&gt;&lt;span style="font-size:inherit;"&gt;18.3 and later&lt;/span&gt;&lt;/h4&gt;
&lt;p&gt;If the connection to the external server &lt;span&gt;originates from one of the services documented&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Appian_Administration_Console.html#trusted-server-certificates"&gt;here&lt;/a&gt;, &lt;span&gt;upload the&amp;nbsp;certificate (.pem) to the Trusted Server Certificates section of the Admin Console.&amp;nbsp;Otherwise, refer to&amp;nbsp;&lt;/span&gt;&lt;span&gt;the steps below &lt;/span&gt;&lt;span&gt;to import the certificate into the Java trust store.&amp;nbsp;&lt;/span&gt;&lt;span&gt;&lt;strong&gt;Note: &lt;/strong&gt;In&amp;nbsp;Appian&amp;nbsp;19.1 and later, Java comes bundled with Appian so &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/java&lt;/code&gt; should be used instead of&amp;nbsp;&lt;code&gt;JAVA_HOME&lt;/code&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;h4&gt;18.2 and earlier&lt;/h4&gt;
&lt;ol&gt;
&lt;li&gt;Import the certificate into the default Java trust store:
&lt;h5&gt;Linux&lt;/h5&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore $JAVA_HOME/jre/lib/security/cacerts&lt;/pre&gt;
&lt;h5&gt;&lt;span style="font-size:inherit;"&gt;Windows&lt;/span&gt;&lt;/h5&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot; &lt;/pre&gt;
If importing multiple certificates, make sure that the alias is different for each command. The alias can be anything, usually the name this certificate was issued for.&lt;/li&gt;
&lt;li&gt;Verify that the import was successful:
&lt;h5&gt;&lt;span style="font-size:inherit;"&gt;Linux&lt;/span&gt;&lt;/h5&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -list -keystore $JAVA_HOME/jre/lib/security/cacerts | grep ##ALIASNAME##&lt;/pre&gt;
&lt;h5&gt;&lt;span style="font-size:inherit;"&gt;Windows&lt;/span&gt;&lt;/h5&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -list -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot; | findstr ##ALIASNAME## &lt;/pre&gt;
The above command (without the &lt;code&gt;| grep ##ALIASNAME##&lt;/code&gt;&amp;nbsp;or &lt;code&gt;| findstr ##ALIASNAME##&lt;/code&gt;)&amp;nbsp;can also be used to check what certificates are currently in the trust store. These are the default trusted certificates that come up with a standard Appian Installation.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Restart the application server to deploy changes.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; certificates imported using the steps above will be cleared on site restart and need to be re-imported to the trust store.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: May 2023&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, process models, integration, admin console, web services, Certificates&lt;/div&gt;
</description></item><item><title>KB-1187 "PKIX path building failed: error when attempting to make a call to an external server" error thrown when making web service calls over HTTPS or LDAPS</title><link>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps/revision/14</link><pubDate>Thu, 06 Sep 2018 20:13:24 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:e9477483-a544-4428-9671-0f07863179cf</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps#comments</comments><description>Revision 14 posted to Appian Knowledge Base by Parmida Borhani on 9/6/2018 8:13:24 PM&lt;br /&gt;
&lt;div class="row content_container"&gt; &lt;h2 id="symptoms"&gt;Symptoms&lt;/h2&gt; &lt;p&gt;Making a call to an external server over HTTPS or LDAPS fails because the application server does not trust the CA which was used to sign the certificate the external server presents. The following error will be seen in the application server log:&lt;/p&gt; &lt;pre class="code-java"&gt;sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target&lt;/pre&gt; &lt;h2 id="cause"&gt;Cause&lt;/h2&gt; &lt;p&gt;This is because the certificate being presented by the external server is not trusted by the application server for one of the following reasons:&lt;/p&gt; &lt;ol&gt; &lt;li&gt;The certificate is self-signed.&lt;/li&gt; &lt;li&gt;The certificate is signed by a Certificate Authority, but the server is not presenting the full certificate chain with all intermediate certs up to the CA root cert.&lt;/li&gt; &lt;/ol&gt; &lt;h2 id="action"&gt;Action&lt;/h2&gt; &lt;h3&gt;18.3 and later&lt;/h3&gt; &lt;ol&gt; &lt;li&gt;Navigate to the Appian Administration Console.&lt;/li&gt; &lt;li&gt;Click on &lt;strong&gt;Certificates&lt;/strong&gt;&amp;nbsp;-&amp;gt; &lt;strong&gt;Trusted Certificates&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Click &amp;#39;&lt;strong&gt;New Trusted Certificate&lt;/strong&gt;&amp;#39; and upload the&amp;nbsp;&lt;strong&gt;.pem&amp;nbsp;&lt;/strong&gt;formatted certificate file.&lt;/li&gt; &lt;/ol&gt; &lt;h3&gt;18.2 and earlier&lt;/h3&gt; &lt;h4&gt;Self-managed&lt;/h4&gt; &lt;p&gt;Use the following command to import the certificate into the default JDK&amp;nbsp;trust store:&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt; &lt;pre&gt;$JAVA_HOME/bin/keytool -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore $JAVA_HOME/jre/lib/security/cacerts&lt;/pre&gt; &lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt; &lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot; &lt;/pre&gt; &lt;p&gt;If importing multiple certificates, make sure that the alias is different for each command. The alias can be anything and is just a name in this case, usually the name this certificate was issued for.&lt;/p&gt; &lt;p&gt;To verify if the import has been done, run the following command:&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt; &lt;pre&gt;$JAVA_HOME/bin/keytool -list -keystore $JAVA_HOME/jre/lib/security/cacerts | grep ##ALIASNAME##&lt;/pre&gt; &lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt; &lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -list -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot; | findstr ##ALIASNAME## &lt;/pre&gt; &lt;p&gt;The above command (without the &lt;code&gt;| grep ##ALIASNAME##&lt;/code&gt;&amp;nbsp;or &lt;code&gt;| findstr ##ALIASNAME##&lt;/code&gt;)&amp;nbsp;can also be used to check what certificates are currently in the trust store. These are the default trusted certificates that come up with a standard installation of Java.&lt;/p&gt; &lt;p&gt;After importing the certificate into the JDK trust store, perform an application server restart to load the certificate.&lt;/p&gt; &lt;h4&gt;Cloud&lt;/h4&gt; &lt;p&gt;Importing certificates into the Java TrustStore is not supported on Appian Cloud.&lt;/p&gt; &lt;ul&gt; &lt;li&gt;If you already have a CA-signed certificate, make sure your external server has all intermediate certificates up to the CA root certificate installed.&lt;/li&gt; &lt;li&gt;If you have a self-signed certificate, obtain a new CA-signed certificate from a certificate authority.&lt;/li&gt; &lt;li&gt;If this error is appearing while attempting to call a web service, try using the&amp;nbsp;&lt;a href="/b/appmarket/posts/advanced-call-web-service" target="_blank"&gt;Advanced Call Web Service&lt;/a&gt;&amp;nbsp;shared component.&lt;/li&gt; &lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: Anything provided in the App Market is provided as-is, and the functionality cannot be guaranteed by Appian.&lt;/p&gt; &lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt; &lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt; &lt;/div&gt; &lt;p&gt;Last Reviewed: September 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, process models, integration, admin console, web services, Certificates&lt;/div&gt;
