<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-1450 How to troubleshoot SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-1450 How to troubleshoot SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users</link><pubDate>Mon, 21 Aug 2023 17:36:42 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Current Revision posted to Appian Knowledge Base by Elly Meng on 8/21/2023 5:36:42 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, it is possible that only a subset of users experience issues logging in, while others are able to log in without issues. The most common cause for SSO login issues experienced by only some users is the Identity Provider (IdP) sending an erroneous username to Appian. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;p&gt;This article&amp;nbsp;provides a framework for troubleshooting SSO issues impacting only a subset of users. If no users are able to log in, double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#username-and-password"&gt;Ensure the user is using the correct username and password&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#user-membership-in-saml"&gt;Check user membership in SAML Users group and activation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#idp-side-settings"&gt;Check IdP side settings for affected users&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#login-audit"&gt;Examine the login-audit.csv files&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#enable-additional-loggers"&gt;Enable additional loggers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#gather-saml-trace"&gt;Gather a SAML trace&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="username-and-password"&gt;&lt;/a&gt;Ensure the user is using the correct username and password&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Before proceeding with further troubleshooting, make sure that the users for whom login attempts are failing, are using the correct username and password for the IdP. These credentials may be different from the username/password combinations used with native Appian authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="user-membership-in-saml"&gt;&lt;/a&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;Check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also ensure that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="idp-side-settings"&gt;&lt;/a&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password, or otherwise prevented from successfully authenticating. The easiest way to check this is to see if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="login-audit"&gt;&lt;/a&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs&lt;/code&gt;&amp;nbsp;directory can provide additional information about the login attempts coming from the IdP. As login issues for some SSO users are typically caused by&amp;nbsp;erroneous&amp;nbsp;usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being sent, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example, a failed login attempt might look like this:&lt;/p&gt;
&lt;pre&gt;2017-08-29 15:51:22,&lt;strong&gt;usr.name&lt;/strong&gt;,&lt;em&gt;&lt;strong&gt;Failed&lt;/strong&gt;&lt;/em&gt;,192.168.14.15,&lt;em&gt;&lt;strong&gt;Portal&lt;/strong&gt;&lt;/em&gt;,&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36&amp;quot;&lt;/pre&gt;
&lt;p&gt;To determine if this is the cause, you may compare these login attempts to the list of users found in the Administration Console to cross reference and determine if the username is correctly sent to Appian. The usernames can be corrected in&amp;nbsp;two ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to&amp;nbsp;send&amp;nbsp;usernames in the form expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="enable-additional-loggers"&gt;&lt;/a&gt;Enable additional loggers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Enabling the following loggers in &lt;code&gt;appian_log4j.properties&lt;/code&gt; will record additional details about SAML logins in the app server log.&lt;/p&gt;
&lt;p&gt;18.2 and earlier:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG
log4j.logger.org.springframework.security=DEBUG
log4j.logger.org.opensaml.saml2=DEBUG&lt;/pre&gt;
&lt;p&gt;18.3 and later:&lt;/p&gt;
&lt;pre&gt;log4j.logger.org.opensaml.core.xml.util=TRACE&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="gather-saml-trace"&gt;&lt;/a&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" rel="noopener noreferrer" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" rel="noopener noreferrer" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. The username of the user attempting to log in (e.g.&amp;nbsp;&lt;code&gt;john.smith&lt;/code&gt;)&amp;nbsp;can, for example, appear in the following&amp;nbsp;forms in the SAML assertion:&lt;/p&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:NameID&lt;/span&gt; &lt;span class="na"&gt;Format=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:NameID&amp;gt;&lt;br /&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:Attribute&lt;/span&gt; &lt;span class="na"&gt;Name=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;usernameAttribute&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;NameFormat=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:2.0:attrname-format:basic&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;    &amp;lt;saml2:AttributeValue&lt;/span&gt; &lt;span class="na"&gt;xmlns:xsi=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;xsi:type=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;xs:string&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:AttributeValue&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/saml2:Attribute&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;If the username appears correct but the user is still unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a support case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps lead to a expeditious resolution to the issue.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to&amp;nbsp;Appian versions 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: July 2020&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, how-to, authentication&lt;/div&gt;
</description></item><item><title>KB-1450 How to troubleshoot SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/21</link><pubDate>Mon, 21 Aug 2023 17:35:40 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 21 posted to Appian Knowledge Base by Elly Meng on 8/21/2023 5:35:40 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, it is possible that only a subset of users experience issues logging in, while others are able to log in without issues. The most common cause for SSO login issues experienced by only some users is the Identity Provider (IdP) sending an erroneous username to Appian. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;p&gt;This article&amp;nbsp;provides a framework for troubleshooting SSO issues impacting only a subset of users. If no users are able to log in, double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#username-and-password"&gt;Ensure the user is using the correct username and password&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#user-membership-in-saml"&gt;Check user membership in SAML Users group and activation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#idp-side-settings"&gt;Check IdP side settings for affected users&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#login-audit"&gt;Examine the login-audit.csv files&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#enable-additional-loggers"&gt;Enable additional loggers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#gather-saml-trace"&gt;Gather a SAML trace&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="username-and-password"&gt;&lt;/a&gt;Ensure the user is using the correct username and password&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Before proceeding with further troubleshooting, make sure that the users for whom login attempts are failing, are using the correct username and password for the IdP. These credentials may be different from the username/password combinations used with native Appian authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="user-membership-in-saml"&gt;&lt;/a&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;Check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also ensure that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="idp-side-settings"&gt;&lt;/a&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password, or otherwise prevented from successfully authenticating. The easiest way to check this is to see if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="login-audit"&gt;&lt;/a&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs&lt;/code&gt;&amp;nbsp;directory can provide additional information about the login attempts coming from the IdP. As login issues for some SSO users are typically caused by&amp;nbsp;erroneous&amp;nbsp;usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being sent, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example, a failed login attempt might look like this:&lt;/p&gt;
&lt;pre&gt;2017-08-29 15:51:22,&lt;strong&gt;usr.name&lt;/strong&gt;,&lt;em&gt;&lt;strong&gt;Failed&lt;/strong&gt;&lt;/em&gt;,192.168.14.15,&lt;em&gt;&lt;strong&gt;Portal&lt;/strong&gt;&lt;/em&gt;,&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36&amp;quot;&lt;/pre&gt;
&lt;p&gt;To determine if this is the cause, you may compare these login attempts to the list of users found in the Administration Console to cross reference and determine if the username is correctly sent to Appian. The usernames can be corrected in&amp;nbsp;two ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to&amp;nbsp;send&amp;nbsp;usernames in the form expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="enable-additional-loggers"&gt;&lt;/a&gt;Enable additional loggers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Enabling the following loggers in &lt;code&gt;appian_log4j.properties&lt;/code&gt; will record additional details about SAML logins in the app server log.&lt;/p&gt;
&lt;p&gt;18.2 and earlier:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;log4j.logger.com.appiancorp.security=DEBUG
log4j.logger.org.springframework.security=DEBUG
log4j.logger.org.opensaml.saml2=DEBUG&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;18.3 and later:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;log4j.logger.org.opensaml.core.xml.util=TRACE&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="gather-saml-trace"&gt;&lt;/a&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" rel="noopener noreferrer" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" rel="noopener noreferrer" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. The username of the user attempting to log in (e.g.&amp;nbsp;&lt;code&gt;john.smith&lt;/code&gt;)&amp;nbsp;can, for example, appear in the following&amp;nbsp;forms in the SAML assertion:&lt;/p&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:NameID&lt;/span&gt; &lt;span class="na"&gt;Format=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:NameID&amp;gt;&lt;br /&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:Attribute&lt;/span&gt; &lt;span class="na"&gt;Name=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;usernameAttribute&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;NameFormat=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:2.0:attrname-format:basic&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;    &amp;lt;saml2:AttributeValue&lt;/span&gt; &lt;span class="na"&gt;xmlns:xsi=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;xsi:type=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;xs:string&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:AttributeValue&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/saml2:Attribute&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;If the username appears correct but the user is still unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a support case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps lead to a expeditious resolution to the issue.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to&amp;nbsp;Appian versions 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: July 2020&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, how-to, authentication&lt;/div&gt;
