Enable End-to-End SSL
To achieve end to end SSL you need to configure both internal SSL and WebLogic SSL.
The internal SSL configuration is highly automated whereas the WebLogic SSL configuration requires multiple manual steps. The two are entirely independent, so can be performed in either order. Since the WebLogic configuration requires manual steps Oracle advises doing that first.
Note:
This section does not include configuring SSL for Essbase.
Configure a Standard Non-SSL Oracle Analytics Server System
This section explains how to configure a standard non-SSL Oracle Analytics Server system.
-
Install Oracle Analytics Server.
-
Confirm the system is operational.
Check you can login over HTTP to use:
-
Analytics
-
http://<Host>:<ManagedServerPort>/analytics
-
Fusion Middleware Control
-
http://<Host>:< AdminPort>/em
-
WebLogic Admin Console
-
http://<Host>:<AdminPort>/console
-
Configure WebLogic SSL
These steps configure WebLogic using the provided demo certificates. These are not secure.
Do not use these tasks in a production environment. Using the demo certificates can help you understand how to configure your environment with real certificates.
To configure with a secure certificate signed by a real Certificate Authority see WebLogic documentation. The certificate authority should return the signed server certificate, and provide a corresponding root CA certificate. Where demoCA is mentioned in task steps replace demoCA with your real CA certificate.
Start Only the Administration Server
Starting up just the Administration Server rather than starting everything avoids the need to stop everything while the admin connection properties are in a state of flux, which confuses the stop everything script.
Configure Internal WebLogic Server LDAP to Use LDAPs
If you have configured an external Identity Store, you can skip performing this step.
You can configure an external identity store to use a secure connection. To use an external identity store, you must change the URL in the internal LDAP ID store.
-
Open
<DomainHome>/config/fmwconfig/ovd/default/adapters.os_xml
-
In the
<ldap>
section of this file, insert the following SSL cipher suites:<ldap id="DefaultAuthenticator" version="0"> <ssl> <protocols>TLSv1.2,TLSv1.1</protocols> <cipherSuites> <cipher>SSL_RSA_WITH_AES_128_CBC_SHA</cipher> <cipher>SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA</cipher> <cipher>SSL_ECDH_ECDSA_WITH_AES_128_GCM_SHA256</cipher> </cipherSuites> </ssl> </ldap>
Configure Internal WebLogic Server LDAP Trust Store
You must now provide a trust keystore.
Note:
This section only applies when using WebLogic Server LDAP and when
virtualize=true
is set,
as you're explicitly pointing the Administration Server for the embedded WLS
LDAP.
-
In a terminal window set the ORACLE_HOME and WL_HOME environment variables.
For example, on Linux:
setenv ORACLE_HOME <OracleHome>
setenv WL_HOME <OracleHome>/wlserver/
-
Ensure that both your path and JAVA_HOME point to the JDK 8 installation.
setenv JAVA_HOME <path_to_your_jdk8>
setenv PATH $JAVA_HOME/bin
-
Check the Java version by running:
java -version
-
Run (without the line breaks):
<OracleHome>/oracle_common/bin/libovdconfig.sh
-host <Host>
-port <AdminServerNonSSLPort>
-userName <AdminUserName>
-domainPath <DomainHome>
-createKeystore
When prompted enter the existing password for<AdminUserName>.
When prompted for the OVD Keystore password, choose a new password.
For example:
oracle_common/bin/libovdconfig.sh -host myhost -port 9500 -userName weblogic -domainPath /OracleHome/user_projects/domains/bi -createKeystore Enter AdminServer password: Enter OVD Keystore password: OVD config files already exist for context: default CSF credential creation successful Permission grant already available for context: default OVD MBeans already configured for context: default Successfully created OVD keystore.
The
-port <AdminServerNonSSL>
command doesn't work against the Admin server non-SSL port when it's been disabled. If you enable SSL and then configure LDAPs you would need to temporarily re-enable the non-SSL port on the Administration Server. -
Check the resultant keystore exists, and see its initial contents, by running:
keytool -list -keystore <DomainHome>/config/fmwconfig/ovd/default/keystores/adapters.jks
-
We now need to export the demo certificate in a suitable format to import into the above keystore.
In Fusion Middleware Control:
If using the demo WebLogic certificate you can get the required root CA from the system keystore using Fusion Middleware Control.
-
Select WebLogicDomain, Security, Keystore.
-
Expand System.
-
Select Trust.
-
Click Manage.
-
Select democa, not olddemoca.
-
Click Export.
-
Select export certificate.
-
Choose a file name.
For example, demotrust.pem
If not using the demo WebLogic certificate then you must obtain the root CA of the CA which singed your secure server certificate.
-
-
Now import into the just created keystore:
keytool -importcert -keystore <DomainHome>/config/fmwconfig/ovd/default/keystores/adapters.jks -alias localldap -file <DemoTrustFile>
-
When prompted enter the keystore password you chose earlier, and confirm that the certificate is to be trusted.
-
If you repeat the keystore
-list
command you should see a new entry underlocalldap
, for example:localldap, Jul 8, 2015, trustedCertEntry,
Certificate fingerprint (SHA1):
CA:61:71:5B:64:6B:02:63:C6:FB:83:B1:71:F0:99:D3:54:6A:F7:C8
Disable HTTP
After securing the system to use HTTPS, you must also disable HTTP to fully secure the environment.
-
Login to WebLogic Administration console.
-
Click Lock & Edit.
-
Select environment, servers.
For each server:
-
Display the Configuration tab
-
Clear Listen Port Enabled.
-
Click Save.
-
-
Click Activate Changes.
Verify Server Keystores
You must check that the Administration Server and Managed Servers are configured to use the trust keystore containing your trust certificate.
- Login to WebLogic Administration console.
- Click Lock and Edit.
- Select environment, servers.
- For each Managed Server.
- Click Save.
- Click Activate Changes.
Restart
Now you must restart Oracle Analytics Server.
You can't login through Oracle Analytics Server since Oracle Web Service Manager (OWSM) uses the disabled HTTP port.
Only the HTTPS one should work.
HTTP should quickly display an error similar to Unable to connect error. Don't mix the protocols and ports. The browser can hang when attempting to connect to a running port with the wrong protocol.
- Stop the Administration Server with
<DomainHome>/bitools/bin/stop.sh
. - Start the Administration Server with
<DomainHome>/bitools/bin/start.sh -i AdminServer
. - Confirm that HTTP is disabled by logging into both the HTTP and HTTPS WebLogic console URLs.
Configure OWSM to Use t3s
You must now change the Oracle Web Services Manager (OWSM) configuration to use the HTTPS port.
The HTTP(S) OWSM link isn't used when you use a local OWSM.
After you complete this task, you must restart the system and confirm the OWSM configuration. See Restart System.