</description></item><item><title>KB-1187 "PKIX path building failed: error when attempting to make a call to an external server" error thrown when making web service calls over HTTPS or LDAPS</title><link>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps/revision/13</link><pubDate>Thu, 06 Sep 2018 20:13:07 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:e9477483-a544-4428-9671-0f07863179cf</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps#comments</comments><description>Revision 13 posted to Appian Knowledge Base by Parmida Borhani on 9/6/2018 8:13:07 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;h2 id="symptoms"&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;Making a call to an external server over HTTPS or LDAPS fails because the application server does not trust the CA which was used to sign the certificate the external server presents. The following error will be seen in the application server log:&lt;/p&gt;
&lt;pre class="code-java"&gt;sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target&lt;/pre&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;This is because the certificate being presented by the external server is not trusted by the application server for one of the following reasons:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The certificate is self-signed.&lt;/li&gt;
&lt;li&gt;The certificate is signed by a Certificate Authority, but the server is not presenting the full certificate chain with all intermediate certs up to the CA root cert.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;h3&gt;18.3 and later&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Navigate to the Appian Administration Console.&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Certificates&lt;/strong&gt;&amp;nbsp;-&amp;gt; &lt;strong&gt;Trusted Certificates&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Click &amp;#39;&lt;strong&gt;New Trusted Certificate&lt;/strong&gt;&amp;#39; and upload the&amp;nbsp;&lt;strong&gt;.pem&amp;nbsp;&lt;/strong&gt;formatted certificate file.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;18.2 and earlier&lt;/h3&gt;
&lt;h4&gt;On-Premise&lt;/h4&gt;
&lt;p&gt;Use the following command to import the certificate into the default JDK&amp;nbsp;trust store:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore $JAVA_HOME/jre/lib/security/cacerts&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot;
&lt;/pre&gt;
&lt;p&gt;If importing multiple certificates, make sure that the alias is different for each command. The alias can be anything and is just a name in this case, usually the name this certificate was issued for.&lt;/p&gt;
&lt;p&gt;To verify if the import has been done, run the following command:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -list -keystore $JAVA_HOME/jre/lib/security/cacerts | grep ##ALIASNAME##&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -list -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot; | findstr ##ALIASNAME##
&lt;/pre&gt;
&lt;p&gt;The above command (without the &lt;code&gt;| grep ##ALIASNAME##&lt;/code&gt;&amp;nbsp;or &lt;code&gt;| findstr ##ALIASNAME##&lt;/code&gt;)&amp;nbsp;can also be used to check what certificates are currently in the trust store. These are the default trusted certificates that come up with a standard installation of Java.&lt;/p&gt;
&lt;p&gt;After importing the certificate into the JDK trust store, perform an application server restart to load the certificate.&lt;/p&gt;
&lt;h4&gt;Cloud&lt;/h4&gt;
&lt;p&gt;Importing certificates into the Java TrustStore is not supported on Appian Cloud.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;If you already have a CA-signed certificate, make sure your external server has all intermediate certificates up to the CA root certificate installed.&lt;/li&gt;
&lt;li&gt;If you have a self-signed certificate, obtain a new CA-signed certificate from a certificate authority.&lt;/li&gt;
&lt;li&gt;If this error is appearing while attempting to call a web service, try using the&amp;nbsp;&lt;a href="/b/appmarket/posts/advanced-call-web-service" target="_blank"&gt;Advanced Call Web Service&lt;/a&gt;&amp;nbsp;shared component.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: Anything provided in the App Market is provided as-is, and the functionality cannot be guaranteed by Appian.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: September 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: process models, integration, web services, Certificates&lt;/div&gt;
</description></item><item><title>KB-1187 "PKIX path building failed: error when attempting to make a call to an external server" error thrown when making web service calls over HTTPS or LDAPS</title><link>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps/revision/12</link><pubDate>Thu, 06 Sep 2018 20:12:32 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:e9477483-a544-4428-9671-0f07863179cf</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps#comments</comments><description>Revision 12 posted to Appian Knowledge Base by Parmida Borhani on 9/6/2018 8:12:32 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;h2 id="symptoms"&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;Making a call to an external server over HTTPS or LDAPS fails because the application server does not trust the CA which was used to sign the certificate the external server presents. The following error will be seen in the application server log:&lt;/p&gt;
&lt;pre class="code-java"&gt;sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target&lt;/pre&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;This is because the certificate being presented by the external server is not trusted by the application server for one of the following reasons:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The certificate is self-signed.&lt;/li&gt;
&lt;li&gt;The certificate is signed by a Certificate Authority, but the server is not presenting the full certificate chain with all intermediate certs up to the CA root cert.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;h3&gt;18.3 and later&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Navigate to the Appian Administration Console.&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Certificates&lt;/strong&gt;&amp;nbsp;-&amp;gt; &lt;strong&gt;Trusted Certificates&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Click &amp;#39;&lt;strong&gt;New Trusted Certificate&lt;/strong&gt;&amp;#39; and upload the&amp;nbsp;&lt;strong&gt;.pem&amp;nbsp;&lt;/strong&gt;formatted certificate file.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;18.2 and earlier&lt;/h3&gt;
&lt;h4&gt;On-Premise&lt;/h4&gt;
&lt;p&gt;Use the following command to import the certificate into the default JDK&amp;nbsp;trust store:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore $JAVA_HOME/jre/lib/security/cacerts&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot;
&lt;/pre&gt;
&lt;p&gt;If importing multiple certificates, make sure that the alias is different for each command. The alias can be anything and is just a name in this case, usually the name this certificate was issued for.&lt;/p&gt;
&lt;p&gt;To verify if the import has been done, run the following command:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -list -keystore $JAVA_HOME/jre/lib/security/cacerts | grep ##ALIASNAME##&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -list -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot; | findstr ##ALIASNAME##
&lt;/pre&gt;