</description></item><item><title>KB-1450 How to troubleshoot SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/20</link><pubDate>Mon, 21 Aug 2023 17:35:07 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 20 posted to Appian Knowledge Base by Elly Meng on 8/21/2023 5:35:07 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, it is possible that only a subset of users experience issues logging in, while others are able to log in without issues. The most common cause for SSO login issues experienced by only some users is the Identity Provider (IdP) sending an erroneous username to Appian. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;p&gt;This article&amp;nbsp;provides a framework for troubleshooting SSO issues impacting only a subset of users. If no users are able to log in, double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#username-and-password"&gt;Ensure the user is using the correct username and password&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#user-membership-in-saml"&gt;Check user membership in SAML Users group and activation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#idp-side-settings"&gt;Check IdP side settings for affected users&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#login-audit"&gt;Examine the login-audit.csv files&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#enable-additional-loggers"&gt;Enable additional loggers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#gather-saml-trace"&gt;Gather a SAML trace&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="username-and-password"&gt;&lt;/a&gt;Ensure the user is using the correct username and password&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Before proceeding with further troubleshooting, make sure that the users for whom login attempts are failing, are using the correct username and password for the IdP. These credentials may be different from the username/password combinations used with native Appian authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="user-membership-in-saml"&gt;&lt;/a&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;Check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also ensure that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="idp-side-settings"&gt;&lt;/a&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password, or otherwise prevented from successfully authenticating. The easiest way to check this is to see if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="login-audit"&gt;&lt;/a&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs&lt;/code&gt;&amp;nbsp;directory can provide additional information about the login attempts coming from the IdP. As login issues for some SSO users are typically caused by&amp;nbsp;erroneous&amp;nbsp;usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being sent, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example, a failed login attempt might look like this:&lt;/p&gt;
&lt;pre&gt;2017-08-29 15:51:22,&lt;strong&gt;usr.name&lt;/strong&gt;,&lt;em&gt;&lt;strong&gt;Failed&lt;/strong&gt;&lt;/em&gt;,192.168.14.15,&lt;em&gt;&lt;strong&gt;Portal&lt;/strong&gt;&lt;/em&gt;,&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36&amp;quot;&lt;/pre&gt;
&lt;p&gt;To determine if this is the cause, you may compare these login attempts to the list of users found in the Administration Console to cross reference and determine if the username is correctly sent to Appian. The usernames can be corrected in&amp;nbsp;two ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to&amp;nbsp;send&amp;nbsp;usernames in the form expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="enable-additional-loggers"&gt;&lt;/a&gt;Enable additional loggers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Enabling the following loggers in &lt;code&gt;appian_log4j.properties&lt;/code&gt; will record additional details about SAML logins in the app server log.&lt;/p&gt;
&lt;p&gt;18.2 and earlier:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;log4j.logger.com.appiancorp.security=DEBUG&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;log4j.logger.org.springframework.security=DEBUG&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;log4j.logger.org.opensaml.saml2=DEBUG&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;18.3 and later:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;log4j.logger.org.opensaml.core.xml.util=TRACE&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="gather-saml-trace"&gt;&lt;/a&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" rel="noopener noreferrer" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" rel="noopener noreferrer" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. The username of the user attempting to log in (e.g.&amp;nbsp;&lt;code&gt;john.smith&lt;/code&gt;)&amp;nbsp;can, for example, appear in the following&amp;nbsp;forms in the SAML assertion:&lt;/p&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:NameID&lt;/span&gt; &lt;span class="na"&gt;Format=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:NameID&amp;gt;&lt;br /&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:Attribute&lt;/span&gt; &lt;span class="na"&gt;Name=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;usernameAttribute&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;NameFormat=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:2.0:attrname-format:basic&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;    &amp;lt;saml2:AttributeValue&lt;/span&gt; &lt;span class="na"&gt;xmlns:xsi=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;xsi:type=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;xs:string&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:AttributeValue&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/saml2:Attribute&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;If the username appears correct but the user is still unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a support case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps lead to a expeditious resolution to the issue.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to&amp;nbsp;Appian versions 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: July 2020&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, how-to, authentication&lt;/div&gt;
</description></item><item><title>KB-1450 How to troubleshoot SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/19</link><pubDate>Mon, 21 Aug 2023 17:34:16 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 19 posted to Appian Knowledge Base by Elly Meng on 8/21/2023 5:34:16 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, it is possible that only a subset of users experience issues logging in, while others are able to log in without issues. The most common cause for SSO login issues experienced by only some users is the Identity Provider (IdP) sending an erroneous username to Appian. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;p&gt;This article&amp;nbsp;provides a framework for troubleshooting SSO issues impacting only a subset of users. If no users are able to log in, double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#username-and-password"&gt;Ensure the user is using the correct username and password&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#user-membership-in-saml"&gt;Check user membership in SAML Users group and activation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#idp-side-settings"&gt;Check IdP side settings for affected users&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#login-audit"&gt;Examine the login-audit.csv files&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#enable-additional-loggers"&gt;Enable additional loggers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#gather-saml-trace"&gt;Gather a SAML trace&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="username-and-password"&gt;&lt;/a&gt;Ensure the user is using the correct username and password&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Before proceeding with further troubleshooting, make sure that the users for whom login attempts are failing, are using the correct username and password for the IdP. These credentials may be different from the username/password combinations used with native Appian authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="user-membership-in-saml"&gt;&lt;/a&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;Check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also ensure that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="idp-side-settings"&gt;&lt;/a&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password, or otherwise prevented from successfully authenticating. The easiest way to check this is to see if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="login-audit"&gt;&lt;/a&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs&lt;/code&gt;&amp;nbsp;directory can provide additional information about the login attempts coming from the IdP. As login issues for some SSO users are typically caused by&amp;nbsp;erroneous&amp;nbsp;usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being sent, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example, a failed login attempt might look like this:&lt;/p&gt;
&lt;pre&gt;2017-08-29 15:51:22,&lt;strong&gt;usr.name&lt;/strong&gt;,&lt;em&gt;&lt;strong&gt;Failed&lt;/strong&gt;&lt;/em&gt;,192.168.14.15,&lt;em&gt;&lt;strong&gt;Portal&lt;/strong&gt;&lt;/em&gt;,&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36&amp;quot;&lt;/pre&gt;
&lt;p&gt;To determine if this is the cause, you may compare these login attempts to the list of users found in the Administration Console to cross reference and determine if the username is correctly sent to Appian. The usernames can be corrected in&amp;nbsp;two ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to&amp;nbsp;send&amp;nbsp;usernames in the form expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="enable-additional-loggers"&gt;&lt;/a&gt;Enable additional loggers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Enabling the following loggers in &lt;code&gt;appian_log4j.properties&lt;/code&gt; will record additional details about SAML logins in the app server log.&lt;/p&gt;
&lt;p&gt;18.2 and earlier:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;log4j.logger.com.appiancorp.security=DEBUG
log4j.logger.org.springframework.security=DEBUG
log4j.logger.org.opensaml.saml2=DEBUG&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;18.3 and later:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;log4j.logger.org.opensaml.core.xml.util=TRACE&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="gather-saml-trace"&gt;&lt;/a&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" rel="noopener noreferrer" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" rel="noopener noreferrer" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. The username of the user attempting to log in (e.g.&amp;nbsp;&lt;code&gt;john.smith&lt;/code&gt;)&amp;nbsp;can, for example, appear in the following&amp;nbsp;forms in the SAML assertion:&lt;/p&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:NameID&lt;/span&gt; &lt;span class="na"&gt;Format=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:NameID&amp;gt;&lt;br /&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:Attribute&lt;/span&gt; &lt;span class="na"&gt;Name=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;usernameAttribute&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;NameFormat=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:2.0:attrname-format:basic&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;    &amp;lt;saml2:AttributeValue&lt;/span&gt; &lt;span class="na"&gt;xmlns:xsi=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;xsi:type=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;xs:string&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:AttributeValue&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/saml2:Attribute&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;If the username appears correct but the user is still unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a support case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps lead to a expeditious resolution to the issue.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to&amp;nbsp;Appian versions 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: July 2020&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, how-to, authentication&lt;/div&gt;
