Generating Self-Signed Certificates Using the utils.CertGen Utility

7-2 Oracle Fusion Middleware Enterprise Deployment Guide for Oracle WebCenter

7.2 Changing the Location of Node Manager Log

Edit the nodemanager.properties file located in the MW_HOMEwlserver_ 10.3commonnodemanager directory. Add the new location for the LogFile. Oracle recommends locating this file out of the MW_HOME directory, and inside the admin directory for the deployment using the following command: LogFile=ORACLE_BASEadminnodemanager.log Restart Node Manager for the change to take effect.

7.3 Enabling Host Name Verification Certificates for Node Manager in SOAHOST1

Perform these steps to set up host name verification certificates for communication between the Node Manager and the Administration Server. ■ Step 1: Generating Self-Signed Certificates Using the utils.CertGen Utility ■ Step 2: Creating an Identity Keystore Using the utils.ImportPrivateKey Utility ■ Step 3: Creating a Trust Keystore Using the Keytool Utility ■ Step 4: Configuring Node Manager to Use the Custom Keystores

7.3.1 Generating Self-Signed Certificates Using the utils.CertGen Utility

Follow these steps to create self-signed certificates on SOAHOST1.mycompany.com. These certificates should be created using the network namealias. When a server is using a virtual hostname it is implied that the server can be migrated from one node to another. Consequently, the directory where keystores and trust keystores are maintained ideally must be located on a shared storage that is accessible from the failover node. For information on using trust CA certificates instead, see Configuring Identity and Trust in Oracle Fusion Middleware Securing Oracle WebLogic Server.

1. Set up your environment by running the WL_

HOMEserverbinsetWLSEnv.sh script: In the Bourne shell, run the following command: SOAHOST1 . setWLSEnv.sh Verify that the CLASSPATH environment variable is set: SOAHOST1 echo CLASSPATH 2. The directory where keystores and trust keystores are maintained must be on shared storage that is accessible from all nodes so that when the servers fail over manually or with server migration, the appropriate certificates can be accessed from the failover node. Oracle recommends using central or shared stores for the certificates used for different purposes for example, SSL set up for HTTP invocations. In this case, SOAHOST2 uses the cert directory created for SOAHOST1 certificates. Create a user-defined directory for the certificates. SOAHOST1 mkdir certs 3. Change directory to the user-defined directory. SOAHOST1 cd certs Setting Up Node Manager 7-3 4. Run the utils.CertGen tool from the user-defined directory to create the certificates for both SOAHOST1 and ADMINVHN. Syntax: java utils.CertGen key_passphrase cert_file_name key_ file_name [export | domestic] [hostname] Examples: SOAHOST1 java utils.CertGen welcome1 SOAHOST1.mycompany.com_cert SOAHOST1.mycompany.com_key domestic SOAHOST1.mycompany.com SOAHOST1 java utils.CertGen welcome1 ADMINVHN.mycompany.com_cert ADMINVHN.mycompany.com_key domestic ADMINVHN.mycompany.com

7.3.2 Creating an Identity Keystore Using the utils.ImportPrivateKey Utility