4 Configuring Security
This chapter includes the following topics:
- Using SSL with Proxy Plug-Ins
You can use the Transport Layer Security (TLS) or Secure Sockets Layer (SSL) protocols to protect the connection between the proxy plug-in and Oracle WebLogic Server. The TLS/SSL protocol provides confidentiality and integrity to the data passed between the proxy plug-in and Oracle WebLogic Server. - Configuring Perimeter Authentication
Use perimeter authentication to secure Oracle WebLogic Server applications that are accessed by using the proxy plug-in. - About Federal Information Processing Standards
Federal Information Processing Standards (FIPS) is not supported in the 14.1.2.0.0 WLS proxy plug-ins.
Using SSL with Proxy Plug-Ins
You can use the Transport Layer Security (TLS) or Secure Sockets Layer (SSL) protocols to protect the connection between the proxy plug-in and Oracle WebLogic Server. The TLS/SSL protocol provides confidentiality and integrity to the data passed between the proxy plug-in and Oracle WebLogic Server.
The proxy plug-in does not use the transport protocol (HTTP or HTTPS) specified in the HTTP request (usually by the browser) to determine whether to use TLS/SSL to protect the connection between the proxy plug-in and Oracle WebLogic Server; that is, the proxy plug-in is in no way dependent on whether the HTTP request (again, usually from the browser) uses HTTPS (TLS/SSL).
Instead, the proxy plug-in uses TLS/SSL parameters that you configure for the proxy plug-in, as described in SSL Parameters for Oracle WebLogic Server Proxy Plug-Ins, to determine when to use SSL:
-
WebLogicSSLVersion
- Specifies the TLS/SSL protocol version to use for communication between the proxy plug-in and Oracle WebLogic Server. -
WLSSLWallet
- The Oracle WebLogic Server 14.1.2.0.0 Proxy Plug-ins use Oracle wallets to store SSL configuration information.-
Use the
WLSSLWallet
TLS/SSL configuration parameter to configure the wallets. Theorapki
utility is provided in the proxy plug-in distribution for this purpose. -
The orapki utility manages public key infrastructure (PKI) elements, such as wallets and certificate revocation lists, on the command line so the tasks it performs can be incorporated into scripts. This enables you to automate many of the routine tasks of maintaining a PKI. See Using the orapki Utility for Certificate Validation and CRL Management.
-
-
SecureProxy
- TheSecureProxy
parameter determines whether SSL is enabled.
Note:
For information about configuring earlier versions of SSL/TLS on the Oracle WebLogic Server side, see Using the weblogic.security.SSL.protocolVersion System Property in Administering Security for Oracle WebLogic Server.In the case of two-way TLS/SSL, the proxy plug-in (the TLS/SSL client) automatically uses two-way TLS/SSL when Oracle WebLogic Server is configured for two-way TLS/SSL and requests a client certificate. For more information about configuring TLS/SSL in Oracle WebLogic Server, see Set Up TLS in Oracle WebLogic Remote Console Online Help.
If a client certificate is not requested, the proxy plug-ins default to one-way SSL.
Note:
If an Oracle WebLogic Server 14.1.2.0.0 product
is installed on the same system as the WLS OHS Plug-In, the ORACLE_HOME
variable must point to a valid installation; otherwise,
the proxy plug-in fails to initialize SSL.
For example, if ORACLE_HOME
is invalid because the product was not cleanly removed, the proxy plug-in fails to initialize TLS/SSL.
This section includes the following topics:
- Configuring Libraries for SSL
- Configuring a Proxy Plug-In for One-Way SSL
- Configuring a Two-Way SSL Between the Proxy Plug-In and Oracle WebLogic Server
- Replacing Certificates Signed Using the MD5 Algorithm
- Certificates Signed with MD5 Algorithm Not Supported
- Using Certificates Signed with RSASSA-PSS Signature Algorithm
Parent topic: Configuring Security
Configuring Libraries for SSL
WLS proxy plug-ins have been rewritten to use OpenSSL libraries and removed the dependency on Oracle's NZ libraries. Therefore, some minor changes are necessary for the existing deployments to use SSL for communication with Oracle WebLogic Server as described in Configuring Environment Variables.
Note:
The current implementation of the WLS OHS Plug-In does not support the use of multiple certificate files.Configuring Environment Variables
The WLS proxy plug-ins use an Oracle Wallet to store SSL information such as private key, user certificate chain, and the list of trusted certificates. OpenSSL APIs cannot read the content of such wallets. Therefore, it is necessary to export the content of a user-supplied wallet to a format that OpenSSL APIs can read. The content of the wallet will be exported as PEM formatted files on the file system. For each user-supplied wallet, three files may be created in the same file system path where the auto-login wallet is present:
key.pem
: A pass-phrase protected file containing the private key in PEM format, if a private key is present in the wallet.user.crt
: User certificate in PEM format, if a user certificate is present in the wallet.trusted_certs.crt
: Chain of trusted certificates in PEM format.