</description></item><item><title>KB-1450 How to troubleshoot SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/18</link><pubDate>Mon, 21 Aug 2023 17:29:59 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 18 posted to Appian Knowledge Base by Elly Meng on 8/21/2023 5:29:59 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, it is possible that only a subset of users experience issues logging in, while others are able to log in without issues. The most common cause for SSO login issues experienced by only some users is the Identity Provider (IdP) sending an erroneous username to Appian. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;p&gt;This article&amp;nbsp;provides a framework for troubleshooting SSO issues impacting only a subset of users. If no users are able to log in, double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#username-and-password"&gt;Ensure the user is using the correct username and password&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#user-membership-in-saml"&gt;Check user membership in SAML Users group and activation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#idp-side-settings"&gt;Check IdP side settings for affected users&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#login-audit"&gt;Examine the login-audit.csv files&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#enable-additional-loggers"&gt;Enable additional loggers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#gather-saml-trace"&gt;Gather a SAML trace&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="username-and-password"&gt;&lt;/a&gt;Ensure the user is using the correct username and password&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Before proceeding with further troubleshooting, make sure that the users for whom login attempts are failing, are using the correct username and password for the IdP. These credentials may be different from the username/password combinations used with native Appian authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="user-membership-in-saml"&gt;&lt;/a&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;Check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also ensure that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="idp-side-settings"&gt;&lt;/a&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password, or otherwise prevented from successfully authenticating. The easiest way to check this is to see if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="login-audit"&gt;&lt;/a&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs&lt;/code&gt;&amp;nbsp;directory can provide additional information about the login attempts coming from the IdP. As login issues for some SSO users are typically caused by&amp;nbsp;erroneous&amp;nbsp;usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being sent, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example, a failed login attempt might look like this:&lt;/p&gt;
&lt;pre&gt;2017-08-29 15:51:22,&lt;strong&gt;usr.name&lt;/strong&gt;,&lt;em&gt;&lt;strong&gt;Failed&lt;/strong&gt;&lt;/em&gt;,192.168.14.15,&lt;em&gt;&lt;strong&gt;Portal&lt;/strong&gt;&lt;/em&gt;,&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36&amp;quot;&lt;/pre&gt;
&lt;p&gt;To determine if this is the cause, you may compare these login attempts to the list of users found in the Administration Console to cross reference and determine if the username is correctly sent to Appian. The usernames can be corrected in&amp;nbsp;two ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to&amp;nbsp;send&amp;nbsp;usernames in the form expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="enable-additional-loggers"&gt;&lt;/a&gt;Enable additional loggers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Enabling the following loggers will record additional details about SAML logins in the JBoss server log. Alter the following lines to &lt;code&gt;DEBUG&lt;/code&gt; in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources/appian_log4j.properties&lt;/code&gt;:&lt;/p&gt;
&lt;p&gt;18.2 and earlier:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;log4j.logger.com.appiancorp.security=DEBUG
log4j.logger.org.springframework.security=DEBUG
log4j.logger.org.opensaml.saml2=DEBUG&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;18.3 and later:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;log4j.logger.org.opensaml.core.xml.util=TRACE&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="gather-saml-trace"&gt;&lt;/a&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" rel="noopener noreferrer" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" rel="noopener noreferrer" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. The username of the user attempting to log in (e.g.&amp;nbsp;&lt;code&gt;john.smith&lt;/code&gt;)&amp;nbsp;can, for example, appear in the following&amp;nbsp;forms in the SAML assertion:&lt;/p&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:NameID&lt;/span&gt; &lt;span class="na"&gt;Format=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:NameID&amp;gt;&lt;br /&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:Attribute&lt;/span&gt; &lt;span class="na"&gt;Name=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;usernameAttribute&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;NameFormat=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:2.0:attrname-format:basic&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;    &amp;lt;saml2:AttributeValue&lt;/span&gt; &lt;span class="na"&gt;xmlns:xsi=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;xsi:type=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;xs:string&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:AttributeValue&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/saml2:Attribute&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;If the username appears correct but the user is still unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a support case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps lead to a expeditious resolution to the issue.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to&amp;nbsp;Appian versions 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: July 2020&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, how-to, authentication&lt;/div&gt;
</description></item><item><title>KB-1450 How to troubleshoot SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/17</link><pubDate>Mon, 21 Aug 2023 17:28:13 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 17 posted to Appian Knowledge Base by Elly Meng on 8/21/2023 5:28:13 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, it is possible that only a subset of users experience issues logging in, while others are able to log in without issues. The most common cause for SSO login issues experienced by only some users is the Identity Provider (IdP) sending an erroneous username to Appian. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;p&gt;This article&amp;nbsp;provides a framework for troubleshooting SSO issues impacting only a subset of users. If no users are able to log in, double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#username-and-password"&gt;Ensure the user is using the correct username and password&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#user-membership-in-saml"&gt;Check user membership in SAML Users group and activation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#idp-side-settings"&gt;Check IdP side settings for affected users&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#login-audit"&gt;Examine the login-audit.csv files&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#enable-additional-loggers"&gt;Enable additional loggers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#gather-saml-trace"&gt;Gather a SAML trace&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="username-and-password"&gt;&lt;/a&gt;Ensure the user is using the correct username and password&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Before proceeding with further troubleshooting, make sure that the users for whom login attempts are failing, are using the correct username and password for the IdP. These credentials may be different from the username/password combinations used with native Appian authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="user-membership-in-saml"&gt;&lt;/a&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;Check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also ensure that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="idp-side-settings"&gt;&lt;/a&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password, or otherwise prevented from successfully authenticating. The easiest way to check this is to see if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="login-audit"&gt;&lt;/a&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs&lt;/code&gt;&amp;nbsp;directory can provide additional information about the login attempts coming from the IdP. As login issues for some SSO users are typically caused by&amp;nbsp;erroneous&amp;nbsp;usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being sent, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example, a failed login attempt might look like this:&lt;/p&gt;
&lt;pre&gt;2017-08-29 15:51:22,&lt;strong&gt;usr.name&lt;/strong&gt;,&lt;em&gt;&lt;strong&gt;Failed&lt;/strong&gt;&lt;/em&gt;,192.168.14.15,&lt;em&gt;&lt;strong&gt;Portal&lt;/strong&gt;&lt;/em&gt;,&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36&amp;quot;&lt;/pre&gt;
&lt;p&gt;To determine if this is the cause, you may compare these login attempts to the list of users found in the Administration Console to cross reference and determine if the username is correctly sent to Appian. The usernames can be corrected in&amp;nbsp;two ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to&amp;nbsp;send&amp;nbsp;usernames in the form expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="enable-additional-loggers"&gt;&lt;/a&gt;Enable additional loggers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Enabling the following loggers will record additional details about SAML logins in the JBoss server log. Alter the following lines to &lt;code&gt;DEBUG&lt;/code&gt; in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources/appian_log4j.properties&lt;/code&gt;:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;18.2 and earlier:&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG
log4j.logger.org.springframework.security=DEBUG
log4j.logger.org.opensaml.saml2=DEBUG&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;18.3 and later:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;log4j.logger.org.opensaml.core.xml.util=TRACE&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="gather-saml-trace"&gt;&lt;/a&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" rel="noopener noreferrer" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" rel="noopener noreferrer" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. The username of the user attempting to log in (e.g.&amp;nbsp;&lt;code&gt;john.smith&lt;/code&gt;)&amp;nbsp;can, for example, appear in the following&amp;nbsp;forms in the SAML assertion:&lt;/p&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:NameID&lt;/span&gt; &lt;span class="na"&gt;Format=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:NameID&amp;gt;&lt;br /&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:Attribute&lt;/span&gt; &lt;span class="na"&gt;Name=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;usernameAttribute&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;NameFormat=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:2.0:attrname-format:basic&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;    &amp;lt;saml2:AttributeValue&lt;/span&gt; &lt;span class="na"&gt;xmlns:xsi=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;xsi:type=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;xs:string&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:AttributeValue&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/saml2:Attribute&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;If the username appears correct but the user is still unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a support case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps lead to a expeditious resolution to the issue.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to&amp;nbsp;Appian versions 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: July 2020&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, how-to, authentication&lt;/div&gt;
