![]() |
![]() |
![]() |
![]() |
![]() |
2. From the home page, go to Targets >Middleware.
3.
4.
5.
• Hostname: Mandatory parameter. Specifies the host where the Tuxedo domain master machine is running.
•
• Application Password: Optional parameter. Specifies the Tuxedo application password Enterprise Manager agent uses to connect to the Tuxedo domain. You must input this parameter if the Tuxedo domain SECURITY value is one of following: APP_PW, USER_AUTH, ACL, or MANDATORY_ACL; otherwise, leave the field blank.
• User name: Optional parameter. Specifies the Tuxedo user name Enterprise Manager agent uses to connect to the Tuxedo domain. You must input this parameter if the Tuxedo domain SECURITY value is one of following: USER_AUTH, ACL, or MANDATORY_ACL; otherwise, leave the field blank.
• User Password: Optional parameter. Specifies the Tuxedo user password Enterprise Manager agent uses to connect to the Tuxedo domain. You need to input this parameter if the Tuxedo domain SECURITY value is one of following: USER_AUTH, ACL, or MANDATORY_ACL; otherwise, leave the field blank.
• Use SSL: Optional. This option refers to SSL mechanism between Enterprise Manager and JMX agent in the tlisten process.
• Find Oracle Tuxedo Domains: If this box is unchecked, Tuxedo security related information is ignored and only tlisten and the Tuxedo Home targets are discovered. Leave this box checked if you want to discover the Tuxedo domains monitored by the tlisten process.
• Monitoring Agent: Mandatory option. It is recommended you select the one residing on the same physical machine with tlisten.
Note: The User name, Password, and Application password are used to generate Enterprise Manager Monitoring Credentialsfor all discovered targets. You can manage Monitoring Credentials by clicking Setup -> Security in the Enterprise Manager console.
6. Click Discover Now.If only one domain is being monitored by tlisten, you will get a list of discovered targets; otherwise, select the domain on the page that appears and enter the parameters specific to the domain, then click Discover Now again.
2. From the home page, navigate to Setup >Add Targets.
3. Enterprise Manager Cloud Control bypasses tlisten and directly adds the target into Enterprise Repository.If the SECURITY parameter of the Tuxedo domain is APP_PW, Enterprise Manager agents provide a Tuxedo application password for authentication. If the SECURITY parameter is USR_AUTH, ACL or MANDATORY_ACL, Enterprise Manager agents provide application password, user name, and user password for authentication; meanwhile, AUTHSVR must be configured in the UBBCONFIG file.The client name of Tuxedo users used by Enterprise Manager must be "tpsysadm"; otherwise, some metrics and job requests will fail.
•
•
1. Run the command line tool jmxaaacfg to generate the password file.The usage of jmxaaacfg is as follows:The argument action specifies one of the actions in add/delete/modify.
• add: adds a new username/password pair.
• delete: deletes the username/password pair.
• modify: changes an existing username/password pair.The parameters "username" and "password" are plaintext. jmxaaacfg will make it encrypted and save it in a password file the user creates. JMX AAA password file has its own format for RMI authentication, which is "username password". The parameter [password file name] should include a reasonable absolute path of the password file the user want to store.
2. To enable SSL, you should enable SSL at tlisten startup. For more information , see Starting the tlisten Process.
• Each time auto discovery is invoked, "Use SSL" property on the domain target is checked. If "Use SSL" is true, the connection between OMS and JMX Agent is under SSL; otherwise, it is not.
• If a metric collection is scheduled, "Use SSL" property on that target is checked. For the connection between Enterprise Manager agent and JMX agent, if "Use SSL" is true, SSL is enabled; otherwise, it is not.Solution: you should run manual discovery again if this scenario occurs.tlisten startup options provide keystore location/password to enable SSL.
• Listing 3‑1 Example - Generate keystore.jksOn the OMS side, SSL follows the standard Java Secure Socket Extension (JSSE). For more information , see the Java Secure Socket Extension (JSSE) Reference Guide.
1.
• The trust store given by javax.net.ssl.trustStore, if such option is set in the WLS startup script, startWebLogic.sh, or WLS startup system property.
• $MW_HOME/oracle_common/jdk/jre/lib/security/jssecacerts, if it exists.
• $MW_HOME/oracle_common/jdk/jre/lib/security/cacerts, if it exists.Where, $MW_HOME is the Oracle Enterprise Manager installation directory.Listing 3‑2 Example - Export CertificateListing 3‑3 Example - Import tuxedo.cer
Note: The default password for $MW_HOME/oracle_common/jdk/jre/lib/security/jssecacerts and $MW_HOME/oracle_common/jdk/jre/lib/security/cacerts is changeit.Enterprise Manager Agent may have a trust store pre-installed, $EMAGENT_HOME/agent_inst/sysman/config/montrust/AgentTrust.jks, where $EMAGENT_HOME is the installed Enterprise Manager agent directory (e.g., /u01/OraHomes/agent).If AgentTrust.jks exists, you should import your public key into AgentTrust.jks; otherwise, copy TuxedoTrust.jks to $EMAGENT_HOME/agent_inst/sysman/config/montrust/ and rename it to AgentTrust.jks.Usually, on the Enterprise Manager Agent side, you need to import the CA certificate into $EMAGENT_HOME/agent_inst/sysman/config/montrust/AgentTrust.jks. For AIX 5.3 64-bit platforms, you must also import the CA certificate into $EMAGENT_HOME/agent_13.1.0.0.0/oracle_common/jdk/jre/lib/security/cacerts.
• $EMAGENT_HOME is the agent install home on the AIX host
• tuxedo is the CA certificate alias
• tuxedo.cer is the CA certificate file
• The Trust store name is AgentTrust.jks and the password is "welcome"; both of them are unchangeable.
• Reboot Enterprise Manager Agent after truststore change if Enterprise Manager Agent is active.Listing 3‑4 Example - Import into AgentTrust.jksListing 3‑5 Example - Verify AgentTrust.jks
1. Ensure that keystore at JMX agent is available and start tlisten with SSL enabled options correctly
4.