&lt;p&gt;The above command (without the &lt;code&gt;| grep ##ALIASNAME##&lt;/code&gt;&amp;nbsp;or &lt;code&gt;| findstr ##ALIASNAME##&lt;/code&gt;)&amp;nbsp;can also be used to check what certificates are currently in the trust store. These are the default trusted certificates that come up with a standard installation of Java.&lt;/p&gt;
&lt;p&gt;After importing the certificate into the JDK trust store, perform an application server restart to load the certificate.&lt;/p&gt;
&lt;h4&gt;Cloud&lt;/h4&gt;
&lt;p&gt;Importing certificates into the Java TrustStore is not supported on Appian Cloud.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;If you already have a CA-signed certificate, make sure your external server has all intermediate certificates up to the CA root certificate installed.&lt;/li&gt;
&lt;li&gt;If you have a self-signed certificate, obtain a new CA-signed certificate from a certificate authority.&lt;/li&gt;
&lt;li&gt;If this error is appearing while attempting to call a web service, try using the&amp;nbsp;&lt;a href="/b/appmarket/posts/advanced-call-web-service" target="_blank"&gt;Advanced Call Web Service&lt;/a&gt;&amp;nbsp;shared component.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: Anything provided in the App Market is provided as-is, and the functionality cannot be guaranteed by Appian.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: September 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: process models, integration, web services&lt;/div&gt;
</description></item><item><title>KB-1187 "PKIX path building failed: error when attempting to make a call to an external server" error thrown when making web service calls over HTTPS or LDAPS</title><link>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps/revision/11</link><pubDate>Wed, 05 Sep 2018 21:21:13 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:e9477483-a544-4428-9671-0f07863179cf</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps#comments</comments><description>Revision 11 posted to Appian Knowledge Base by Parmida Borhani on 9/5/2018 9:21:13 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;h2 id="symptoms"&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;Making a call to an external server over HTTPS or LDAPS fails because the application server does not trust the CA which was used to sign the certificate the external server presents. The following error will be seen in the application server log:&lt;/p&gt;
&lt;pre class="code-java"&gt;sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target&lt;/pre&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;This is because the certificate being presented by the external server is not trusted by the application server for one of the following reasons:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The certificate is self-signed.&lt;/li&gt;
&lt;li&gt;The certificate is signed by a Certificate Authority, but the server is not presenting the full certificate chain with all intermediate certs up to the CA root cert.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;h3&gt;On-Premise&lt;/h3&gt;
&lt;p&gt;Use the following command to import the certificate into the default JDK&amp;nbsp;trust store:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore $JAVA_HOME/jre/lib/security/cacerts&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot;
&lt;/pre&gt;
&lt;p&gt;If importing multiple certificates, make sure that the alias is different for each command. The alias can be anything and is just a name in this case, usually the name this certificate was issued for.&lt;/p&gt;
&lt;p&gt;To verify if the import has been done, run the following command:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -list -keystore $JAVA_HOME/jre/lib/security/cacerts | grep ##ALIASNAME##&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -list -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot; | findstr ##ALIASNAME##
&lt;/pre&gt;
&lt;p&gt;The above command (without the &lt;code&gt;| grep ##ALIASNAME##&lt;/code&gt;&amp;nbsp;or &lt;code&gt;| findstr ##ALIASNAME##&lt;/code&gt;)&amp;nbsp;can also be used to check what certificates are currently in the trust store. These are the default trusted certificates that come up with a standard installation of Java.&lt;/p&gt;
&lt;p&gt;After importing the certificate into the JDK trust store, perform an application server restart to load the certificate.&lt;/p&gt;
&lt;h3&gt;Cloud&lt;/h3&gt;
&lt;h4&gt;18.3 and later&lt;/h4&gt;
&lt;ol&gt;
&lt;li&gt;Navigate to the Appian Administration Console.&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Certificates&lt;/strong&gt;&amp;nbsp;-&amp;gt; &lt;strong&gt;Trusted Certificates&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Click &amp;#39;&lt;strong&gt;New Trusted Certificate&lt;/strong&gt;&amp;#39; and upload the&amp;nbsp;&lt;strong&gt;.pem&amp;nbsp;&lt;/strong&gt;formatted certificate file.&lt;/li&gt;
&lt;/ol&gt;
&lt;h4&gt;18.2 and earlier&lt;/h4&gt;
&lt;p&gt;Importing certificates into the Java TrustStore is not supported on Appian Cloud.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;If you already have a CA-signed certificate, make sure your external server has all intermediate certificates up to the CA root certificate installed.&lt;/li&gt;
&lt;li&gt;If you have a self-signed certificate, obtain a new CA-signed certificate from a certificate authority.&lt;/li&gt;
&lt;li&gt;If this error is appearing while attempting to call a web service, try using the&amp;nbsp;&lt;a href="/b/appmarket/posts/advanced-call-web-service" target="_blank"&gt;Advanced Call Web Service&lt;/a&gt;&amp;nbsp;shared component.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: Anything provided in the App Market is provided as-is, and the functionality cannot be guaranteed by Appian.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: September 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: process models, integration, web services&lt;/div&gt;
</description></item><item><title>KB-1187 "PKIX path building failed: error when attempting to make a call to an external server" error thrown when making web service calls over HTTPS or LDAPS</title><link>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps/revision/10</link><pubDate>Mon, 23 Jul 2018 03:57:39 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:e9477483-a544-4428-9671-0f07863179cf</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps#comments</comments><description>Revision 10 posted to Appian Knowledge Base by Parmida Borhani on 7/23/2018 3:57:39 AM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;h2 id="symptoms"&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;Making a call to an external server over HTTPS or LDAPS fails because the application server does not trust the CA which was used to sign the certificate the external server presents. The following error will be seen in the application server log:&lt;/p&gt;
&lt;pre class="code-java"&gt;sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target&lt;/pre&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;This is because the certificate being presented by the external server is not trusted by the application server for one of the following reasons:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The certificate is self-signed.&lt;/li&gt;
&lt;li&gt;The certificate is signed by a Certificate Authority, but the server is not presenting the full certificate chain with all intermediate certs up to the CA root cert.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;h3&gt;On-Premise&lt;/h3&gt;
&lt;p&gt;Use the following command to import the certificate into the default JDK&amp;nbsp;trust store:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore $JAVA_HOME/jre/lib/security/cacerts&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot;