</description></item><item><title>KB-1450 How to troubleshoot SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/16</link><pubDate>Fri, 24 Jul 2020 12:48:11 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>James Lee</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 16 posted to Appian Knowledge Base by James Lee on 7/24/2020 12:48:11 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, it is possible that only a subset of users experience issues logging in, while others are able to log in without issues. The most common cause for SSO login issues experienced by only some users is the Identity Provider (IdP) sending an erroneous username to Appian. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;p&gt;This article&amp;nbsp;provides a framework for troubleshooting SSO issues impacting only a subset of users. If no users are able to log in, double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;p&gt;Table of Contents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#username-and-password"&gt;Ensure the user is using the correct username and password&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#user-membership-in-saml"&gt;Check user membership in SAML Users group and activation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#idp-side-settings"&gt;Check IdP side settings for affected users&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#login-audit"&gt;Examine the login-audit.csv files&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#enable-additional-loggers"&gt;Enable additional loggers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#gather-saml-trace"&gt;Gather a SAML trace&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="username-and-password"&gt;&lt;/a&gt;Ensure the user is using the correct username and password&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Before proceeding with further troubleshooting, make sure that the users for whom login attempts are failing, are using the correct username and password for the IdP. These credentials may be different from the username/password combinations used with native Appian authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="user-membership-in-saml"&gt;&lt;/a&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;Check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also ensure that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="idp-side-settings"&gt;&lt;/a&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password, or otherwise prevented from successfully authenticating. The easiest way to check this is to see if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="login-audit"&gt;&lt;/a&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs&lt;/code&gt;&amp;nbsp;directory can provide additional information about the login attempts coming from the IdP. As login issues for some SSO users are typically caused by&amp;nbsp;erroneous&amp;nbsp;usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being sent, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example, a failed login attempt might look like this:&lt;/p&gt;
&lt;pre&gt;2017-08-29 15:51:22,&lt;strong&gt;usr.name&lt;/strong&gt;,&lt;em&gt;&lt;strong&gt;Failed&lt;/strong&gt;&lt;/em&gt;,192.168.14.15,&lt;em&gt;&lt;strong&gt;Portal&lt;/strong&gt;&lt;/em&gt;,&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36&amp;quot;&lt;/pre&gt;
&lt;p&gt;To determine if this is the cause, you may compare these login attempts to the list of users found in the Administration Console to cross reference and determine if the username is correctly sent to Appian. The usernames can be corrected in&amp;nbsp;two ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to&amp;nbsp;send&amp;nbsp;usernames in the form expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="enable-additional-loggers"&gt;&lt;/a&gt;Enable additional loggers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Enabling the following loggers will record additional details about SAML logins in the JBoss server log. Alter the following lines to &lt;code&gt;DEBUG&lt;/code&gt; in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources/appian_log4j.properties&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG
log4j.logger.org.springframework.security=DEBUG
log4j.logger.org.opensaml.saml2=DEBUG&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;&lt;a id="gather-saml-trace"&gt;&lt;/a&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" rel="noopener noreferrer" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" rel="noopener noreferrer" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. The username of the user attempting to log in (e.g.&amp;nbsp;&lt;code&gt;john.smith&lt;/code&gt;)&amp;nbsp;can, for example, appear in the following&amp;nbsp;forms in the SAML assertion:&lt;/p&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:NameID&lt;/span&gt; &lt;span class="na"&gt;Format=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:NameID&amp;gt;&lt;br /&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:Attribute&lt;/span&gt; &lt;span class="na"&gt;Name=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;usernameAttribute&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;NameFormat=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:2.0:attrname-format:basic&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;    &amp;lt;saml2:AttributeValue&lt;/span&gt; &lt;span class="na"&gt;xmlns:xsi=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;xsi:type=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;xs:string&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:AttributeValue&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/saml2:Attribute&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;If the username appears correct but the user is still unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a support case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps lead to a expeditious resolution to the issue.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to&amp;nbsp;Appian versions 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: July 2020&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, how-to, authentication&lt;/div&gt;
</description></item><item><title>KB-1450 How to troubleshoot SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/15</link><pubDate>Tue, 16 Jan 2018 21:55:03 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 15 posted to Appian Knowledge Base by Parmida Borhani on 1/16/2018 9:55:03 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, it is possible that only a subset of users experience issues logging in, while others are able to log in without issues. The most common cause for SSO login issues experienced by only some users is the Identity Provider (IdP) sending an erroneous username to Appian. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;p&gt;This article&amp;nbsp;provides a framework for troubleshooting SSO issues impacting only a subset of users. If no users are able to log in, double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Ensure the user is using the correct username and password&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Before proceeding with further troubleshooting, make sure that the users for whom login attempts are failing, are using the correct username and password for the IdP. These credentials may be different from the username/password combinations used with native Appian authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;Check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also ensure that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password, or otherwise prevented from successfully authenticating. The easiest way to check this is to see if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs&lt;/code&gt;&amp;nbsp;directory can provide additional information about the login attempts coming from the IdP. As login issues for some SSO users are typically caused by&amp;nbsp;erroneous&amp;nbsp;usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being sent, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example, a failed login attempt might look like this:&lt;/p&gt;
&lt;pre&gt;2017-08-29 15:51:22,&lt;strong&gt;usr.name&lt;/strong&gt;,&lt;em&gt;&lt;strong&gt;Failed&lt;/strong&gt;&lt;/em&gt;,192.168.14.15,&lt;em&gt;&lt;strong&gt;Portal&lt;/strong&gt;&lt;/em&gt;,&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36&amp;quot;&lt;/pre&gt;
&lt;p&gt;To determine if this is the cause, you may compare these login attempts to the list of users found in the Administration Console to cross reference and determine if the username is correctly sent to Appian. The usernames can be corrected in&amp;nbsp;two ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to&amp;nbsp;send&amp;nbsp;usernames in the form expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Enable additional loggers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Enabling the following loggers will record additional details about SAML logins in the JBoss server log. Alter the following lines to &lt;code&gt;DEBUG&lt;/code&gt; in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources/appian_log4j.properties&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG
log4j.logger.org.springframework.security=DEBUG
log4j.logger.org.opensaml.saml2=DEBUG&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. The username of the user attempting to log in (e.g.&amp;nbsp;&lt;code&gt;john.smith&lt;/code&gt;)&amp;nbsp;can, for example, appear in the following&amp;nbsp;forms in the SAML assertion:&lt;/p&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:NameID&lt;/span&gt; &lt;span class="na"&gt;Format=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:NameID&amp;gt;&lt;br /&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:Attribute&lt;/span&gt; &lt;span class="na"&gt;Name=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;usernameAttribute&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;NameFormat=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:2.0:attrname-format:basic&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;    &amp;lt;saml2:AttributeValue&lt;/span&gt; &lt;span class="na"&gt;xmlns:xsi=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;xsi:type=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;xs:string&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:AttributeValue&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/saml2:Attribute&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;If the username appears correct but the user is still unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a support case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps lead to a expeditious resolution to the issue.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to&amp;nbsp;Appian versions 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: January 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, how-to, authentication&lt;/div&gt;
</description></item><item><title>DRAFT KB-XXXX How to troubleshoot SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/14</link><pubDate>Mon, 15 Jan 2018 17:59:42 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 14 posted to Appian Knowledge Base by Parmida Borhani on 1/15/2018 5:59:42 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, it is possible that only a subset of users experience issues logging in, while others are able to log in without issues. The most common cause for SSO login issues experienced by only some users is the Identity Provider (IdP) sending an erroneous username to Appian. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;p&gt;This article&amp;nbsp;provides a framework for troubleshooting SSO issues impacting only a subset of users. If no users are able to log in, double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Ensure the user is using the correct username and password&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Before proceeding with further troubleshooting, make sure that the users for whom login attempts are failing, are using the correct username and password for the IdP. These credentials may be different from the username/password combinations used with native Appian authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;Check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also ensure that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password, or otherwise prevented from successfully authenticating. The easiest way to check this is to see if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs&lt;/code&gt;&amp;nbsp;directory can provide additional information about the login attempts coming from the IdP. As login issues for some SSO users are typically caused by&amp;nbsp;erroneous&amp;nbsp;usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being sent, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example, a failed login attempt might look like this:&lt;/p&gt;
&lt;pre&gt;2017-08-29 15:51:22,&lt;strong&gt;usr.name&lt;/strong&gt;,&lt;em&gt;&lt;strong&gt;Failed&lt;/strong&gt;&lt;/em&gt;,192.168.14.15,&lt;em&gt;&lt;strong&gt;Portal&lt;/strong&gt;&lt;/em&gt;,&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36&amp;quot;&lt;/pre&gt;
