Had a heck of a time getting a DigiCert wildcard cert converted to a Java Keystore for use with Oracle Fusion Middleware 10.3.6.
Here's the procedure I ended up using to get this working:
- Create wallet
 - mkdir $MW_HOME/owm
 - Start OWM
 - Create new wallet, store it in $MW_HOME/owm
 - Enter password for wallet (make note of this for later)
 - Create certificate request
 - CN: *.domain.com
 - OU: YourDept
 - Org: YourCo
 - Locality: City
 - State: MI
 - Key Size 2048 << important, our CSR will reject without keysize at least 2048
 - Click on certificate, select operation >> export certifciate request
 - Enter request.csr in name
 - Send request.csr to your unix admins
 - Save wallet, back it up in case you make a mistake with the following
 - Unix admins send back the following
 - star_domain_com
 - DigiCERTCA.crt
 - Get root.crt from https://ev-root.digicert.com/info/index.html
 - Copy every thing starting with -----BEGIN CERTIFICATE----- to -----END CERTIFICATE----- in a text file root.crt
 - In OWM, import certificates
 - Operations, import trusted certificate, select root.crt
 - Operations, import trusted certificate, select DigiCertCA.crt
 - Operations, import user certificate, select star_domain_com
 - Do not check auto login
 - Wallet > save wallet
 - Convert wallet to keystore
 - export ORACLE_HOME=$MW_HOME/oracle_common
 - export PATH=$ORACLE_HOME/bin:$PATH
 - export JAVA_HOME=$MW_HOME/Oracle_WT1/jdk
 - orapki wallet pkcs12_to_jks -wallet $MW_HOME/owm -pwd notapassword -jksKeyStoreLoc $MW_HOME/owm/keystore.jks -jksKeyStorepwd notapassword
 - Verify keystore
 - keytool -list -v -keystore keystore.jks -storepass password
 - make note of alias for your specific cert
 - Implement in Fusion Middleware
 - Login to FMW console
 - base_domain > environment, servers, click on server name
 - Keystores tab
 - Custom Identity and Java Standard Trust
 - Custom Identity Keystore: $MW_HOME/owm/keystore.jks
 - Custom identity keystore type: jks
 - Custom identity keystore passphrase: notapassword
 - Save
 - SSL Tab
 - Identity and Trust Locations: change to keystores
 - Private Key Alias, alias from step 3.1.1 above
 - Private Key Passphrase: notapassword
 - Confirm Private Key Passphrase: notapassword
 - Go to general tab
 - Enable SSL listen port enabled
 - Set listen port to port 7003
 - Telnet from another machine to servername:7003 to verify connectivity
 - You should now be able to connect to servername:7003 with a browser and not get an ugly cert error message.
 
Hopefully this will help whoever stumbles for this in the future.
Useful notes:
- Convert Wallet To Keystore for WebLogic. (Doc ID 1363979.1)
 - http://docs.oracle.com/cd/E16340_01/core.1111/e10105/walletmgr.htm#CJGGFCGC