Had a heck of a time getting a DigiCert wildcard cert converted to a Java Keystore for use with Oracle Fusion Middleware 10.3.6.
Here's the procedure I ended up using to get this working:
- Create wallet
- mkdir $MW_HOME/owm
- Start OWM
- Create new wallet, store it in $MW_HOME/owm
- Enter password for wallet (make note of this for later)
- Create certificate request
- CN: *.domain.com
- OU: YourDept
- Org: YourCo
- Locality: City
- State: MI
- Key Size 2048 << important, our CSR will reject without keysize at least 2048
- Click on certificate, select operation >> export certifciate request
- Enter request.csr in name
- Send request.csr to your unix admins
- Save wallet, back it up in case you make a mistake with the following
- Unix admins send back the following
- star_domain_com
- DigiCERTCA.crt
- Get root.crt from https://ev-root.digicert.com/info/index.html
- Copy every thing starting with -----BEGIN CERTIFICATE----- to -----END CERTIFICATE----- in a text file root.crt
- In OWM, import certificates
- Operations, import trusted certificate, select root.crt
- Operations, import trusted certificate, select DigiCertCA.crt
- Operations, import user certificate, select star_domain_com
- Do not check auto login
- Wallet > save wallet
- Convert wallet to keystore
- export ORACLE_HOME=$MW_HOME/oracle_common
- export PATH=$ORACLE_HOME/bin:$PATH
- export JAVA_HOME=$MW_HOME/Oracle_WT1/jdk
- orapki wallet pkcs12_to_jks -wallet $MW_HOME/owm -pwd notapassword -jksKeyStoreLoc $MW_HOME/owm/keystore.jks -jksKeyStorepwd notapassword
- Verify keystore
- keytool -list -v -keystore keystore.jks -storepass password
- make note of alias for your specific cert
- Implement in Fusion Middleware
- Login to FMW console
- base_domain > environment, servers, click on server name
- Keystores tab
- Custom Identity and Java Standard Trust
- Custom Identity Keystore: $MW_HOME/owm/keystore.jks
- Custom identity keystore type: jks
- Custom identity keystore passphrase: notapassword
- Save
- SSL Tab
- Identity and Trust Locations: change to keystores
- Private Key Alias, alias from step 3.1.1 above
- Private Key Passphrase: notapassword
- Confirm Private Key Passphrase: notapassword
- Go to general tab
- Enable SSL listen port enabled
- Set listen port to port 7003
- Telnet from another machine to servername:7003 to verify connectivity
- You should now be able to connect to servername:7003 with a browser and not get an ugly cert error message.
Hopefully this will help whoever stumbles for this in the future.
Useful notes:
- Convert Wallet To Keystore for WebLogic. (Doc ID 1363979.1)
- http://docs.oracle.com/cd/E16340_01/core.1111/e10105/walletmgr.htm#CJGGFCGC
2 comments:
Hi...its really impressive article.thank you for posting!
4k video downloader license key generator
Wow! amazing post.. Thanks for sharing!
Top 15 Cheapest Wildcard SSL Certificates
Post a Comment