&lt;/pre&gt;
&lt;p&gt;If importing multiple certificates, make sure that the alias is different for each command. The alias can be anything and is just a name in this case, usually the name this certificate was issued for.&lt;/p&gt;
&lt;p&gt;To verify if the import has been done, run the following command:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -list -keystore $JAVA_HOME/jre/lib/security/cacerts | grep ##ALIASNAME##&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -list -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot; | findstr ##ALIASNAME##
&lt;/pre&gt;
&lt;p&gt;The above command (without the &lt;code&gt;| grep ##ALIASNAME##&lt;/code&gt;&amp;nbsp;or &lt;code&gt;| findstr ##ALIASNAME##&lt;/code&gt;)&amp;nbsp;can also be used to check what certificates are currently in the trust store. These are the default trusted certificates that come up with a standard installation of Java.&lt;/p&gt;
&lt;p&gt;After importing the certificate into the JDK trust store, perform an application server restart to load the certificate.&lt;/p&gt;
&lt;h3&gt;Cloud&lt;/h3&gt;
&lt;p&gt;Importing certificates into the Java TrustStore is not supported on Appian Cloud.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;If you already have a CA-signed certificate, make sure your external server has all intermediate certificates up to the CA root certificate installed.&lt;/li&gt;
&lt;li&gt;If you have a self-signed certificate, obtain a new CA-signed certificate from a certificate authority.&lt;/li&gt;
&lt;li&gt;If this error is appearing while attempting to call a web service, try using the&amp;nbsp;&lt;a href="/b/appmarket/posts/advanced-call-web-service" target="_blank"&gt;Advanced Call Web Service&lt;/a&gt;&amp;nbsp;shared component.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: Anything provided in the app market is provided as-is, and the functionality cannot be guaranteed by Appian.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: May 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: process models, integration, web services&lt;/div&gt;
</description></item><item><title>KB-1187 "PKIX path building failed: error when attempting to make a call to an external server" error thrown when making web service calls over HTTPS or LDAPS</title><link>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps/revision/9</link><pubDate>Fri, 11 May 2018 09:55:11 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:e9477483-a544-4428-9671-0f07863179cf</guid><dc:creator>Nick Vigilante</dc:creator><comments>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps#comments</comments><description>Revision 9 posted to Appian Knowledge Base by Nick Vigilante on 5/11/2018 9:55:11 AM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;h2 id="symptoms"&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;Making a call to an external server over HTTPS or LDAPS fails because the application server does not trust the CA which was used to sign the certificate the external server presents. The following error will be seen in the application server log:&lt;/p&gt;
&lt;pre class="code-java"&gt;sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target&lt;/pre&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;This is because the certificate being presented by the external server is not trusted by the application server for one of the following reasons:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The certificate is self-signed.&lt;/li&gt;
&lt;li&gt;The certificate is signed by a Certificate Authority, but the server is not presenting the full certificate chain with all intermediate certs up to the CA root cert.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;h3&gt;On-Premise&lt;/h3&gt;
&lt;p&gt;Use the following command to import the certificate into the default JDK&amp;nbsp;trust store:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore $JAVA_HOME/jre/lib/security/cacerts&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot;
&lt;/pre&gt;
&lt;p&gt;If importing multiple certificates, make sure that the alias is different for each command. The alias can be anything and is just a name in this case, usually the name this certificate was issued for.&lt;/p&gt;
&lt;p&gt;To verify if the import has been done, run the following command:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -list -keystore $JAVA_HOME/jre/lib/security/cacerts | grep ##ALIASNAME##&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -list -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot; | findstr ##ALIASNAME##
&lt;/pre&gt;
&lt;p&gt;The above command (without the &lt;code&gt;| grep ##ALIASNAME##&lt;/code&gt;&amp;nbsp;or &lt;code&gt;| findstr ##ALIASNAME##&lt;/code&gt;)&amp;nbsp;can also be used to check what certificates are currently in the trust store. These are the default trusted certificates that come up with a standard installation of Java.&lt;/p&gt;
&lt;p&gt;After importing the certificate into the JDK trust store, perform an application server restart to load the certificate.&lt;/p&gt;
&lt;h3&gt;Cloud&lt;/h3&gt;
&lt;p&gt;Importing certificates into the Java TrustStore is not supported on Appian Cloud.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;If you already have a CA-signed certificate, make sure your external server has all intermediate certificates up to the CA root certificate installed.&lt;/li&gt;
&lt;li&gt;If you have a self-signed certificate, obtain a new CA-signed certificate from a certificate authority.&lt;/li&gt;
&lt;li&gt;If this error is appearing while attempting to call a web service, try using the&amp;nbsp;&lt;a href="/b/appmarket/posts/advanced-call-web-service" target="_blank"&gt;Advanced Call Web Service&lt;/a&gt;&amp;nbsp;shared component.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: Anything provided in the app market is provided as-is, and the functionality cannot be guaranteed by Appian.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: May 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: process models, web services&lt;/div&gt;
</description></item><item><title>KB-1187 "PKIX path building failed: error when attempting to make a call to an external server" error thrown when making web service calls over HTTPS or LDAPS</title><link>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps/revision/8</link><pubDate>Fri, 11 May 2018 09:52:46 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:e9477483-a544-4428-9671-0f07863179cf</guid><dc:creator>Nick Vigilante</dc:creator><comments>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps#comments</comments><description>Revision 8 posted to Appian Knowledge Base by Nick Vigilante on 5/11/2018 9:52:46 AM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;h2 id="symptoms"&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;Making a call to an external server over HTTPS or LDAPS fails because the application server does not trust the CA which was used to sign the certificate the external server presents. The following error will be seen in the application server log:&lt;/p&gt;
&lt;pre class="code-java"&gt;sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target&lt;/pre&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;This is because the certificate that&amp;rsquo;s being presented by the external server is not trusted by the application server for one of the following reasons:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The certificate is self-signed.&lt;/li&gt;
