Monday, 13 June 2022
Configuring SSL in WebLogic Server 11g and 12c
Configuring SSL in WebLogic Server 11g and 12c
In this blog entry we are going to discuss how to set up SSL in WebLogic Server.
By default WebLogic Admin and managed servers are configured with demo identity and demo trust certificates. This should be reconfigured to use real certicates (certificates of certifying authority)in production environments. You can also configure self-signed certificates.
Before configuring SSL we need to understand what is keystore, identity store, trust store, keytool utilities.
Key Store
It is used to store the certificates. There are various types of Keystore that WebLogic Server Supports. Most common of them is Java Key Store (JKS) , which is a file based repository with extension .jks
Identity Key Store
It is used to store the identity certificates(Signed Certificate issued by a Certificate Authority (CA)) which provides the identity for WebLogic Server or site.
Trust Key Store
It is used to store the trusted certificates or certificates of certifying authority which provides trust for WebLogic Server.
keytool
This utility is used to generate keypairs, generate the csr, import the certificates, list the certificates, delete the certificates etc.,
In order to configure SSL, you need to perform the below steps:
Generate a key-pair
Generate Certificate Signing Request (CSR)
Send the CSR to Certificate Authorities to get it singed.
Import the Signed Certificate into keystore
Configure WebLogic Admin & Managed Servers to use the above certificate keystore
Create a directory to hold the keystores
$ mkdir certs
$ cd certs/
$ export JAVA_HOME=/u01/app/oracle/product/fmw/jrockit-jdk1.6.0_33-R28.2.4-4.1.0/
$ export PATH=$PATH:$JAVA_HOME/bin
Generate a key-pair
A keystore with a key-pair can be created by executing the below command:
$ keytool -genkeypair -alias serverkey -keyalg RSA -keysize 1024 -dname "CN=localhost.localdomain,OU=IT,O=Mastan Inc,L=Hyderabad,S=AP,C=IN" -keystore appIdentity.jks -keypass welcome123 -storepass welcome123
$ ls
appIdentity.jks
This will generate the appIdentity.jks keystore, which is protected with the password welcome123 and it is valid for 3 months by default.
If you want the validity of cert for 1year, you can execute the below command
keytool -genkeypair -alias serverkey -keyalg RSA -keysize 1024 -dname "CN=localhost.localdomain,OU=IT,O=Mastan Inc,L=Hyderabad,S=AP,C=IN" -keystore appIdentity.jks -keypass welcome123 -storepass welcome123 -validity 365
You can list the contents of keystore by executing below command:
$ keytool -list -v -keystore appIdentity.jks -storepass welcome123
Enter keystore password:
Keystore type: JKS
Keystore provider: SUN
Your keystore contains 1 entry
Alias name: serverkey
Creation date: May 27, 2014
Entry type: PrivateKeyEntry
Certificate chain length: 1
Certificate[1]:
Owner: CN=localhost.localdomain, OU=IT, O=Mastan Inc, L=Hyderabad, ST=AP, C=IN
Issuer: CN=localhost.localdomain, OU=IT, O=Mastan Inc, L=Hyderabad, ST=AP, C=IN
Serial number: 5384cacf
Valid from: Tue May 27 22:56:39 IST 2014 until: Mon Aug 25 22:56:39 IST 2014
Certificate fingerprints:
MD5: 99:5C:9B:53:D2:37:BC:34:F7:E6:2D:55:99:DE:1B:2B
SHA1: 1D:EC:6D:E6:0F:AE:76:69:40:0C:73:C5:79:45:1E:74:31:C4:5F:84
Signature algorithm name: SHA1withRSA
Version: 3
*******************************************
*******************************************
The above keystore contains a PrivateKeyEntry with alias serverkey
Generate Certificate Signing Request
By using the key-pair generate a certificate signing request (CSR) or certification request is a message sent from an applicant to a certificate authority in order to get the signed certificate
Execute the below command to generate csr
$ keytool -certreq -alias serverkey -file appIdentity.csr -keystore appIdentity.jks
Enter keystore password:
$ ls
appIdentity.csr appIdentity.jks
You can view the csr file and it looks like as below:
$ cat appIdentity.csr
-----BEGIN NEW CERTIFICATE REQUEST-----
MIIBsDCCARkCAQAwcDELMAkGA1UEBhMCSU4xCzAJBgNVBAgTAkFQMRIwEAYDVQQHEwlIeWRlcmFi
YWQxEzARBgNVBAoTCk1hc3RhbiBJbmMxCzAJBgNVBAsTAklUMR4wHAYDVQQDExVsb2NhbGhvc3Qu
bG9jYWxkb21haW4wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALUhzHv87KMSVIoBssQU38Kv
aalNXYy0laYdf4hazn+qa1CDtK5Yow0cPqtvk4W5vOffebX3BYCKXEricFdv5ejRkkAe6tKQgiBt
jX2WnIulduEQS/piY95QEGu5MbHoy4/JeLsoaDHr73ooclcKcgQC7N3hKKxVtpwwnagZVGXrAgMB
AAGgADANBgkqhkiG9w0BAQUFAAOBgQAWjgUqJf9+mY0sZzFQlHYH0TH8QJkfnXbCfjt8Lz3Jrvzw
0tZuj2LuxcL7supgX3e1DNAmoagJg0rV07kDWxwy3Rafc89R/nFiFo5T71kTnUxxOgjWLDsp6V9G
20cUSFn7wVOezYpPCJcqqXB4VjcJKDwb+PDi8uMIW1nSnRFMAw==
-----END NEW CERTIFICATE REQUEST-----
Send the above generated csr file to Certificate Authorities to get it singed.