Parent topic: Configuring Libraries for SSL
Configuring a Proxy Plug-In for One-Way SSL
Perform the following steps to configure one-way SSL.
In these steps, you run the keytool commands on the system on which Oracle WebLogic
Server is installed, and you run the orapki
commands on the system
on which the 14.1.2.0.0 WLS proxy plug-ins are
installed.
Note:
The examples in this section use the Oracle WebLogic Server demo CA. If you are using the proxy plug-in a production environment, ensure that trusted CAs are properly configured for the proxy plug-in and for Oracle WebLogic Server.- Configure Oracle WebLogic Server for SSL. See Configuring SSL in Administering Security for Oracle WebLogic Server.
- Create an Oracle Wallet, by using the
orapki
utility.orapki wallet create -wallet mywallet -auto_login_only
See Using the orapki Utility for Certificate Validation and CRL Management in the Administering Oracle Fusion Middleware.
Note:
Only the user who creates the wallet (or for Windows, the account SYSTEM) has access to the wallet.
This is typically sufficient for the WLS Apache Plug-In because Apache HTTP Server runs as the account SYSTEM on Windows, and as the user who creates it on UNIX.
If the user who runs the WLS Apache Plug-In is different from the user who creates the wallet (or for Windows, the account
SYSTEM
), you need to grant the user access to the wallet by running the commandcacls
(Windows) orchmod
(UNIX) after you create the wallet. For example:cacls <wallet_path>\cwallet.sso /e /g IUSR:R
- Import the Oracle WebLogic Server trust certificate into the Oracle
Wallet.
orapki wallet add -wallet mywallet -trusted_cert -cert <cert_file_name> -auto_login_only
- Complete these steps if the version of the Oracle WebLogic Server instances in the
back end.
- Open the WebLogic Remote Console.
- In the Edit Tree, go to
Environment, then:
- If the server instances to which you want to proxy requests from Apache HTTP Server or Oracle HTTP Server are in a cluster, select Clusters.
- Otherwise, select Servers.
- Select the server or cluster to which you want to proxy requests from Apache HTTP Server or Oracle HTTP Server.
- Click Show Advanced Fields.
- Do one of the following:
To... Turn on... Enable one-way SSL
WebLogic Plug-In Enabled
Enable two-way SSL where client certificates are used to authenticate
Client Cert Proxy Enabled
Enable two-way SSL with client certificates.
Both
If you selected Servers (and not Clusters), repeat this step for every server to which you want to proxy requests from Apache HTTP Server or Oracle HTTP Server.
- Click Save.
For the change to take effect, you must restart the server instances.
- Send a request to
http://host:port/mywebapp/my.jsp
from the browser and validate the response.
Parent topic: Using SSL with Proxy Plug-Ins
Configuring a Two-Way SSL Between the Proxy Plug-In and Oracle WebLogic Server
When Oracle WebLogic Server is configured for a two-way SSL, the proxy plug-in forwards the user certificate to Oracle WebLogic Server. A two-way SSL can be established as long as Oracle WebLogic Server can validate the user certificate.
In these steps, you run the keytool
commands on the system on which Oracle WebLogic Server is installed. You run the orapki
commands on the system on which the 14.1.2.0.0 proxy plug-ins are installed.
Parent topic: Using SSL with Proxy Plug-Ins
Replacing Certificates Signed Using the MD5 Algorithm
When using SSL to connect to Oracle WebLogic Server, ensure that any certificate request or certificates signed with MD5 are replaced by SHA-2 signed certificates in the wallet; otherwise, the server fails to start.
This section includes the following topics:
- Checking the Certificate Signing Algorithm
- Creating a New Wallet to Add Certificates Signed with the SHA-2 Algorithm
- Replacing the Existing Certificates with SHA-2 Signed Certificates
Parent topic: Using SSL with Proxy Plug-Ins
Checking the Certificate Signing Algorithm
orapki
commands:
Table 4-1 Command Parameters
Parameter | Description |
---|---|
|
Specifies the wallet location. |
|
Specifies the distinguished name of the certificate. |
|
Specifies the directory location where the tool places the exported certificate. |
Parent topic: Replacing Certificates Signed Using the MD5 Algorithm
Creating a New Wallet to Add Certificates Signed with the SHA-2 Algorithm
orapki
commands:
Table 4-2 Command Parameters
Parameter | Description |
---|---|
|
Specifies the wallet location. |
|
Specifies the distinguished name of the certificate. |
|
Specifies that it is a trusted certificate. |
|
Specifies that it is a user certificate. |
|
Specifies the wallet password if the wallet is password protected. |
|
Specifies if the wallet is auto_login_only or not. |
|
Specifies the location of the certificate request for the certificate you are creating. |
|
Specifies the directory location of the certificate. |
|
Specifies the key size for the certificate. |
|
Causes the tool to create a root certificate. |
|
Specifies the number of days, starting from the current date, that the root certificate will be valid. |
|
Specifies the sign algorithm to be used. |
Parent topic: Replacing Certificates Signed Using the MD5 Algorithm
Replacing the Existing Certificates with SHA-2 Signed Certificates
If the wallet has a mix of certificates which are signed either with the MD5 or the SHA-2 algorithm, you may want to remove only those certificates which are signed with the MD5 algorithm and keep the certificates that are signed with the SHA-2 algorithm.