&lt;li&gt;The certificate is signed by a Certificate Authority, but the server is not presenting the full certificate chain with all intermediate certs up to the CA root cert.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;h3&gt;On-Premise&lt;/h3&gt;
&lt;p&gt;Use the following command to import the certificate into the default JDK&amp;nbsp;trust store:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore $JAVA_HOME/jre/lib/security/cacerts&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot;
&lt;/pre&gt;
&lt;p&gt;If importing multiple certificates, make sure that the alias is different for each command. The alias can be anything and is just a name in this case, usually the name this certificate was issued for.&lt;/p&gt;
&lt;p&gt;To verify if the import has been done, run the following command:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -list -keystore $JAVA_HOME/jre/lib/security/cacerts | grep ##ALIASNAME##&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -list -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot; | findstr ##ALIASNAME##
&lt;/pre&gt;
&lt;p&gt;The above command (without the &lt;code&gt;| grep ##ALIASNAME##&lt;/code&gt;&amp;nbsp;or &lt;code&gt;| findstr ##ALIASNAME##&lt;/code&gt;)&amp;nbsp;can also be used to check what certificates are currently in the trust store. These are the default trusted certificates that come up with a standard installation of Java.&lt;/p&gt;
&lt;p&gt;After importing the certificate into the JDK trust store, perform an application server restart to load the certificate.&lt;/p&gt;
&lt;h3&gt;Cloud&lt;/h3&gt;
&lt;p&gt;Importing certificates is not supported on Appian Cloud.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;If you already have a CA-signed certificate, make sure your external server has all intermediate certificates up to the CA root certificate installed.&lt;/li&gt;
&lt;li&gt;If you have a self-signed certificate, obtain a new CA-signed certificate from a certificate authority.&lt;/li&gt;
&lt;li&gt;If this error is appearing while attempting to call a web service, try using the&amp;nbsp;&lt;a href="/b/appmarket/posts/advanced-call-web-service" target="_blank"&gt;Advanced Call Web Service&lt;/a&gt;&amp;nbsp;shared component.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: Anything provided in the app market is provided as-is, and the functionality cannot be guaranteed by Appian.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: May 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: process models, web services&lt;/div&gt;
</description></item><item><title>KB-1187 "PKIX path building failed: error when attempting to make a call to an external server" error thrown when making web service calls over HTTPS or LDAPS</title><link>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps/revision/7</link><pubDate>Fri, 11 May 2018 09:48:47 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:e9477483-a544-4428-9671-0f07863179cf</guid><dc:creator>Nick Vigilante</dc:creator><comments>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps#comments</comments><description>Revision 7 posted to Appian Knowledge Base by Nick Vigilante on 5/11/2018 9:48:47 AM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;h2 id="symptoms"&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;Making a call to an external server over HTTPS or LDAPS fails because the JBoss server does not trust the CA which was used to sign the certificate the external server presents. The following error will be seen in the application server log:&lt;/p&gt;
&lt;pre class="code-java"&gt;sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target&lt;/pre&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;This is because the certificate that&amp;rsquo;s being presented by the external server is not trusted by the application server for one of the following reasons:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The certificate is self-signed.&lt;/li&gt;
&lt;li&gt;The certificate is signed by a Certificate Authority, but the server is not presenting the full certificate chain with all intermediate certs up to the CA root cert.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;h3&gt;On-Premise&lt;/h3&gt;
&lt;p&gt;Use the following command to import the certificate into the default JDK&amp;nbsp;trust store:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore $JAVA_HOME/jre/lib/security/cacerts&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot;
&lt;/pre&gt;
&lt;p&gt;If importing multiple certificates, make sure that the alias is different for each command. The alias can be anything and is just a name in this case, usually the name this certificate was issued for.&lt;/p&gt;
&lt;p&gt;To verify if the import has been done, run the following command:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -list -keystore $JAVA_HOME/jre/lib/security/cacerts | grep ##ALIASNAME##&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -list -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot; | findstr ##ALIASNAME##
&lt;/pre&gt;
&lt;p&gt;The above command (without the &lt;code&gt;| grep ##ALIASNAME##&lt;/code&gt;&amp;nbsp;or &lt;code&gt;| findstr ##ALIASNAME##&lt;/code&gt;)&amp;nbsp;can also be used to check what certificates are currently in the trust store. These are the default trusted certificates that come up with a standard installation of Java.&lt;/p&gt;
&lt;p&gt;After importing the certificate into the JDK trust store, perform an application server restart to load the certificate.&lt;/p&gt;
&lt;h3&gt;Cloud&lt;/h3&gt;
&lt;p&gt;Importing certificates is not supported on Appian Cloud.&lt;/p&gt;
&lt;p&gt;If you already have a CA-signed certificate, make sure your external server has all intermediate certificates up to the CA root certificate installed.&lt;/p&gt;
&lt;p&gt;If you have a self-signed certificate, obtain a new CA-signed certificate from a certificate authority.&lt;/p&gt;
&lt;p&gt;If this error is appearing while attempting to call a web service, try using the&amp;nbsp;&lt;a href="/b/appmarket/posts/advanced-call-web-service" target="_blank"&gt;Advanced Call Web Service&lt;/a&gt;&amp;nbsp;shared component.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: Anything provided in the app market is provided as-is, and the functionality cannot be guaranteed by Appian.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed: May 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: process models, web services&lt;/div&gt;
</description></item><item><title>KB-1187 "The WSDL cannot be processed because the remote server certificate is invalid... unable to find valid certification path to requested target" error thrown when making web service calls</title><link>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps/revision/6</link><pubDate>Wed, 10 Jan 2018 17:56:06 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:e9477483-a544-4428-9671-0f07863179cf</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps#comments</comments><description>Revision 6 posted to Appian Knowledge Base by Parmida Borhani on 1/10/2018 5:56:06 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;h2 id="symptoms"&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;Making web services calls over HTTPS fails because the JBoss server does not trust the CA which was used to sign the certificate the web service presents. The following errors will be seen in the application server log&lt;/p&gt;
&lt;pre&gt;INFO  [stdout] (ajp-/0.0.0.0:8009-7) com.appiancorp.ws.WSClientException: The WSDL cannot be processed because the remote server certificate is invalid.  Check that the certificate has not expired. (APNX-1-4045-005)

