Method for enabling SSL on BEA WebLogic Server 8.1

xiaoxiao2021-03-06  62

Method for enabling SSL on BEA WebLogic Server 8.1

Zhao Donglu

September 2004

This method uses standard Java KeyTool ways, and provides Private Key, Identity Cert, and Trusted Cert storage based on standard Java KeyStore mode.

The basic steps are as follows:

1. Apply for a digital certificate for the server through keytool

2, configure the BEA server, install related certificates and Private Key

3, activate and adjust the SSL service function

1. Apply for a digital certificate for the server via keytool

The keytool provided by JDK can generate a key pair and certificate application file. In this step, a certificate issuance agency (CA mechanism) is also required, and the server certificate is issued for the certificate generated by KeyTool. The basic steps are as follows:

1, generate a key pair

2, generate certificate application documents

3, import server certificate

4, import certificate issuing agency certificate document

1.1. Generate a key pair

Generate a key pair, run as follows:

/ r r = = = = =, = =: = = =: = k: k:::: k:: /myKeyStore.jks -StorePass Admin123 -Validity 180

Note: This step will create a KeyStore file "c: /temp/mykeystore/mykeystore.jks", keystore's password is "admin123", the password of the keystore in the keystore is "admin123", the key length is 512, the key alias For "business", the server certificate is "cn = zhao.iei-china.com, Ou = Rd, O = IEi, C = CN".

1.2. Generate certificate application documentation

Generate a certificate application file, run as follows:

./keytool -ternreq -alias business-keystore c: /temp/mykeystore/mykeystore.jks -file c: /temp/mykeystore/server.csr

Note: This step will create a certificate request file "C: /Temp/myKeyStore/server.csr" for a key called BusinessStore.jks.

1.3. Import server certificate

Importing server certificate files should post after the CA organization handles our certificate requests and issues a certificate for our servers. We can submit the CSR file or content to the CA organization through the CA institution's application procedure, and after the certificate is accepted, and after the certificate is issued, we can download the certificate file.

The following figure is the page of the certificate after the certificate is issued by the Iplanet Certificate Management System.

Get a server certificate that is encoded with CERT Chain information in BASE 64 from the CA service organization. Copy the zone of the icon, create a certificate file "c: /temp/mykeystore/serverwithchain.cer" with this content.

Run the following command to import the certificate file into the KeyStore.

./keytool -import -alias business -keystore c: /temp/mykeystore/mykeystore.jks -file c: /temp/mykeystore/serverwithchain.cer1.4. Certificate file for import certificate issuing agency

Get the issuance certificate of the certificate issuing agency, save the certificate as the "C: /TEMP/mykeyStore/trust-ca.cer" file, run the following command to import the certificate into the keystore.

./keytool -meystore c: /temp/mykeystore/mykeystore.jks -file c: /temp/mykeystore/trust-ca.cer

2. Configure the BEA server, install relevant certificates and Private Key

Start the BEA WebLogic Server, access the WebLogic server console, configure it as follows.

1. Select the KeyStore & SSL option on the BEA server that needs to install the certificate.

2, choose the keystore configuration of the Change of KeyStore Configuration

3, select the type of keystore as "Custom Identity and Custom Trust", click the "Continue" button

Fill in the full path to the keystore file created in front of the Customer Identity Key Store File Name; Custom Identity Key Store Type is filled in JKS; Pass Phrase fills in the previous creation The specified password "admin123". Then click the "Continue" button.

4, fill in the provate key settings

Fill in the alias and passwords of the Private Key in the KeyStore. And click on the "Continue" button.

3. Activate and adjust the SSL service function

Select the General page in the Console interface of the BEA WebLogic server to perform SSL configuration.

Select the SSL Listen Port Enable option and assign port to the SSL Listen Port. Click the Apply button after the setting is complete.

If you need to force the CLIENT certificate, you can select the "Two Way Client Cert Behavior" of the advanced options in the General page. "

Restart the BEA server, the following information will appear during the server startup process, indicating that the server starts normally.

<

2004-9-27

At 18:32 in the afternoon 46 seconds CST>

<

2004-9-27

At 18:32 in the afternoon 46 seconds CST>

<

2004-9-27

At 18:32 in the afternoon 46 seconds CST> 4. Verify the installation result

After the server is started normally, Access Https: // YourHost will appear as follows, that is, the installation configuration is normal.

5. Appendix

5.1. Reference documentation

BEA WebLogic 8.x's Security Configuration Document

Http://edocs.beasys.com/wls/docs81/secmanage/ssl.html

JDK KeyTool's User Manual

http://java.sun.com/j2se/

1.4.2

/DOCS/ToolDocs/Windows/keytool.html

5.2. File content

The contents of the files involved in this configuration (only files listing files)

