12.3 Performing WLST Administration via SSL
The following steps show how to perform WLST administration via SSL:
- By default the SSL port is not enabled for the Administration Server or Oracle
Identity Governance (OIG) managed servers. To configure the SSL port for the
Administration Server and Managed Servers:
- Login to WebLogic Remote Console.
- Click Edit Tree and in the left-hand navigation menu, navigate to
Environment > Servers >
<server_name>
and click on the General tab. - Check the SSL Listen Port Enabled button and provide the SSL Port ( For
AdminServer
:7002
and foroim_server1
):14101
- Click Save.
- Click the Shopping Cart and select Commit Changes.
Note:
If configuring the OIG managed servers for SSL you must enable SSL on the same port for all servers (oim_server1
throughoim_server5
). - Create a
myscripts
directory as follows:cd $WORKDIR/kubernetes
mkdir myscripts
cd myscripts
- Create a sample yaml template file in the
myscripts
directory called<domain_uid>-adminserver-ssl.yaml
to create a Kubernetes service for the Administration Server:Note:
Update thedomainName
,domainUID
andnamespace
based on your environment. For example:apiVersion: v1 kind: Service metadata: labels: serviceType: SERVER weblogic.domainName: governancedomain weblogic.domainUID: governancedomain weblogic.resourceVersion: domain-v2 weblogic.serverName: AdminServer name: governancedomain-adminserver-ssl namespace: oigns spec: clusterIP: None ports: - name: default port: 7002 protocol: TCP targetPort: 7002 selector: weblogic.createdByOperator: "true" weblogic.domainUID: governancedomain weblogic.serverName: AdminServer type: ClusterIP
- Create a
<domain_uid>-oimcluster-ssl.yaml
for the OIG managed server:apiVersion: v1 kind: Service metadata: labels: serviceType: SERVER weblogic.domainName: governancedomain weblogic.domainUID: governancedomain weblogic.resourceVersion: domain-v2 name: governancedomain-cluster-oim-cluster-ssl namespace: oigns spec: clusterIP: None ports: - name: default port: 14101 protocol: TCP targetPort: 14101 selector: weblogic.clusterName: oim_cluster weblogic.createdByOperator: "true" weblogic.domainUID: governancedomain type: ClusterIP
- Apply the template using the following command for the
AdminServer:
For example:kubectl apply -f <domain_uid>-adminserver-ssl.yaml
The output will look similar to the following:kubectl apply -f governancedomain-adminserver-ssl.yaml
service/governancedomain-adminserverssl created
- Apply the template using the following command for the OIG managed
server:
For example:kubectl apply -f governancedomain-oim-cluster-ssl.yaml
The output will look similar to the following:kubectl apply -f governancedomain-oimcluster-ssl.yaml
service/governancedomain-oimcluster-ssl created
- Validate that the Kubernetes services to access SSL ports are created
successfully:
For example:kubectl get svc -n <domain_namespace> |grep ssl
The output will look similar to the following:kubectl get svc -n oigns |grep ssl
governancedomain-adminserver-ssl ClusterIP None <none> 7002/TCP 74s governancedomain-cluster-oim-cluster-ssl ClusterIP None <none> 14101/TCP 21s
- Inside the bash shell of the running helper pod, run the
following:
export WLST_PROPERTIES="-Dweblogic.security.SSL.ignoreHostnameVerification=true -Dweblogic.security.TrustKeyStore=DemoTrust"
cd /u01/oracle/oracle_common/common/bin
The output will look similar to the following:./wlst.sh
To connect to the Administration Server t3s service:Initializing WebLogic Scripting Tool (WLST) ... Welcome to WebLogic Server Administration Scripting Shell Type help() for help on available commands wls:/offline>
The output will look similar to the following:connect('weblogic','<password>','t3s://governancedomain-adminserver-ssl:7002')
To connect to the OIG Managed Server t3s service:Connecting to t3s://governancedomain-adminserver-ssl:7002 with userid weblogic ... <DATE> <Info> <Security> <BEA-090905> <Disabling the CryptoJ JCE Provider self-integrity check for better startup performance. To enable this check, specify -Dweblogic.security.allowCryptoJDefaultJCEVerification=true.> <DATE> <Info> <Security> <BEA-090906> <Changing the default Random Number Generator in RSA CryptoJ from ECDRBG128 to HMACDRBG. To disable this change, specify -Dweblogic.security.allowCryptoJDefaultPRNG=true.> <DATE> <Info> <Security> <BEA-090909> <Using the configured custom SSL Hostname Verifier implementation: weblogic.security.utils.SSLWLSHostnameVerifier$NullHostnameVerifier.> Successfully connected to Admin Server "AdminServer" that belongs to domain "governancedomain". wls:/governancedomain/serverConfig/>
The output will look similar to the following:connect('weblogic','<password>','t3s://governancedomain-cluster-oim-cluster-ssl:14101')
Connecting to t3s://governancedomain-cluster-oim-cluster-ssl:14101 with userid weblogic ... <DATE> <Info> <Security> <BEA-090905> <Disabling the CryptoJ JCE Provider self-integrity check for better startup performance. To enable this check, specify -Dweblogic.security.allowCryptoJDefaultJCEVerification=true.> <DATE> <Info> <Security> <BEA-090906> <Changing the default Random Number Generator in RSA CryptoJ from ECDRBG128 to HMACDRBG. To disable this change, specify -Dweblogic.security.allowCryptoJDefaultPRNG=true.> <DATE> <Info> <Security> <BEA-090909> <Using the configured custom SSL Hostname Verifier implementation: weblogic.security.utils.SSLWLSHostnameVerifier$NullHostnameVerifier.> Successfully connected to managed Server "oim_server1" that belongs to domain "governancedomain". wls:/governancedomain/serverConfig/>