Creating an Identity Keystore Using the utils.ImportPrivateKey Utility Creating a Trust Keystore Using the Keytool Utility

7-4 Oracle Fusion Middleware Enterprise Deployment Guide for Oracle Business Intelligence Examples: HOST java utils.CertGen welcome1 HOST.mycompany.com_cert HOST.mycompany.com_key domestic HOST.mycompany.com HOST java utils.CertGen welcome1 VIP.mycompany.com_cert VIP.mycompany.com_key domestic VIP.mycompany.com Sample output for the command shown in the first example is: ...... Will generate certificate signed by CA from CertGenCA.der file ...... With Domestic Key Strength ...... Common Name will have Hostname HOST.mycompany.com ...... Issuer CA name is CN=CertGenCAB,OU=FOR TESTING ONLY,O=MyOrganization, L=MyTown,ST=MyState,C=US

7.3.2 Creating an Identity Keystore Using the utils.ImportPrivateKey Utility

Follow these steps to create an identity keystore on HOST: 1. Create a new identity keystore called appIdentityKeyStore using the utils.ImportPrivateKey utility. Create this keystore under the same directory as the certificates that is, ORACLE_BASEadmindomain_nameaserverdomain_name certs.

2. Import the certificate and private key for both HOST.mycompany.com and

VIP.mycompany.com into the identity store. Make sure that you use a different alias for each of the certificatekey pairs imported. Syntax all on a single line: java utils.ImportPrivateKey Keystore_File Keystore_Password Certificate_Alias_to_Use Private_Key_Passphrase Certificate_File Private_Key_File [Keystore_Type] Examples: HOST java utils.ImportPrivateKey appIdentityKeyStore.jks welcome1 appIdentity1 welcome1 ORACLE_BASEadmindomain_nameaserverdomain_name certsHOST.mycompany.com_cert.pem ORACLE_BASEadmindomain_name aserverdomain_namecertsHOST.mycompany.com_key.pem HOST java utils.ImportPrivateKey appIdentityKeyStore.jks welcome1 appIdentity2 welcome1 ORACLE_BASEadmindomain_nameaserver domain_name certsVIP.mycompany.com_cert.pem ORACLE_BASEadmin domain_name aserverdomain_namecertsVIP.mycompany.com_key.pem

7.3.3 Creating a Trust Keystore Using the Keytool Utility

You only need to perform the steps in this section for the first Managed Server. Follow these steps to create the trust keystore on HOST1: 1. Copy the standard Java keystore to create the new trust keystore because it already contains most of the root CA certificates needed. Oracle does not recommend Note: The identity store is created if none exists when you import a certificate and the corresponding key into the identity store using the utils.ImportPrivateKey utility. Setting Up Node Manager 7-5 modifying the standard Java trust keystore directly. Copy the standard Java keystore CA certificates located under the WL_HOMEserverlib directory to the same directory as the certificates. For example: HOST cp WL_HOMEserverlibcacerts ORACLE_BASEadmindomain_ name aserverdomain_namecertsappTrustKeyStore.jks 2. The default password for the standard Java keystore is changeit. Oracle recommends always changing the default password. Use the keytool utility to do this. The syntax is all on a single line: APPHOST1 keytool -storepasswd -new New_Password -keystore Trust_Keystore -storepass Original_Password For example: HOST keytool -storepasswd -new welcome1 -keystore appTrustKeyStore.jks -storepass changeit 3. The CA certificate CertGenCA.der is used to sign all certificates generated by the utils.CertGen tool. It is located in the WL_HOMEserverlib directory. This CA certificate must be imported into the appTrustKeyStore using the keytool utility. The syntax is all on a single line: HOST keytool -import -v -noprompt -trustcacerts -alias Alias_Name -file CA_File_Location -keystore Keystore_Location -storepass Keystore_Password For example: HOST keytool -import -v -noprompt -trustcacerts -alias clientCACert -file WL_HOME serverlibCertGenCA.der -keystore appTrustKeyStore.jks -storepass welcome1

7.3.4 Configuring Node Manager to Use the Custom Keystores