Import the Certificates
If you have received a signed certificate from a trusted CA, import it to your keystore. An example is demonstrated with the below command:
keytool -importcert -trustcacerts -file -alias trustcert -keystore appIdentity.jks -storepass welcome123
For demonstration purpose here, we are using self signed certificate to import it into the key store. Follow the below steps to do the same.
$ keytool -exportcert -file selfsign.cer -alias serverkey -keystore appIdentity.jks -storepass welcome123
Certificate stored in file
[mastshai@OEL certs]$ ls
appIdentity.csr appIdentity.jks selfsign.cer
[mastshai@OEL certs]$
$ keytool -printcert -file selfsign.cer
Owner: CN=localhost.localdomain, OU=IT, O=Mastan Inc, L=Hyderabad, ST=AP, C=IN
Issuer: CN=localhost.localdomain, OU=IT, O=Mastan Inc, L=Hyderabad, ST=AP, C=IN
Serial number: 5384cacf
Valid from: Tue May 27 22:56:39 IST 2014 until: Mon Aug 25 22:56:39 IST 2014
Certificate fingerprints:
MD5: 99:5C:9B:53:D2:37:BC:34:F7:E6:2D:55:99:DE:1B:2B
SHA1: 1D:EC:6D:E6:0F:AE:76:69:40:0C:73:C5:79:45:1E:74:31:C4:5F:84
Signature algorithm name: SHA1withRSA
Version: 3
$keytool -importcert -trustcacerts -file selfsign.cer -alias trustcert -keystore appIdentity.jks
Enter keystore password:
Certificate already exists in keystore under alias
Do you still want to add it? [no]: yes
Certificate was added to keystore
List the certificates in the key-store by executing below command
$ keytool -list -v -keystore appIdentity.jks
Enter keystore password:
Keystore type: JKS
Keystore provider: SUN
Your keystore contains 2 entries
Alias name: trustcert
Creation date: May 27, 2014
Entry type: trustedCertEntry
Owner: CN=localhost.localdomain, OU=IT, O=Mastan Inc, L=Hyderabad, ST=AP, C=IN
Issuer: CN=localhost.localdomain, OU=IT, O=Mastan Inc, L=Hyderabad, ST=AP, C=IN
Serial number: 5384cacf
Valid from: Tue May 27 22:56:39 IST 2014 until: Mon Aug 25 22:56:39 IST 2014
Certificate fingerprints:
MD5: 99:5C:9B:53:D2:37:BC:34:F7:E6:2D:55:99:DE:1B:2B
SHA1: 1D:EC:6D:E6:0F:AE:76:69:40:0C:73:C5:79:45:1E:74:31:C4:5F:84
Signature algorithm name: SHA1withRSA
Version: 3
*******************************************
*******************************************
Alias name: serverkey
Creation date: May 27, 2014
Entry type: PrivateKeyEntry
Certificate chain length: 1
Certificate[1]:
Owner: CN=localhost.localdomain, OU=IT, O=Mastan Inc, L=Hyderabad, ST=AP, C=IN
Issuer: CN=localhost.localdomain, OU=IT, O=Mastan Inc, L=Hyderabad, ST=AP, C=IN
Serial number: 5384cacf
Valid from: Tue May 27 22:56:39 IST 2014 until: Mon Aug 25 22:56:39 IST 2014
Certificate fingerprints:
MD5: 99:5C:9B:53:D2:37:BC:34:F7:E6:2D:55:99:DE:1B:2B
SHA1: 1D:EC:6D:E6:0F:AE:76:69:40:0C:73:C5:79:45:1E:74:31:C4:5F:84
Signature algorithm name: SHA1withRSA
Version: 3
*******************************************
*******************************************
From the above, you can observe that the self-signed cert is imported into the keystore with the entry trustedCertEntry.