&lt;p&gt;To determine if this is the cause, you may compare these login attempts to the list of users found in the Administration Console to cross reference and determine if the username is correctly sent to Appian. The usernames can be corrected in&amp;nbsp;two ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to&amp;nbsp;send&amp;nbsp;usernames in the form expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Enable additional loggers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Enabling the following loggers will record additional details about SAML logins in the JBoss server log. Alter the following lines to &lt;code&gt;DEBUG&lt;/code&gt; in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources/appian_log4j.properties&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG
log4j.logger.org.springframework.security=DEBUG
log4j.logger.org.opensaml.saml2=DEBUG&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. The username of the user attempting to log in (e.g.&amp;nbsp;&lt;code&gt;john.smith&lt;/code&gt;)&amp;nbsp;can, for example, appear in the following&amp;nbsp;forms in the SAML assertion:&lt;/p&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:NameID&lt;/span&gt; &lt;span class="na"&gt;Format=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:NameID&amp;gt;&lt;br /&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:Attribute&lt;/span&gt; &lt;span class="na"&gt;Name=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;usernameAttribute&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;NameFormat=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:2.0:attrname-format:basic&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;    &amp;lt;saml2:AttributeValue&lt;/span&gt; &lt;span class="na"&gt;xmlns:xsi=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;xsi:type=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;xs:string&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:AttributeValue&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/saml2:Attribute&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;If the username appears correct but the user is still unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a support case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps lead to a expeditious resolution to the issue.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to&amp;nbsp;Appian versions 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: January 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, how-to, authentication&lt;/div&gt;
</description></item><item><title>DRAFT KB-XXXX How to troubleshoot SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/13</link><pubDate>Mon, 15 Jan 2018 17:58:37 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 13 posted to Appian Knowledge Base by Parmida Borhani on 1/15/2018 5:58:37 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, it is possible that only a subset of users experience issues logging in, while others are able to log in without issues. The most common cause for SSO login issues experienced by only some users is the Identity Provider (IdP) sending an erroneous username to Appian. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;p&gt;This article&amp;nbsp;provides a framework for troubleshooting SSO issues impacting only a subset of users. If no users are able to log in, double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Ensure the user is using the correct username and password&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Before proceeding with further troubleshooting, make sure that the users for whom login attempts are failing, are using the correct username and password for the IdP. These credentials may be different from the username/password combinations used with native Appian authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;Check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also ensure that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password, or otherwise prevented from successfully authenticating. The easiest way to check this is to see if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs&lt;/code&gt;&amp;nbsp;directory can provide additional information about the login attempts coming from the IdP. As login issues for some SSO users are typically caused by&amp;nbsp;erroneous&amp;nbsp;usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being sent, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example, a failed login attempt might look like this:&lt;/p&gt;
&lt;pre&gt;2017-08-29 15:51:22,&lt;strong&gt;usr.name&lt;/strong&gt;,&lt;em&gt;&lt;strong&gt;Failed&lt;/strong&gt;&lt;/em&gt;,192.168.14.15,&lt;em&gt;&lt;strong&gt;Portal&lt;/strong&gt;&lt;/em&gt;,&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36&amp;quot;&lt;/pre&gt;
&lt;p&gt;To determine if this is the cause, you may compare these login attempts to the list of users found in the Administration Console to cross reference and determine if the username is correctly sent to Appian. The usernames can be corrected in&amp;nbsp;two ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to&amp;nbsp;send&amp;nbsp;usernames in the form expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Enable additional loggers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Enabling the following loggers will record additional details about SAML logins in the JBoss server log. Alter the following lines to &lt;code&gt;DEBUG&lt;/code&gt; in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources/appian_log4j.properties&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG
log4j.logger.org.springframework.security=DEBUG
log4j.logger.org.opensaml.saml2=DEBUG&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. The username of the user attempting to log in (e.g.&amp;nbsp;&lt;code&gt;john.smith&lt;/code&gt;)&amp;nbsp;can, for example, appear in the following&amp;nbsp;forms in the SAML assertion:&lt;/p&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:NameID&lt;/span&gt; &lt;span class="na"&gt;Format=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:NameID&amp;gt;&lt;br /&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:Attribute&lt;/span&gt; &lt;span class="na"&gt;Name=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;usernameAttribute&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;NameFormat=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:2.0:attrname-format:basic&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;    &amp;lt;saml2:AttributeValue&lt;/span&gt; &lt;span class="na"&gt;xmlns:xsi=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;xsi:type=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;xs:string&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:AttributeValue&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/saml2:Attribute&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;If the username appears correct but the user is still unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a support case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps lead to a expeditious resolution to the issue.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to&amp;nbsp;Appian versions 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: January 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, authentication&lt;/div&gt;
</description></item><item><title>DRAFT KB-XXXX How to troubleshoot SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/12</link><pubDate>Mon, 15 Jan 2018 17:54:26 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 12 posted to Appian Knowledge Base by Parmida Borhani on 1/15/2018 5:54:26 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, it is possible that only a subset of users experience issues logging in, while others are able to log in without issues. The most common cause for SSO login issues experienced by only some users is the Identity Provider (IdP) sending an erroneous username to Appian. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;p&gt;This article&amp;nbsp;provides a framework for troubleshooting SSO issues impacting only a subset of users. If no users are able to log in, double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Ensure the user is using the correct username and password&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Before proceeding with further troubleshooting, make sure that the users for whom login attempts are failing are using the correct username and password for the IdP. These may be different from the username/password combinations used with native Appian authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;Check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also ensure that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password or otherwise prevented from successfully authenticating. The easiest way to check this is to see if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs&lt;/code&gt;&amp;nbsp;directory can provide additional information about the login attempts coming from the IdP. As login issues for some SSO users are typically caused by&amp;nbsp;erroneous&amp;nbsp;usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being sent, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example, a failed login attempt might look like this:&lt;/p&gt;
&lt;pre&gt;2017-08-29 15:51:22,&lt;strong&gt;usr.name&lt;/strong&gt;,&lt;em&gt;&lt;strong&gt;Failed&lt;/strong&gt;&lt;/em&gt;,192.168.14.15,&lt;em&gt;&lt;strong&gt;Portal&lt;/strong&gt;&lt;/em&gt;,&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36&amp;quot;&lt;/pre&gt;
&lt;p&gt;To determine if this is the cause, you may compare these login attempts to the list of users found in the Administration Console to cross reference and determine if the username is correctly sent to Appian. The usernames can be corrected in&amp;nbsp;two ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to&amp;nbsp;send&amp;nbsp;usernames in the form expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Enable additional loggers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Enabling the following loggers will record additional details about SAML logins in the JBoss log files. Alter the following lines to &lt;code&gt;DEBUG&lt;/code&gt; in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources/appian_log4j.properties&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG
log4j.logger.org.springframework.security=DEBUG
log4j.logger.org.opensaml.saml2=DEBUG&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. The username of the user attempting to log in (e.g.&amp;nbsp;&lt;code&gt;john.smith&lt;/code&gt;)&amp;nbsp;can, for example, appear in the following&amp;nbsp;forms in the SAML assertion:&lt;/p&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:NameID&lt;/span&gt; &lt;span class="na"&gt;Format=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:NameID&amp;gt;&lt;br /&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:Attribute&lt;/span&gt; &lt;span class="na"&gt;Name=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;usernameAttribute&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;NameFormat=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:2.0:attrname-format:basic&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;    &amp;lt;saml2:AttributeValue&lt;/span&gt; &lt;span class="na"&gt;xmlns:xsi=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;xsi:type=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;xs:string&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:AttributeValue&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/saml2:Attribute&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;If the username appears correct but the user is still unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a support case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps find an expedient resolution to the issue.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to&amp;nbsp;Appian versions 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: January 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, authentication&lt;/div&gt;
</description></item><item><title>DRAFT KB-XXXX Troubleshooting SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/11</link><pubDate>Mon, 15 Jan 2018 11:08:58 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Jussi Lundstedt</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 11 posted to Appian Knowledge Base by Jussi Lundstedt on 1/15/2018 11:08:58 AM&lt;br /&gt;
&lt;h2&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, a subset of users experiences issues logging in, while others are able to log in without issues.&lt;/p&gt;
&lt;h2&gt;Cause&lt;/h2&gt;