Caused by: com.appiancorp.ws.security.transport.HTTPTransportException: The WSDL cannot be processed because the remote server&amp;rsquo;s certificate is invalid.  Check that the certificate has not expired. (APNX-1-4045-005)

Caused by: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target

Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target

Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
&lt;/pre&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;This is because the certificate that&amp;rsquo;s being presented is not trusted by the application server. You will have to obtain a certificate signed by a trusted authority instead of a self-signed certificate or import it into the JDK truststore using the keytool command.&lt;/p&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;p&gt;You will have to use the following command to import the certificate into the default JDK&amp;nbsp;trust store:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore $JAVA_HOME/jre/lib/security/cacerts&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot;
&lt;/pre&gt;
&lt;p&gt;If you&amp;rsquo;re importing multiple certificates, make sure that the alias is different for each command. The alias can be anything and is just a name in this case, usually the name this certificate was issued for.&lt;/p&gt;
&lt;p&gt;To verify if the import has been done, run the following command:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -list -keystore $JAVA_HOME/jre/lib/security/cacerts | grep ##ALIASNAME##&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -list -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot; | findstr ##ALIASNAME##
&lt;/pre&gt;
&lt;p&gt;The above command (without the &lt;code&gt;| grep ##ALIASNAME##&lt;/code&gt;&amp;nbsp;or &lt;code&gt;| findstr ##ALIASNAME##&lt;/code&gt;)&amp;nbsp;can also be used to check what certificates are currently in the trust store. These are the default trusted certificates that come up with a standard installation of Java.&lt;/p&gt;
&lt;p&gt;After importing the certificate into the JDK trust store, perform an application server restart to load the certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; The above operations are currently not supported on Appian Cloud as you are not allowed to run any commands on the operating system. The workaround&amp;nbsp;is to use the &lt;a href="/b/appmarket/posts/advanced-call-web-service" target="_blank"&gt;Advanced Call Web Service plug-in&lt;/a&gt; or to obtain a certificate from a trusted CA instead of using a self-signed one.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;January 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: process models, web services&lt;/div&gt;
</description></item><item><title>KB-1187 "The WSDL cannot be processed because the remote server certificate is invalid... unable to find valid certification path to requested target" error thrown when making web service calls</title><link>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps/revision/5</link><pubDate>Wed, 10 Jan 2018 17:54:23 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:e9477483-a544-4428-9671-0f07863179cf</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps#comments</comments><description>Revision 5 posted to Appian Knowledge Base by Parmida Borhani on 1/10/2018 5:54:23 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;h2 id="symptoms"&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;Making web services calls over HTTPS fails because the JBoss server does not trust the CA which was used to sign the certificate the web service presents. The following errors will be seen in the application server log&lt;/p&gt;
&lt;pre&gt;INFO  [stdout] (ajp-/0.0.0.0:8009-7) com.appiancorp.ws.WSClientException: The WSDL cannot be processed because the remote server certificate is invalid.  Check that the certificate has not expired. (APNX-1-4045-005)

Caused by: com.appiancorp.ws.security.transport.HTTPTransportException: The WSDL cannot be processed because the remote server&amp;rsquo;s certificate is invalid.  Check that the certificate has not expired. (APNX-1-4045-005)

