4 Performing a Secure Order Balancer Installation

This chapter presents planning information for securely installing Order Balancer and describes recommended deployment topologies that enhance security.

Pre-Installation Configuration

This section lists the pre-requisites for installing Order Balancer with security:
  • You must have at least one dedicated UNIX group and one dedicated user account within that group for Order Balancer. Create a group for Order Balancer that includes the Order Balancer user account and the root user.
  • When creating the Order Balancer WebLogic server domain:
    • Make sure that the administration server and the optional managed server SSL ports are used.
    • After you have created the WebLogic Server domain for Order Balancer, start the WebLogic administration server.
  • Using the WebLogic administration console, configure certificate identity and trust store to use TLS protocol.
  • Import trust certificates into the Order Balancer trust store for each ASAP member instance that will be added to Order Balancer. This enables Order Balancer to connect to the ASAP servers securely.
  • Do not use the default, demonstration certificate that comes with the WebLogic server. See the WebLogic documentation for more information.
  • Disable SSL v3.0 protocol.

    Note:

    Oracle recommends that you configure WebLogic SSL ports so that only the TLS protocol is enabled.

Installing Order Balancer Securely

To deploy and configure Order Balancer securely in the Order Balancer WebLogic server domain, see "Installing Order Balancer" in the ASAP System Administrator's Guide.

Table 4-1 lists the parameters you need to set in the installer input configuration properties file (sampleConfig.properties) to securely install Order Balancer.

Table 4-1 Configuration Properties

Parameter Parameter Value
WLS_PROTOCOL Set the value to t3s.
WLS_PORT Set the value to the SSL Server port of Order Balancer WebLogic server.
WLS_SSL_ENABLED Set the value to true.
WLS_IGNORE_HOSTNAME_VERIFICATION Set the value to true or false in accordance with the trust certificate configuration in Order Balancer WebLogic server.
WLS_TRUST_KEYSTORE Set the value to CustomTrust (default demo certificates should not be used).
WLS_CUSTOM_TRUST_KEYSTORE_TYPE Set the value in accordance with the trust store configuration in Order Balancer WebLogic server.
WLS_CUSTOM_TRUST_KEYSTORE_FILE Set the value to the path of the Order Balancer trust store file as configured in Order Balancer WebLogic server.

Adding ASAP Instances

The ASAP member instance trust certificates are expected to have already been added to the Order Balancer trust store that is configured for Order Balancer to use for SSL communication. To securely add ASAP member instances to Order Balancer, specify the following parameter when running the addASAPServer script:

asapSrvURL: Provide the t3s URL with the SSL port of the ASAP WebLogic server.

Configuring Authentication Providers for Order Balancer

During the Order Balancer installation process, the Order Balancer installer creates default Order Balancer users, groups, roles, and methods in the embedded LDAP authentication provider included with the Order Balancer WebLogic server. You can use this authentication provider to configure the default Order Balancer users, groups, roles, and methods, and add, delete, or modify your own users, groups, roles, and methods.

Managing ASAP WebLogic Server User Security

Order Balancer supports only the default WebLogic server myrealm security realm. Order Balancer administrators can configure user password policies through the WebLogic Administration Console. For more information, see "Installing Order Balancer" in the ASAP System Administrator’s Guide.