&lt;p&gt;The most common cause for SSO login issues experienced by only some users is the Identity Provider (IdP) sending an erroneous username to Appian. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;h2&gt;Action&lt;/h2&gt;
&lt;p&gt;The below steps provide a framework for troubleshooting SSO issues impacting only a subset of users. If no users are able to log in, double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Ensure the user is using the correct username and password&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Before proceeding with further troubleshooting, make sure that the users for whom login attempts are failing are using the correct username and password for the IdP. These may be different from the username/password combinations used with native Appian authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;Check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also ensure that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password or otherwise prevented from successfully authenticating. The easiest way to check this is to see if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs&lt;/code&gt;&amp;nbsp;directory can provide additional information about the login attempts coming from the IdP. As login issues for some SSO users are typically caused by&amp;nbsp;erroneous&amp;nbsp;usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being sent, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example, a failed login attempt might look like this:&lt;/p&gt;
&lt;pre&gt;2017-08-29 15:51:22,&lt;strong&gt;usr.name&lt;/strong&gt;,&lt;em&gt;&lt;strong&gt;Failed&lt;/strong&gt;&lt;/em&gt;,192.168.14.15,&lt;em&gt;&lt;strong&gt;Portal&lt;/strong&gt;&lt;/em&gt;,&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36&amp;quot;&lt;/pre&gt;
&lt;p&gt;To determine if this is the cause, you may compare these login attempts to the list of users found in the Administration Console to cross reference and determine if the username is correctly sent to Appian. The usernames can be corrected in&amp;nbsp;two ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to&amp;nbsp;send&amp;nbsp;usernames in the form expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Enable additional loggers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Enabling the following loggers will record additional details about SAML logins in the JBoss log files. Alter the following lines to &lt;code&gt;DEBUG&lt;/code&gt; in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources/appian_log4j.properties&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG
log4j.logger.org.springframework.security=DEBUG
log4j.logger.org.opensaml.saml2=DEBUG&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. The username of the user attempting to log in (e.g.&amp;nbsp;&lt;code&gt;john.smith&lt;/code&gt;)&amp;nbsp;can, for example, appear in the following&amp;nbsp;forms in the SAML assertion:&lt;/p&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:NameID&lt;/span&gt; &lt;span class="na"&gt;Format=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:NameID&amp;gt;&lt;br /&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:Attribute&lt;/span&gt; &lt;span class="na"&gt;Name=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;usernameAttribute&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;NameFormat=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:2.0:attrname-format:basic&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;    &amp;lt;saml2:AttributeValue&lt;/span&gt; &lt;span class="na"&gt;xmlns:xsi=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;xsi:type=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;xs:string&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:AttributeValue&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/saml2:Attribute&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;If the username appears correct but the user is still unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a support case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps find an expedient resolution to the issue.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to&amp;nbsp;Appian versions 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: January 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, authentication&lt;/div&gt;
</description></item><item><title>DRAFT KB-XXXX Troubleshooting SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/10</link><pubDate>Mon, 15 Jan 2018 11:05:59 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Jussi Lundstedt</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 10 posted to Appian Knowledge Base by Jussi Lundstedt on 1/15/2018 11:05:59 AM&lt;br /&gt;
&lt;h2&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, a subset of users experiences issues logging in, while others are able to log in without issues.&lt;/p&gt;
&lt;h2&gt;Cause&lt;/h2&gt;
&lt;p&gt;The most common cause for SSO login issues experienced by only some users is the Identity Provider (IdP) sending an erroneous username to Appian. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;h2&gt;Action&lt;/h2&gt;
&lt;p&gt;The below steps provide a framework for troubleshooting SSO issues impacting only a subset of users. If no users are able to log in, double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Ensure the user is using the correct username and password&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Before proceeding with further troubleshooting, make sure that the users for whom login attempts are failing are using the correct username and password for the IdP. These may be different from the username/password combinations used with native Appian authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;Check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also ensure that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password or otherwise prevented from successfully authenticating. The easiest way to check this is to see if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs/audit&lt;/code&gt;&amp;nbsp;directory can provide additional information about the login attempts coming from the IdP. As login issues for some SSO users are typically caused by&amp;nbsp;erroneous&amp;nbsp;usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being sent, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example, a failed login attempt might look like this:&lt;/p&gt;
&lt;pre&gt;2017-08-29 15:51:22,&lt;strong&gt;usr.name&lt;/strong&gt;,&lt;em&gt;&lt;strong&gt;Failed&lt;/strong&gt;&lt;/em&gt;,192.168.14.15,&lt;em&gt;&lt;strong&gt;Portal&lt;/strong&gt;&lt;/em&gt;,&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36&amp;quot;&lt;/pre&gt;
&lt;p&gt;To determine if this is the cause, you may compare these login attempts to the list of users found in the Administration Console to cross reference and determine if the username is correctly sent to Appian. The usernames can be corrected in&amp;nbsp;two ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to&amp;nbsp;send&amp;nbsp;usernames in the form expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Enable additional loggers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Enabling the following loggers will record additional details about SAML logins in the JBoss log files. Alter the following lines to &lt;code&gt;DEBUG&lt;/code&gt; in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources/appian_log4j.properties&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG
log4j.logger.org.springframework.security=DEBUG
log4j.logger.org.opensaml.saml2=DEBUG&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. The username of the user attempting to log in (e.g.&amp;nbsp;&lt;code&gt;john.smith&lt;/code&gt;)&amp;nbsp;can, for example, appear in the following&amp;nbsp;forms in the SAML assertion:&lt;/p&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:NameID&lt;/span&gt; &lt;span class="na"&gt;Format=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:NameID&amp;gt;&lt;br /&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:Attribute&lt;/span&gt; &lt;span class="na"&gt;Name=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;usernameAttribute&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;NameFormat=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:2.0:attrname-format:basic&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;    &amp;lt;saml2:AttributeValue&lt;/span&gt; &lt;span class="na"&gt;xmlns:xsi=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;xsi:type=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;xs:string&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:AttributeValue&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/saml2:Attribute&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;If the username appears correct but the user is still unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a support case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps find an expedient resolution to the issue.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to&amp;nbsp;Appian versions 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: January 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, authentication&lt;/div&gt;
</description></item><item><title>DRAFT KB-XXXX Troubleshooting SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/9</link><pubDate>Mon, 15 Jan 2018 11:03:24 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Jussi Lundstedt</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 9 posted to Appian Knowledge Base by Jussi Lundstedt on 1/15/2018 11:03:24 AM&lt;br /&gt;
&lt;h2&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, a subset of users experiences issues logging in, while others are able to log in without issues.&lt;/p&gt;
&lt;h2&gt;Cause&lt;/h2&gt;
&lt;p&gt;The most common cause for SSO login issues experienced by only some users is the Identity Provider (IdP) sending an erroneous username to Appian. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;h2&gt;Action&lt;/h2&gt;
&lt;p&gt;The below steps provide a framework for troubleshooting SSO issues impacting only a subset of users. If no users are able to log in, double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Ensure the user is using the correct username and password&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Before proceeding with further troubleshooting, make sure that the users for whom login attempts are failing are using the correct username and password for the IdP. These may be different from the username/password combinations used with native Appian authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;Check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also ensure that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password or otherwise prevented from successfully authenticating. The easiest way to check this is to see if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs/audit&lt;/code&gt;&amp;nbsp;directory can provide additional information about the login attempts coming from the IdP. As login issues for some SSO users are typically caused by&amp;nbsp;erroneous&amp;nbsp;usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being sent, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example, a failed login attempt might look like this:&lt;/p&gt;
&lt;pre&gt;2017-08-29 15:51:22,&lt;strong&gt;usr.name&lt;/strong&gt;,&lt;em&gt;&lt;strong&gt;Failed&lt;/strong&gt;&lt;/em&gt;,192.168.14.15,&lt;em&gt;&lt;strong&gt;Portal&lt;/strong&gt;&lt;/em&gt;,&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36&amp;quot;&lt;/pre&gt;
&lt;p&gt;To determine if this is the cause, you may compare these login attempts to the list of users found in the Administration Console to cross reference and determine if the username is correctly sent to Appian. The usernames can be corrected in&amp;nbsp;three&amp;nbsp;ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to&amp;nbsp;send&amp;nbsp;usernames in the form expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Enable additional loggers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Enabling the following loggers will record additional details about SAML logins in the JBoss log files. Alter the following lines to &lt;code&gt;DEBUG&lt;/code&gt; in &lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/ear/suite.ear/resources/appian_log4j.properties&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;log4j.logger.com.appiancorp.security=DEBUG
log4j.logger.org.springframework.security=DEBUG
