7.1 Configuring Workflow for Two-Way SSL in Oracle GoldenGate Veridata 23c
Prerequisites
- Ensure PATH environment variable contains the path to JDK 17 bin directory, where keytool is located.
- Keystore is also known as Identity Store in older releases.
- Veridata 23.1.0.0.0 NSK C-Agent currently supports only one-way SSL. See Configuring One-Way SSL for the NSK C-Agent on the Veridata Server.
- Enabling SSL in the Agent Properties File
- Generating Agent Keystore and Certificate
- Generating Server Keystore and Certificate
- Importing Agent Certificate to Server Truststore
- Saving Server Keystore/Truststore Passwords to Server Wallet
- Importing Server Certificate to Agent Truststore
- Saving Agent Keystore/Truststore Passwords to Agent Wallet
- Creating an Agent Connection in UI
Parent topic: Secure
7.1.1 Enabling SSL in the Agent Properties File
To enable SSL
in the Agent properties file:
- Open the
<AGENT_DEPLOY_LOCATION>/<AGENT PROPERTIES>
file. The default<AGENT PROPERTIES>
would beagent.properties
. - Find the entry
server.useSsl
, set it totrue
and save the changes.
7.1.2 Generating Agent Keystore and Certificate
To generate agent keystore and certificate file:
- Go to
<AGENT_DEPLOY_LOCATION>/config/certs
directory. - Build Agent Keystore with the following command, you will also need
the same unlock for later
step.
keytool -genkeypair -keyalg RSA -keystore vdtAgentKeystore.p12 -storepass <unlock-password>
- Export Agent Keystore to a certificate with following
command:
keytool -exportcert -keystore vdtAgentKeystore.p12 -storepass <unlock-password> -file vdtAgent.crt
7.1.3 Generating Server Keystore and Certificate
Use the
following keytool commands to generate the server keystore and certificate:
- Go to
<Server_installation_location>/config
directory. - Build Server Keystore with the following
command:
keytool -genkeypair -keyalg RSA -keystore vdtServerKeystore.p12 -storepass <unlock-password>
- Export Server Keystore to a certificate with the following
command:
keytool -exportcert -keystore vdtServerKeystore.p12 -storepass <unlock-password> -file vdtServer.crt
7.1.4 Importing Agent Certificate to Server Truststore
To import agent
certificate to Server truststore:
- Go to
<Server_installation_location>/config
directory, and copy<AGENT_DEPLOY_LOCATION>/config/certs/vdtAgent.crt
to this directory. - Run the following command to create a server truststore and import
agent certificate into this truststore.
Note:
When importing multiple agent certificates into a server truststore, assign a unique-alias
value to each agent certificate.keytool -importcert -file vdtAgent.crt -alias vdtAgent.crt.<unique-id> -keystore vdtServerTruststore.p12 -storepass <unlock-password>
- Delete
vdtAgent.crt
in<Server_installation_location>/config
directory.
7.1.5 Saving Server Keystore/Truststore Passwords to Server Wallet
Run the following script
configure_server_ssl.sh
under
<Server_installation_location>/config
directory:./configure_server_ssl.sh OGGV-80056: Copyright (c) 2013, 2024, Oracle and/or its affiliates. All rights reserved. OGGV-80057: Veridata Server SSL Configuration Utility OGGV-80058: Notes: OGGV-80059: OGGV-80059: This utility allows Veridata to access keystore and truststore. When entering the passwords below, unlock password should match the one used in keytool -storepass option [OGGV-80060: Enter Server Keystore unlock password:] [OGGV-80062: Enter Server Truststore unlock password:]
7.1.6 Importing Server Certificate to Agent Truststore
To import
Server certificate to agent truststore:
- Go to
<AGENT_DEPLOY_LOCATION>/config/certs
directory, and copy<Server_installation_location>/config/vdtServer.crt
to this directory. - Run the following command to create an agent truststore and import
server certificate into this truststore.
Note:
When importing multiple Server certificates into an agent truststore, assign a unique-alias
value to each Server certificate. This is less common, because there is typically only one Oracle GoldenGate Veridata server.keytool -importcert -file vdtServer.crt -alias vdtServer.crt.<unique-id> -keystore vdtAgentTruststore.p12 -storepass <unlock-password>
- Delete
vdtServer.crt
in<AGENT_DEPLOY_LOCATION>/config/certs
directory.
7.1.7 Saving Agent Keystore/Truststore Passwords to Agent Wallet
- Run the script
configure_agent_ssl.sh
under<AGENT_DEPLOY_LOCATION>
directory. The parameterAgentID
is the name of the agent properties file, without the.properties
extension.:./configure_agent_ssl.sh AgentID 2024-08-30 11:21:25.782 TRACE OGGV-80018 Wallet messages are installed correctly. OGGV-80028: Copyright (c) 2013, 2024, Oracle and/or its affiliates. All rights reserved. OGGV-80029: Veridata Agent SSL Configuration Utility OGGV-80030: Notes: OGGV-80031: OGGV-80031: This utility allows Veridata to access keystore and truststore. When entering the passwords below, unlock password should match the one used in keytool -storepass option. [OGGV-80022: Enter Agent Keystore Store unlock password:] [OGGV-80024: Enter Agent Trust Store unlock password:] OGGV-80037: SSL Configuration of Veridata Agent is successful.
- Delete
vdtServer.crt
in<AGENT_DEPLOY_LOCATION>/config/certs
directory.
7.1.8 Creating an Agent Connection in UI
- Log in to the Veridata website, navigate to the Connections page, and click Create on the right side of the page.
- Enter the required connection name and agent host machine address/port. Check
the Use SSL for communication checkbox to enable SSL for the connection, and
click Verify to verify the connection:
Figure 7-1 Create a Connection
- Enter the database username and password, then click the Test Connection
to validate the credentials. If different credentials are needed for repair,
uncheck the Use Data Source Connection Credential for Repair checkbox and
enter the repair credentials.
Figure 7-2 Data Source Connection
- Click Submit to save the connection.