${PLUGINS_HOME}/bin/orapki wallet display -wallet test_wallet
Requested Certificates: User Certificates: Subject: CN=localhost,O=FOR TESTING ONLY Trusted Certificates: Subject: CN=localhost,O=FOR TESTING ONLY Subject: CN=im_ca,OU=O,O=oracle,C=IN Subject: CN=root_ca,OU=O,O=oracle,C=IN Subject: CN=test_SHA2_signed_cert,OU=O,O=oracle,C=IN test_wallet contains following certificates signed with MD5 algorithm : Self-signed user certificate : Subject: CN=localhost,O=FOR TESTING ONLY Trusted certificates : Subject: CN=im_ca,OU=O,O=oracle,C=IN Subject: CN=root_ca,OU=O,O=oracle,C=IN
After you have identified the certificate request by which the user and trusted certificates are signed with MD5, complete the following steps to remove them from wallet:
- Remove the CA-signed or the self-signed user certificate:
- Create and import the certificates to the wallet:
orapki
commands:
Table 4-3 Command Parameters
Parameter | Description |
---|---|
|
Specifies the wallet location. |
|
Specifies the distinguished name of the certificate. |
|
Specifies that it is a trusted certificate. |
|
Specifies that it is a user certificate. |
|
Specifies that it is a certificate request. |
|
Specifies the wallet password if the wallet is password protected. |
|
Specifies if the wallet is auto_login_only or not. |
|
Specifies the location of the certificate request for the certificate you are creating. |
|
Specifies the directory location of the certificate. |
|
Specifies the key size for the certificate. |
|
Causes the tool to create a root certificate. |
|
Specifies the number of days, starting from the current date, that the root certificate will be valid. |
|
Specifies the sign algorithm to be used. |
Parent topic: Replacing Certificates Signed Using the MD5 Algorithm
Certificates Signed with MD5 Algorithm Not Supported
Certificates signed using MD5 algorithm are not recommended due to compromised security.
These certificates are no longer supported with the 14.1.2.0.0 WLS proxy plug-ins. The proxy plug-ins refuse to start if MD5 certificates are present in the Oracle Wallet.
Parent topic: Using SSL with Proxy Plug-Ins
Using Certificates Signed with RSASSA-PSS Signature Algorithm
Certificates signed with RSASSA-PSS signature algorithm are very secure and are supported in the Oracle WebLogic Server 14.1.2.0.0 Proxy Plug-ins.
Certificates signed with RSASSA-PSS signature algorithm and private keys generated using the RSASSA-PSS algorithm can be deployed when using TLSv1.3 for communication between the web server and the back-end Oracle WebLogic Server.
With Oracle WebLogic Server 14.1.2.0.0 Proxy Plug-ins, you can configure an RSA certificate with a signature algorithm of RSASSA-PSS as a user certificate for the Apache Web Server. You can then use this certificate to function as a client certificate when the Oracle WebLogic Server requires one for client authentication.
If you have configured Oracle WebLogic Server to use a certificate with RSASSA-PSS signature, the Oracle WebLogic Server 14.1.2.0.0 Proxy Plug-ins support such certificates during an SSL handshake.
Parent topic: Using SSL with Proxy Plug-Ins
Configuring Perimeter Authentication
Use perimeter authentication to secure Oracle WebLogic Server applications that are accessed by using the proxy plug-in.
A WebLogic Identity Assertion Provider authenticates tokens from outside systems that access your Oracle WebLogic Server application, including users who access your Oracle WebLogic Server application through the proxy plug-in. Create an Identity Assertion Provider that will safely secure your proxy plug-in as follows:
See Identity Assertion Providers in Developing Security Providers for Oracle WebLogic Server.
Parent topic: Configuring Security
About Federal Information Processing Standards
Federal Information Processing Standards (FIPS) is not supported in the 14.1.2.0.0 WLS proxy plug-ins.
If FIPS is configured directly at the Oracle WebLogic Server side, and if a request is made through the WLS proxy plug-in with a front-end Apache HTTP Server, the request will fail.
Parent topic: Configuring Security