log4j.logger.org.opensaml.saml2=DEBUG&lt;/pre&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. The username of the user attempting to log in (e.g.&amp;nbsp;&lt;code&gt;john.smith&lt;/code&gt;)&amp;nbsp;can, for example, appear in the following&amp;nbsp;forms in the SAML assertion:&lt;/p&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:NameID&lt;/span&gt; &lt;span class="na"&gt;Format=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:NameID&amp;gt;&lt;br /&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code class="language-xml"&gt;&lt;span class="nt"&gt;&amp;lt;saml2:Attribute&lt;/span&gt; &lt;span class="na"&gt;Name=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;usernameAttribute&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;NameFormat=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;urn:oasis:names:tc:SAML:2.0:attrname-format:basic&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;    &amp;lt;saml2:AttributeValue&lt;/span&gt; &lt;span class="na"&gt;xmlns:xsi=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;quot;&lt;/span&gt; &lt;span class="na"&gt;xsi:type=&lt;/span&gt;&lt;span class="s"&gt;&amp;quot;xs:string&amp;quot;&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;john.smith&lt;span class="nt"&gt;&amp;lt;/saml2:AttributeValue&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/saml2:Attribute&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;If the username appears correct but the user is still unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a support case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps find an expedient resolution to the issue.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to&amp;nbsp;Appian versions 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: January 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, authentication&lt;/div&gt;
</description></item><item><title>DRAFT KB-XXXX Troubleshooting SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/8</link><pubDate>Tue, 09 Jan 2018 21:54:47 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 8 posted to Appian Knowledge Base by Parmida Borhani on 1/9/2018 9:54:47 PM&lt;br /&gt;
&lt;h2&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, a subset of users experiences issues logging in, while others are able to log in without issues.&lt;/p&gt;
&lt;h2&gt;Cause&lt;/h2&gt;
&lt;p&gt;The most common cause for SSO login issues experienced by only some users is a mis-broadcasting of the username from the Identity Provider. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;h2&gt;Action&lt;/h2&gt;
&lt;p&gt;The below steps provide a framework for troubleshooting SSO issues impacting only a subset of users. If no users are able to log in, double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In order to determine which users are impacted, check the&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs/audit&lt;/code&gt;&amp;nbsp;directory. As login issues for some SSO users are typically caused by mistakenly broadcast usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being sent, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To determine if this is the cause, you may compare these login attempts to the list of users found in the Administration Console to cross reference and determine if the username is correctly sent to Appian. Mis-broadcast usernames can be corrected in&amp;nbsp;three&amp;nbsp;ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to broadcast usernames as expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;Request help from Appian Technical Support in renaming users impacted by the issue.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;If the&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files do not indicate any of the errors above, check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also ensure that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password or otherwise prevented from successfully authenticating. The easiest way to check this is to see if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. If the user is unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a support case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps find an expedient resolution to the issue.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to&amp;nbsp;Appian versions 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: January 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, authentication&lt;/div&gt;
</description></item><item><title>DRAFT KB-XXXX Troubleshooting SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/7</link><pubDate>Tue, 09 Jan 2018 21:45:52 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 7 posted to Appian Knowledge Base by Parmida Borhani on 1/9/2018 9:45:52 PM&lt;br /&gt;
&lt;h2&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, a subset of users experiences issues logging in, while others are able to log in without issues.&lt;/p&gt;
&lt;h2&gt;Cause&lt;/h2&gt;
&lt;p&gt;The most common cause for SSO login issues experienced by only some users is a mis-broadcasting of the username from the Identity Provider. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;h2&gt;Action&lt;/h2&gt;
&lt;p&gt;The below steps provide a framework for troubleshooting SSO issues impacting only a subset of users. If no users are able to log in, double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In order to determine which users are impacted, check the&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs/audit&lt;/code&gt;&amp;nbsp;directory. As login issues for some SSO users are typically caused by mistakenly broadcast usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being sent, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To determine if this is the cause, you may compare these login attempts to the list of users found in the Administration Console to cross reference and determine if the username is correctly broadcast to Appian. Mis-broadcast usernames can be corrected in&amp;nbsp;three&amp;nbsp;ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to broadcast usernames as expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;Request help from Appian Technical Support in renaming users impacted by the issue.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;If the&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files do not indicate any of the errors above, check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also ensure that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password or otherwise prevented from successfully authenticating. The easiest way to check this is to see if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. If the user is unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a support case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps find an expedient resolution to the issue.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to&amp;nbsp;Appian versions 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: January 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, authentication&lt;/div&gt;
</description></item><item><title>KB-XXXX Troubleshooting SSO Login Issues Impacting Some Users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/1</link><pubDate>Tue, 09 Jan 2018 18:10:50 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Jussi Lundstedt</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Jussi Lundstedt on 1/9/2018 6:10:50 PM&lt;br /&gt;
&lt;h3&gt;Symptom&lt;/h3&gt;
&lt;p&gt;After enabling SSO based authentication, a subset of users experiences issues logging in, while others are able to log in without issues.&lt;/p&gt;
&lt;h3&gt;Cause&lt;/h3&gt;
&lt;p&gt;The most common cause for SSO login issues experienced by only some users is a mis-broadcasting of the username. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;h3&gt;Action&lt;/h3&gt;
&lt;p&gt;The below steps provide a framework for troubleshooting SSO issues impacting only some users. If no users are able to log in, please double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In order to determine which users are impacted, check the&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs/audit&lt;/code&gt;&amp;nbsp;directory. As login issues for some SSO users are typically caused by mistakenly broadcast usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being broadcast, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To determine if this is the cause, you may compare these to the list of users found in the Administration Console to cross reference and determine if the username is correctly broadcast. Misbroadcast usernames can be corrected in four ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to broadcast usernames as expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;Request help from Appian Technical Support in renaming users impacted by the issue.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider can fix this.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication with the exception of allowing multiple SAML IdPs&amp;nbsp;per user in Appian 17.4 and later.&amp;nbsp;If the&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files do not indicate any of the errors above, check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also check that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password or otherwise prevented from successfully authenticating. The easiest way to check this is if the user is able to authenticate with the IdP itself. If this does not work, the issue is most likely with the IdP rather than Appian&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome. If the user is unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the user in Appian but not the IdP, submit a new case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Technical Support staff to cross-check for differences between successful and failed logins, and helps find an expedient resolution to the issue.&lt;/p&gt;
&lt;h3&gt;Affected Versions&lt;/h3&gt;
&lt;p&gt;This article applies to all Appian versions that support configuring SAML authentication via the Admin Console. Some of the troubleshooting tips above may also apply to earlier Appian versions with SSO configured via custom Spring Security files.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, authentication&lt;/div&gt;
</description></item><item><title>DRAFT KB-XXXX Troubleshooting SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/6</link><pubDate>Tue, 09 Jan 2018 18:10:11 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 6 posted to Appian Knowledge Base by Parmida Borhani on 1/9/2018 6:10:11 PM&lt;br /&gt;
&lt;h2&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, a subset of users experiences issues logging in, while others are able to log in without issues.&lt;/p&gt;
&lt;h2&gt;Cause&lt;/h2&gt;
&lt;p&gt;The most common cause for SSO login issues experienced by only some users is a mis-broadcasting of the username from the Identity Provider. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;h2&gt;Action&lt;/h2&gt;
&lt;p&gt;The below steps provide a framework for troubleshooting SSO issues impacting only some users. If no users are able to log in, please double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In order to determine which users are impacted, check the&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs/audit&lt;/code&gt;&amp;nbsp;directory. As login issues for some SSO users are typically caused by mistakenly broadcast usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being broadcast, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To determine if this is the cause, you may compare these to the list of users found in the Administration Console to cross reference and determine if the username is correctly broadcast to Appian. Misbroadcast usernames can be corrected in&amp;nbsp;three&amp;nbsp;ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to broadcast usernames as expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;Request help from Appian Technical Support in renaming users impacted by the issue.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;If the&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files do not indicate any of the errors above, check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also check that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password or otherwise prevented from successfully authenticating. The easiest way to check this is if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. If the user is unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a new case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps find an expedient resolution to the issue.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to&amp;nbsp;Appian versions 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: January 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, authentication&lt;/div&gt;
