Start WLST using the WLST.shcmd command located in the oracle_
10-22 Oracle Fusion Middleware Security and Administrators Guide for Web Services
Figure 10–8 illustrates the relationship between the keystore configuration in the
OPSS, the oracle.wsm.security map in the credential store, and the Oracle WSM Java keystore.
Figure 10–8 Oracle WSM Keystore Configuration for Message Protection
As shown in the figure:
■
The keystore.csf.map property points to the Oracle WSM map in the credential store that contains the CSF aliases. In this case keystore.csf.map is
defined as the recommended name oracle.wsm.security, but it can be any value.
■
The keystore.pass.csf.key property points to the CSF alias keystore-csf-key that is mapped to the username and password of the
keystore. Only the password is used; username is redundant in the case of the keystore.
■
The keystore.sig.csf.key property points to the CSF alias sign-csf-key that is mapped to the username and password of the private key that is used for
signing.
■
The keystore.enc.csf.key property points to the CSF alias enc-csf-key that is mapped to the username and password of the private key that is used for
decryption.
Configuring Keystores for SSL
If you want to use any of the policies listed in Which Policies Require You to
Configure SSL? on page 10-23 or
Which Policies Require You to Configure Two-Way SSL?
on page 10-23, you must configure keystores for SSL. SSL provides secure connections by allowing two applications connecting over a
network to authenticate the others identity and by encrypting the data exchanged between the applications.
Authentication allows a server, and optionally a client, to verify the identity of the application on the other end of a network connection. Encryption makes data
transmitted over the network intelligible only to the intended recipient. A client certificate two-way SSL can be used to authenticate the user.
This section describes how to set up a Web service client and the WebLogic Server Web service container to send requests over SSL.
Setting Up Your Environment for Policies 10-23
To use SSL in a Web service application, you need to:
■
Configure the WebLogic Server keystore and SSL settings.
■
Configure the Web service client keystore and SSL settings. These steps are described in the sections that follow.
Which Policies Require You to Configure SSL?
The predefined policies that require you to configure SSL are as follows:
■
oraclewss_http_token_over_ssl_service_policy
■
oraclewss_http_token_over_ssl_client_policy
■
oraclewss_saml_token_bearer_over_ssl_server_policy
■
oraclewss_saml_token_bearer_over_ssl_client_policy
■
oraclewss_saml_token_over_ssl_service_policy
■
oraclewss_saml_token_over_ssl_client_policy
■
oraclewss_sts_issued_saml_bearer_token_over_ssl_client_template
■
oraclewss_sts_issued_saml_bearer_token_over_ssl_service_template
■
oraclewss_username_token_over_ssl_service_policy
■
oraclewss_username_token_over_ssl_client_policy In addition, you can create a new policy that requires SSL by using the following
templates:
■
oraclewss_http_token_over_ssl_service_template
■
oraclewss_http_token_over_ssl_client_template
■
oraclewss_saml_token_bearer_over_ssl_service_template
■
oraclewss_saml_token_bearer_over_ssl_client_template
■
oraclewss_saml_token_over_ssl_service_template
■
oraclewss_saml_token_over_ssl_client_template
■
oraclewss_sts_issued_saml_bearer_token_over_ssl_client_template
■
oraclewss_sts_issued_saml_bearer_token_over_ssl_service_template
■
oraclewss_username_token_over_ssl_service_template
■
oraclewss_username_token_over_ssl_client_template See
Appendix C, Predefined Assertion Templates and
Appendix B, Predefined Policies
for more information on these assertions and policies.
Which Policies Require You to Configure Two-Way SSL?
The predefined policies that require you to configure two-way SSL are as follows:
■
oraclewss_saml_token_over_ssl_client_policy
■
oraclewss_saml_token_over_ssl_service_policy
■
oraclewss_username_token_over_ssl_client_policy, when mutual authentication is selected.
10-24 Oracle Fusion Middleware Security and Administrators Guide for Web Services
■
oraclewss_username_token_over_ssl_service_policy, when mutual authentication is selected.
■
oraclewss_http_token_over_ssl_client_policy, when mutual authentication is selected.
■
oraclewss_http_token_over_ssl_service_policy, when mutual authentication is selected.
In addition, you can create a new policy that requires two-way SSL by using the following templates:
■
oraclewss_saml_token_over_ssl_client_template
■
oraclewss_saml_token_over_ssl_service_template
How to Configure a Keystore on WebLogic Server
Private keys, digital certificates, and trusted certificate authority certificates establish and verify identity and trust in the WebLogic Server environment.
This section briefly summarizes the steps that are required to configure the keystore in WebLogic Server. See the following two sources for complete information:
■
Oracle WebLogic Server Administration Console Help for complete information, particularly the topic Servers: Configuration: Keystores.
■
Securing Oracle WebLogic Server, particularly Configuring Identity and Trust. WebLogic Server is configured with a default identity keystore DemoIdentity.jks and a
default trust keystore DemoTrust.jks. In addition, WebLogic Server trusts the certificate authorities in the cacerts file in the JDK. This default keystore configuration is
appropriate for testing and development purposes. However, these keystores should not be used in a production environment.
To configure identity and trust for a server:
1.
Obtain digital certificates, private keys, and trusted CA certificates from Sun Microsystem’s keytool utility, or a reputable vendor such as Entrust or Verisign,
and include them in the keystore.
To get the certificate, you must create a Certificate Request and submit it to the CA. The CA will authenticate the certificate requestor and create a digital
certificate based on the request.
The PEM Privacy Enhanced Mail format is the preferred format for private keys, digital certificates, and trusted certificate authorities CAs.
If you use the keytool utility, the default key pair generation algorithm is Digital Signature Algorithm DSA. WebLogic Server does not support DSA. Specify
another key pair generation and signature algorithm such as RSA when using WebLogic Server. For more information about Suns keytool utility, see the
keytool-Key and Certificate Management Tool description at
http:download.oracle.comjavase6docstechnotestoolswind owskeytool.html
. You can also use the digital certificates, private keys, and trusted CA certificates
provided by the WebLogic Server kit. The demonstration digital certificates, private keys, and trusted CA certificates should be used only in a development
environment.
2.
Create one keystore for identity and one for trust. The preferred keystore format is JKS Java KeyStore.
Setting Up Your Environment for Policies 10-25
3.
Load the private keys and trusted CAs into the keystores.