Caused by: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target

Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target

Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
&lt;/pre&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;This is because the certificate that&amp;rsquo;s being presented is not trusted by the application server. You will have to obtain a certificate signed by a trusted authority instead of a self-signed certificate or import it into the JDK truststore using the keytool command.&lt;/p&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;p&gt;You will have to use the following command to import the certificate into the default JDK&amp;nbsp;trust store:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore $JAVA_HOME/jre/lib/security/cacerts&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot;
&lt;/pre&gt;
&lt;p&gt;If you&amp;rsquo;re importing multiple certificates, make sure that the alias is different for each command. The alias can be anything and is just a name in this case, usually the name this certificate was issued for.&lt;/p&gt;
&lt;p&gt;To verify if the import has been done, run the following command:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -list -keystore $JAVA_HOME/jre/lib/security/cacerts | grep ##ALIASNAME##&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -list -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot; | findstr ##ALIASNAME##
&lt;/pre&gt;
&lt;p&gt;The above command (without the &lt;code&gt;| grep ##ALIASNAME##&lt;/code&gt;&amp;nbsp;or &lt;code&gt;| findstr ##ALIASNAME##&lt;/code&gt;)&amp;nbsp;can also be used to check what certificates are currently in the trust store. These are the default trusted certificates that come up with a standard installation of Java.&lt;/p&gt;
&lt;p&gt;After importing the certificate into the JDK trust store, perform an application server restart to load the certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; The above operations are currently not supported on Appian Cloud as you are not allowed to run any commands on the operating system. The workaround&amp;nbsp;is to use the &lt;a href="/b/appmarket/posts/advanced-call-web-service" target="_blank"&gt;Advanced Call Web Service plug-in&lt;/a&gt; or to obtain a certificate from a trusted CA instead of using a self-signed one.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian with Linux as the underlying operating system.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;January 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: process models, web services&lt;/div&gt;
</description></item><item><title>KB-1187 "The WSDL cannot be processed because the remote server certificate is invalid... unable to find valid certification path to requested target" error thrown when making web service calls</title><link>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps/revision/4</link><pubDate>Wed, 10 Jan 2018 17:53:55 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:e9477483-a544-4428-9671-0f07863179cf</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps#comments</comments><description>Revision 4 posted to Appian Knowledge Base by Parmida Borhani on 1/10/2018 5:53:55 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;h2 id="symptoms"&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;Making web services calls over HTTPS fails because the JBoss server does not trust the CA which was used to sign the certificate the web service presents. The following errors will be seen in the application server log&lt;/p&gt;
&lt;pre&gt;INFO  [stdout] (ajp-/0.0.0.0:8009-7) com.appiancorp.ws.WSClientException: The WSDL cannot be processed because the remote server certificate is invalid.  Check that the certificate has not expired. (APNX-1-4045-005)

Caused by: com.appiancorp.ws.security.transport.HTTPTransportException: The WSDL cannot be processed because the remote server&amp;rsquo;s certificate is invalid.  Check that the certificate has not expired. (APNX-1-4045-005)

Caused by: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target

Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target

Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
&lt;/pre&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;This is because the certificate that&amp;rsquo;s being presented is not trusted by the application server. You will have to obtain a certificate signed by a trusted authority instead of a self-signed certificate or import it into the JDK truststore using the keytool command.&lt;/p&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;p&gt;You will have to use the following command to import the certificate into the default JDK&amp;nbsp;trust store:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore $JAVA_HOME/jre/lib/security/cacerts&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot;
&lt;/pre&gt;
&lt;p&gt;If you&amp;rsquo;re importing multiple certificates, make sure that the alias is different for each command. The alias can be anything and is just a name in this case, usually the name this certificate was issued for.&lt;/p&gt;
&lt;p&gt;To verify if the import has been done, run the following command:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -list -keystore $JAVA_HOME/jre/lib/security/cacerts | grep ##ALIASNAME##&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -list -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot; | findstr ##ALIASNAME##
&lt;/pre&gt;
&lt;p&gt;The above command (without the &lt;code&gt;| grep &amp;ldquo;##ALIASNAME##&amp;rdquo;&lt;/code&gt; or &lt;code&gt;| findstr ##ALIASNAME##&lt;/code&gt;)&amp;nbsp;can also be used to check what certificates are currently in the trust store. These are the default trusted certificates that come up with a standard installation of Java.&lt;/p&gt;
&lt;p&gt;After importing the certificate into the JDK trust store, perform an application server restart to load the certificate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; The above operations are currently not supported on Appian Cloud as you are not allowed to run any commands on the operating system. The workaround&amp;nbsp;is to use the &lt;a href="/b/appmarket/posts/advanced-call-web-service" target="_blank"&gt;Advanced Call Web Service plug-in&lt;/a&gt; or to obtain a certificate from a trusted CA instead of using a self-signed one.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian with Linux as the underlying operating system.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;January 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: process models, web services&lt;/div&gt;
</description></item><item><title>KB-1187 "The WSDL cannot be processed because the remote server certificate is invalid... unable to find valid certification path to requested target" error thrown when making web service calls</title><link>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps/revision/3</link><pubDate>Wed, 10 Jan 2018 17:50:40 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:e9477483-a544-4428-9671-0f07863179cf</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps#comments</comments><description>Revision 3 posted to Appian Knowledge Base by Parmida Borhani on 1/10/2018 5:50:40 PM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;h2 id="symptoms"&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;Making web services calls over https fails because the JBoss server does not trust the CA which was used to sign the certificate the web service presents. The following errors will be seen in the application server log&lt;/p&gt;
&lt;pre&gt;INFO  [stdout] (ajp-/0.0.0.0:8009-7) com.appiancorp.ws.WSClientException: The WSDL cannot be processed because the remote server certificate is invalid.  Check that the certificate has not expired. (APNX-1-4045-005)

Caused by: com.appiancorp.ws.security.transport.HTTPTransportException: The WSDL cannot be processed because the remote server&amp;rsquo;s certificate is invalid.  Check that the certificate has not expired. (APNX-1-4045-005)