</description></item><item><title>DRAFT KB-XXXX Troubleshooting SAML login issues impacting only some users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/5</link><pubDate>Tue, 09 Jan 2018 18:10:00 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 5 posted to Appian Knowledge Base by Parmida Borhani on 1/9/2018 6:10:00 PM&lt;br /&gt;
&lt;h2&gt;Symptom&lt;/h2&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, a subset of users experiences issues logging in, while others are able to log in without issues.&lt;/p&gt;
&lt;h2&gt;Cause&lt;/h2&gt;
&lt;p&gt;The most common cause for SSO login issues experienced by only some users is a mis-broadcasting of the username from the Identity Provider. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;h2&gt;Action&lt;/h2&gt;
&lt;p&gt;The below steps provide a framework for troubleshooting SSO issues impacting only some users. If no users are able to log in, please double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In order to determine which users are impacted, check the&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs/audit&lt;/code&gt;&amp;nbsp;directory. As login issues for some SSO users are typically caused by mistakenly broadcast usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being broadcast, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To determine if this is the cause, you may compare these to the list of users found in the Administration Console to cross reference and determine if the username is correctly broadcast to Appian. Misbroadcast usernames can be corrected in&amp;nbsp;three&amp;nbsp;ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to broadcast usernames as expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;Request help from Appian Technical Support in renaming users impacted by the issue.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;If the&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files do not indicate any of the errors above, check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also check that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password or otherwise prevented from successfully authenticating. The easiest way to check this is if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. If the user is unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a new case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps find an expedient resolution to the issue.&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to&amp;nbsp;Appian versions 7.11 and later.&lt;/p&gt;
&lt;p&gt;Last Reviewed: January 2018&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, authentication&lt;/div&gt;
</description></item><item><title>KB-XXXX Troubleshooting SAML Login Issues Impacting Only Some Users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/4</link><pubDate>Tue, 09 Jan 2018 13:40:08 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Jussi Lundstedt</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 4 posted to Appian Knowledge Base by Jussi Lundstedt on 1/9/2018 1:40:08 PM&lt;br /&gt;
&lt;h3&gt;Symptom&lt;/h3&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, a subset of users experiences issues logging in, while others are able to log in without issues.&lt;/p&gt;
&lt;h3&gt;Cause&lt;/h3&gt;
&lt;p&gt;The most common cause for SSO login issues experienced by only some users is a mis-broadcasting of the username from the Identity Provider. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;h3&gt;Action&lt;/h3&gt;
&lt;p&gt;The below steps provide a framework for troubleshooting SSO issues impacting only some users. If no users are able to log in, please double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In order to determine which users are impacted, check the&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs/audit&lt;/code&gt;&amp;nbsp;directory. As login issues for some SSO users are typically caused by mistakenly broadcast usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being broadcast, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To determine if this is the cause, you may compare these to the list of users found in the Administration Console to cross reference and determine if the username is correctly broadcast to Appian. Misbroadcast usernames can be corrected in&amp;nbsp;three&amp;nbsp;ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to broadcast usernames as expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;Request help from Appian Technical Support in renaming users impacted by the issue.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider&amp;nbsp;will enable Appian to treat all usernames as lowercase regardless of IdP casing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;If the&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files do not indicate any of the errors above, check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also check that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password or otherwise prevented from successfully authenticating. The easiest way to check this is if the user is able to authenticate with the IdP itself. If the user is unable to authenticate with the IdP, the issue is most likely with the IdP rather than Appian.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome to gather the SAML request and response. If the user is unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a new case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps find an expedient resolution to the issue.&lt;/p&gt;
&lt;h3&gt;Affected Versions&lt;/h3&gt;
&lt;p&gt;This article applies to all Appian versions that support configuring SAML authentication via the Admin Console. Some of the&amp;nbsp;diagnosis&amp;nbsp;tips above may also apply to earlier Appian versions with SSO configured via custom Spring Security files. Please note that configuring SSO via custom Spring Security override files is deprecated as of Appian 7.11 and Appian Technical Support is unable to assist in resolving issues arising with custom override files.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, authentication&lt;/div&gt;
</description></item><item><title>KB-XXXX Troubleshooting SAML Login Issues Impacting Only Some Users</title><link>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users/revision/3</link><pubDate>Tue, 09 Jan 2018 13:21:46 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:14c25dca-dfee-431e-90df-2dab5df9cf30</guid><dc:creator>Jussi Lundstedt</dc:creator><comments>https://community.appian.com/support/w/kb/753/kb-1450-how-to-troubleshoot-saml-login-issues-impacting-only-some-users#comments</comments><description>Revision 3 posted to Appian Knowledge Base by Jussi Lundstedt on 1/9/2018 1:21:46 PM&lt;br /&gt;
&lt;h3&gt;Symptom&lt;/h3&gt;
&lt;p&gt;After enabling SAML&amp;nbsp;authentication, a subset of users experiences issues logging in, while others are able to log in without issues.&lt;/p&gt;
&lt;h3&gt;Cause&lt;/h3&gt;
&lt;p&gt;The most common cause for SSO login issues experienced by only some users is a mis-broadcasting of the username from the Identity Provider. Appian usernames are always case sensitive, whereas some Identity Providers (IdPs) may be case agnostic in their treatment of usernames.&lt;/p&gt;
&lt;h3&gt;Action&lt;/h3&gt;
&lt;p&gt;The below steps provide a framework for troubleshooting SSO issues impacting only some users. If no users are able to log in, please double check the SSO configurations and ensure that SSO is correctly configured by using the Administration Console to test prior to attempting to follow these steps.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Examine the login-audit.csv files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In order to determine which users are impacted, check the&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files located in the&amp;nbsp;&lt;code&gt;&amp;lt;APPIAN_HOME&amp;gt;/logs/audit&lt;/code&gt;&amp;nbsp;directory. As login issues for some SSO users are typically caused by mistakenly broadcast usernames, look for the following properties in login attempts with&amp;nbsp;a&amp;nbsp;&lt;em&gt;Status&lt;/em&gt;&amp;nbsp;of Failed and a&amp;nbsp;&lt;em&gt;Source&amp;nbsp;&lt;/em&gt;of Portal:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casing errors, such as&amp;nbsp;&lt;code&gt;John.Doe@Acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Mistakenly included or omitted parts of username conventions such as&amp;nbsp;&lt;code&gt;john.doe@acme.com&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Alternative user identifiers being broadcast, such as&amp;nbsp;&lt;code&gt;john.doe&lt;/code&gt;&amp;nbsp;instead of&amp;nbsp;&lt;code&gt;u12345&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To determine if this is the cause, you may compare these to the list of users found in the Administration Console to cross reference and determine if the username is correctly broadcast to Appian. Misbroadcast usernames can be corrected in&amp;nbsp;three&amp;nbsp;ways depending on the nature of the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adjust IdP settings to broadcast usernames as expected by Appian. This is particularly useful if there is a consistent&amp;nbsp;error&amp;nbsp;such as omitting or including the domain part of an e-mail address or sending the wrong type of user identifier.&lt;/li&gt;
&lt;li&gt;Request help from Appian Technical Support in renaming users impacted by the issue.&lt;/li&gt;
&lt;li&gt;If the issue is caused by Appian expecting lowercase usernames and the IdP sending mixed-case usernames, unchecking &amp;quot;Retain Casing&amp;quot; in the Administration Console SAML settings for this identity provider can fix this.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Check user membership in SAML Users group and activation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is a best practice to restrict SAML authentication to a particular group of users to prevent total lockout in the case of an IdP-originated issue or an erroneous configuration change. Appian does not allow the same user multiple methods of authentication (native, LDAP and SAML).&amp;nbsp;If the&amp;nbsp;&lt;code&gt;login-audit.csv&lt;/code&gt;&amp;nbsp;files do not indicate any of the errors above, check that the users impacted by the issue are members of the SAML Users group configured in the Admin Console. While checking this, also check that the users experiencing the issue haven&amp;#39;t been deactivated on the Users tab of the Admin Console.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Check IdP side settings for affected users&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ensure that the users affected have not been deactivated on the IdP side, locked out due to an expired password or otherwise prevented from successfully authenticating. The easiest way to check this is if the user is able to authenticate with the IdP itself. If this does not work, the issue is most likely with the IdP rather than Appian&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Gather a SAML trace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If none of the steps above lead to a solution, you may use a third-party tool such as&amp;nbsp;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" target="_blank"&gt;SAML Tracer&lt;/a&gt;&amp;nbsp;for Firefox or&amp;nbsp;&lt;a href="https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm?hl=en" target="_blank"&gt;SAML Message Decoder&lt;/a&gt;&amp;nbsp;for Chrome. If the user is unable to authenticate with the IdP, contact your IdP&amp;#39;s technical support staff. If the issue only impacts the users in Appian but not the IdP, submit a new case to Appian Technical Support and include SAML Traces (request and response) for a user that is able to authenticate and&amp;nbsp;one that is experiencing issues for further analysis. Submitting both allows Appian Technical Support staff to cross-check for differences between successful and failed logins, and helps find an expedient resolution to the issue.&lt;/p&gt;
&lt;h3&gt;Affected Versions&lt;/h3&gt;
&lt;p&gt;This article applies to all Appian versions that support configuring SAML authentication via the Admin Console. Some of the&amp;nbsp;diagnosis&amp;nbsp;tips above may also apply to earlier Appian versions with SSO configured via custom Spring Security files. Please note that configuring SSO via custom Spring Security override files is deprecated as of Appian 7.11 and Appian Technical Support is unable to assist in resolving issues arising with these custom override files.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: SAML, admin console, authentication&lt;/div&gt;
</description></item></channel></rss>