Create the custom trust keystore appTrust.jks by making a copy from the Standard Java Trust.$ cp /u01/app/oracle/product/fmw/jrockit-jdk1.6.0_33-R28.2.4-4.1.0/jre/lib/security/cacerts appTrust.jks
$ ls
appIdentity.csr appIdentity.jks appTrust.jks cacerts selfsign.cer
We now have a self-signed certificate in a keystore will the following details, which will be used to while configuring ssl in WebLogic Server
Identity Keystore: "/u01/app/oracle/product/fmw/user_projects/domains/test_domain/certs/appIdentity.jks"
Trust Keystore: "/u01/app/oracle/product/fmw/user_projects/domains/test_domain/certs/appTrust.jks"
Alias: serverkey
Key Store Password: welcome123
Key Password: welcome123
Valid for: 90 days
SSL Configurations in WebLogic Administration Console You can now continue with Keystores and ssl configurations in WebLogic Administration Console
Configure SSL for Admin & Managed Servers
This process should be followed for the Admin Server and all managed servers.
In the WebLogic Server Administration Console, click on "Servers" in the "Domain Structure" tree.
Click on the Admin Server to configure.
Click on the "Configuration > Keystores" tab and sub-tab.
Click the "Change" button next to the "Keystores" setting
Select the "Custom Identity and Custom Trust" option and click the "Save" button.
Enter the Custom Identity Keystore: /u01/app/oracle/product/fmw/user_projects/domains/test_domain/certs/appIdentity.jks, Custom Identity Keystore Type: JKS, Custom Identity Keystore Passphrase: welcome123.
Enter the Custom Trust Keystore: /u01/app/oracle/product/fmw/user_projects/domains/test_domain/certs/appTrust.jks, Custom Trust Keystore Type: JKS, Custom Trust Keystore Passphrase: welcome123, Confirm Trust Keystore Passphrase: welcome123 and click the "Save" button.
Click the "SSL" tab.
Enter the Private Key Alias: serverkey, Private Key Passphrase: welcome123, Confirm Private Key Passphrase: welcome123 and Click the "Save" button.
Click on the Admin Server
Click on the "Configuration > General" tab and sub-tab.
Select SSL Listen Port Enabled check-box and enter the SSL Listen Port for example:7002
Repeat the above steps for all managed servers in the domain.
Configure Node Manager
Change the Node Manager in the to use the custom keystores and the new certificates.
Edit the "$WL_HOME/common/nodemanager/nodemanager.properties" file, adding the following entries. The values used reflect the information used to create the keystores above.
KeyStores=CustomIdentityAndCustomTrust
CustomIdentityKeyStoreFileName=/u01/app/oracle/product/fmw/user_projects/domains/test_domain/certs/appIdentity.jks
CustomIdentityKeyStorePassPhrase=welcome123
CustomIdentityPrivateKeyPassPhrase=welcome123
CustomIdentityAlias=serverkey
Restart the node manager.
Restart the Admin Server & managed servers
In the logs you can see the following
How to Monitor All Failed Login Attempts in solaris 11
How to Monitor All Failed Login Attempts
This procedure captures in a syslog file all failed login attempts.
Before You Begin
You must be in the root role.
Set up the /etc/default/login file with the desired values for SYSLOG and SYSLOG_FAILED_LOGINS
Edit the /etc/default/login file to change the entry. Make sure that SYSLOG=YES is uncommented.
# grep SYSLOG /etc/default/login
# SYSLOG determines whether the syslog(3) LOG_AUTH facility should be used
SYSLOG=YES
# The SYSLOG_FAILED_LOGINS variable is used to determine how many failed
#SYSLOG_FAILED_LOGINS=5
SYSLOG_FAILED_LOGINS=0
#
Create a file with the correct permissions to hold the logging information.
Create the authlog file in the /var/adm directory.
# touch /var/adm/authlog
Set read-and-write permissions for root user on the authlog file.
# chmod 600 /var/adm/authlog
Change group membership to sys on the authlog file.
# chgrp sys /var/adm/authlog
Edit the syslog.conf file to log failed password attempts.
Send the failures to the authlog file.
Type the following entry into the syslog.conf file.
Fields on the same line in syslog.conf are separated by tabs.
auth.notice /var/adm/authlog
Refresh the system-log service.
# svcadm refresh system/system-log
Verify that the log works.
For example, as an regular user, log in to the system with the wrong password. Then, as superuser, display the /var/adm/authlog file.
# more /var/adm/authlog
Nov 4 14:46:11 example1 login: [ID 143248 auth.notice]
Login failure on /dev/pts/8 from example2, stacey
Subscribe to:
Posts (Atom)