Server.csr

----- Begin New Certificate Request -----

MiH / MigqageameuxczajbgnvbaytakNomqwwcGydvqqKewnjrukxczajbgnvbastaljemwgqyd

VQQdexj6agfvlmllas1jagluys5jb20wxdanbgkqhkig9w0baqefaanladbiakeaxe14thz2entz

GCNJZ5RGOYFR7QUQAQAF144CJKVUL3N52IJS542SBTMSUQDE9QTNPB0 / NCCNGRYUE2EFZNXGDRQID

Aqaboaawdqyjkozihvcnaquebqadqqch7btysphydfghd fnqc9svlhdm3S3DC

3M

/ L3naxse 7dk

KSV3IWD4IMD9FRDQQPOXY9EI7SZCMSHTTS

44961G

----- End new certificate request -----

ServerwithChain.Cer

----- Begin Certificate -----

Miiergyjkozihvcnaqccoiienzccbdmcaqexadapbgkqhkig9w0bbwggagqaoiie

Fzccafywgggoamcaqicaq8wdqyjkozihvcnaqeebqawwtelmakga1uebhmcq04x

EDAOBGNVBACTB0JLAWPPBMCXDDAKBGNVBAOTA0LFSTEMMAOGA1UECXQDUIZEMRWW

GGydvqqdexndzxj0awzpy

2F

0zsbnyw5hz2vymb4xdta0mdkynzewmjg0nloxdta1

MDkynzewmjg0nlowrtelmakga1uebhmcq04xddakbgnvbaota0lfstelmakga1ue

Cxmcukqxgzazbgnvbamtenpoyw8uawvplwnoaw5hlmnvbtbcma0gcsqgsib3dqeb

Aquaa0samegcqqdetxhmdnz423mzw0lnmsy7j8avtbsoaxxjhympvsxc3nyinlnj

Zifmyy6On72Q02LVT DWKCZFI57Z5 / OFGANFAGMBAAGJZZBLMBEGCWCGSAGGG EIB

AQQEAWIGQDAOBGNVHQ8BAF8EBAMCBPAWHWYDVR0JBBGWFOAUOGDJHEQLOQKUUUUUZQU

41AWZSOPINOWYDVR0RBBGWFOEUEMHB2RSQGLLLLS1JAGLUYS5JB20WDQYJKOZI

HVCNAQEEBQADQQAY6S8WEDWL9KFEILZLZLZO9W1 R R92 YRK5NQ9YYG FP2ITKOKWIOXMPUSRJDTTWXXLCRJ3OM6MG3HCF AG8KSQMIICGTCCCCOGAWIBAGIBATANBGKQ

HKIG9W0BAQUFADBZMQSWCQYDVQQGEWJDTJEQMA4GA1UEBXMHQMVPAMLUZEMMAOG

A1uechmdsuvjmqwwcGydvqqlfansjkqxhdaabgnvbamte0nlcnrpzmljyxrlie1h

BMFNZXIWHHCNMDQWOTIWMTYWMDAWWHCNMDYWOTIWMTYWMDAWJBZMQSWCQYDVQQQG

EWJDTJEQMA4GA1UEBXMHQMVPAMLUZZEMMAOGA1UECHMDSUVJMQWCGYDVQQLFANS

Jkqxhdaabgnvbamte0nlcnrpzmljyxrlie1HBMFNZXIWXDANBGKQHKIG9W0BAQEF

Aanladbiakea4oilctkjf tadpbpk8ldgqgkw3QGBT8RCVBNAZ / MBQL1S2X FWL

FJP / EF Y / K1VEVYVUTWDLGRSJU4U0UUUXQIDAQABO3YWDDARBGLGHKGBHVHCAQEE

Bamcaacwdwydvr0taqh / bauwaweb / zadbgnvhq4efquogdjheqloqkuuzqu41aw

Zsopinowhwydvr0jbbgwfoauogdjheqloqkuuzqu41awzsopinowdgydvr0Paqh /

Baqdaggma0gcsqgsib3dqebbquaa0eafmckvihs2khca9r9kuoubsj7y1ucgtj

JDGSC25IQITZOW2LYCXKMJOVSSIP6DZHVMY / SLQD7 VLQBWOFWL4EZEA

----- End certificate ------

Trust-ca.cer

----- Begin Certificate -----

Miicgtccacogawibagibatanbgkqhkig9w0baqufadbzmqswcqydvqqgewjdtjeq

Ma4ga1uebxmhqmvpamluzzemMaoga1uechmdsuvjmqwwcGydvqqlfansjkqxhdaa

Bgnvbamte0nlcnrpzmljyxrlie1HBMFNZXIWHHCNMDQWOTIWMTYWMDAWWHCNMDYW

OtiWMTYWMDAWWJBZMQSWCQYDVQQGEWJDTJEQMA4GA1UEBXMHQMVPAMLUZZEMMAOG

A1uechmdsuvjmqwwcGydvqqlfansjkqxhdaabgnvbamte0nlcnrpzmljyxrlie1h

BMFNZXIWXDANBGKQHKIG9W0BAQEFAANLADBIAKEA4OILCTKJF TADPBPK8LDGQGK

W3QGGBT8RCVBNAZ / MBQL1S2X FWLFJP / EF Y / K1VEVYVUTWDLGRSJU4U0UUUXQID

Aqabo3ywddarbglghkgbhvhcaqeebamcaacwdwydvr0taqh / bauwaweb / zadbgnv

HQ4efquogdjheqloqkuuzqu41awzsopinowhwydvr0jbbgwfoauogdjheqloqku

Uzqu41awzsopinowdgydvr0paqh / baqdaggma0gcsqgsib3dqebbquaa0eafmck

Vihs2khca9r9kuoubsj7y1ucgtj jdgsc25iqitzow2lycxkmjovssip6dzhvmy /

SLQD7 VLQBWOFWL4EW ==

转载请注明原文地址:https://www.9cbs.com/read-111501.html

New Post(0)