Caused by: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target

Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target

Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
&lt;/pre&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;This is because the certificate that&amp;rsquo;s being presented is not trusted by the application server. You will have to obtain a certificate signed by a trusted authority instead of a self-signed certificate or import it into the JDK truststore using the keytool command.&lt;/p&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;p&gt;You will have to use the following command to import the certificate into the default JDK&amp;nbsp;trust store:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore $JAVA_HOME/jre/lib/security/cacerts&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -import -trustcacerts -file #PATH TO FILE# -alias ##ALIASNAME## -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot;
&lt;/pre&gt;
&lt;p&gt;If you&amp;rsquo;re importing multiple certificates, make sure that the alias is different for each command. The alias can be anything and is just a name in this case, usually the name this certificate was issued for.&lt;/p&gt;
&lt;p&gt;To verify if the import has been done, run the following command:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -list -keystore $JAVA_HOME/jre/lib/security/cacerts | grep ##ALIASNAME##&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -list -keystore &amp;quot;%JAVA_HOME%\jre\lib\security\cacerts&amp;quot; | findstr ##ALIASNAME##
&lt;/pre&gt;
&lt;p&gt;The above command (without the &lt;code&gt;| grep &amp;ldquo;##ALIASNAME##&amp;rdquo; &lt;/code&gt;or&lt;code&gt; | findstr ##ALIASNAME##&lt;/code&gt;)&amp;nbsp;can also be used to check what certificates are currently in the trust store. These are the default trusted certificates that come up with a standard installation of Java.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; The above operations are currently not supported on Appian Cloud as you are not allowed to run any commands on the operating system. The workaround would be to use the &lt;a href="/b/appmarket/posts/advanced-call-web-service" target="_blank"&gt;Advanced Call Web Service plug-in&lt;/a&gt; or to obtain a certificate from a trusted CA instead of using a self-signed one.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian with Linux as the underlying operating system.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;January 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: process models, web services&lt;/div&gt;
</description></item><item><title>KB-1187 "The WSDL cannot be processed because the remote server certificate is invalid... unable to find valid certification path to requested target" error thrown when making web service calls</title><link>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps/revision/2</link><pubDate>Wed, 26 Jul 2017 08:53:33 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:e9477483-a544-4428-9671-0f07863179cf</guid><dc:creator>Nick Vigilante</dc:creator><comments>https://community.appian.com/support/w/kb/403/kb-1187-pkix-path-building-failed-error-when-attempting-to-make-a-call-to-an-external-server-error-thrown-when-making-web-service-calls-over-https-or-ldaps#comments</comments><description>Revision 2 posted to Appian Knowledge Base by Nick Vigilante on 7/26/2017 8:53:33 AM&lt;br /&gt;
&lt;div class="row content_container"&gt;
&lt;h2 id="symptoms"&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;Making web services calls over https fails because the JBoss server does not trust the CA which was used to sign the certificate the web service presents. The following errors will be seen in the application server log&lt;/p&gt;
&lt;pre&gt;INFO  [stdout] (ajp-/0.0.0.0:8009-7) com.appiancorp.ws.WSClientException: The WSDL cannot be processed because the remote server certificate is invalid.  Check that the certificate has not expired. (APNX-1-4045-005)

Caused by: com.appiancorp.ws.security.transport.HTTPTransportException: The WSDL cannot be processed because the remote server&amp;rsquo;s certificate is invalid.  Check that the certificate has not expired. (APNX-1-4045-005)

Caused by: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target

Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target

Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
&lt;/pre&gt;
&lt;h2 id="cause"&gt;Cause&lt;/h2&gt;
&lt;p&gt;This is because the certificate that&amp;rsquo;s being presented is not trusted by the application server. You will have to obtain a certificate signed by a trusted authority instead of a self-signed certificate or import it into the JDK truststore using the keytool command.&lt;/p&gt;
&lt;h2 id="action"&gt;Action&lt;/h2&gt;
&lt;p&gt;You will have to use the following command to import the certificate into the default JDK&amp;nbsp;truststore:&lt;/p&gt;
&lt;pre&gt;keytool -import -trustcacerts -file #PATH TO FILE# -alias appiantest -keystore $JAVA_HOME/jre/lib/security/cacerts
&lt;/pre&gt;
&lt;p&gt;If you&amp;rsquo;re importing multiple certificates, make sure that the alias is different for each command. The alias can be anything and is just a name in this case.&lt;/p&gt;
&lt;p&gt;To verify if the import has been done, run the following command&lt;/p&gt;
&lt;pre&gt;$JAVA_HOME/bin/keytool -list -keystore ./cacerts | grep &amp;ldquo;##ALIASNAME##&amp;rdquo;
&lt;/pre&gt;
&lt;p&gt;The above command (without the &lt;code&gt;| grep &amp;ldquo;##ALIASNAME##&amp;rdquo;&lt;/code&gt;)can also be used to check what certificates are currently in the truststore. These are the default CA that come up with a standard installation of java.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; The above operations are currently not supported on Appian Cloud as you are not allowed to run any commands on the operating system. The workaround would be to use the &lt;a href="https://forum.appian.com/suite/tempo/records/item/lMBCLGOdlMUpdGVqW3dQaIKmclBmvvNEj8vu_cjb7T-5YiPr4Fu8ly5Yj1s09uenE4RYzA8zKyx7eiUh-uuLnPKlJZ8g9jnKjfBzm5EIIb4OiP4ww/view/summary"&gt;Advanced Call Web Service plug-in&lt;/a&gt; or to obtain a certificate from a trusted CA instead of using a self-signed one.&lt;/p&gt;
&lt;h2 id="affected-versions"&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian with Linux as the underlying operating system.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;March 2017&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: process models, web services&lt;/div&gt;
</description></item></channel></rss>