Create a new Identity Keystore
By default, WebLogic Server is configured with two keystores:
DemoIdentity.jks - Contains a demonstration private key for WebLogic Server. This keystore contains the identity for WebLogic Server.
DemoTrust.jks - Contains the trusted certificate authorities from the WL_HOME\server\lib\DemoTrust.jks and the JDK cacerts keystores. This keystore establishes trust for WebLogic Server.
Use Linux openssl command to create a temporary keystore:
openssl pkcs12 \
-export -in server.crt \
-inkey server.key \
-out server.p12 \
-name gensip \
-CAfile ca.crt \
-chain \
-caname root
Use the Java keytool to create the final keystore:
keytool \
-importkeystore \
-deststorepass changeit \
-destkeypass changeit \
-destkeystore identity.pkcs12 \
-srckeystore server.p12 \
-srcstoretype PKCS12 \
-srcstorepass changeit \
-alias gensip
Securing OCCAS to Genesys Cloud
Genesys provides public certs to be loaded into OCCAS.
Download them from here:
https://help.mypurecloud.com/articles/tls-trunk-transport-protocol-specification/
Download the certificates in the DER (CRT) format.
- DigiCert High Assurance EV Root CA - DER format
- DigiCert Global Root G2 - DER format
- DigiCert Global Root G3 - DER format
Import the certificates into the identity keystore.
keytool -import \
-alias DigiCertHighAssuranceEVRootCA \
-file DigiCertHighAssuranceEVRootCA.crt \
-storetype pkcs12 \
-keystore identity.pkcs12
keytool -import \
-alias DigiCertGlobalRootG2 \
-file DigiCertGlobalRootG2.crt \
-storetype pkcs12 \
-keystore identity.pkcs12
keytool -import \
-alias DigiCertGlobalRootG3 \
-file DigiCertGlobalRootG3.crt \
-storetype pkcs12 \
-keystore identity.pkcs12
Securing WebLogic
Adding the Keystore
On each server, navigate to Configuration >> Keystores.
Change the "Keystores" from Demo Identity and Demo Trust to: Custom Identity and Java Standard Trust.
Custom Identity Keystore: ./config/_certs/identity.jks
Custom Identity Keystore Type: jks
Custom Identity Keystore Passphrase: *****
Confirm Custom Identity Keystore Passphrase: *****
Java Standard Trust Keystore: /usr/lib/jvm/jdk-11.0.25-oracle-x64/lib/security/cacerts
Java Standard Trust Keystore Type: jks
Java Standard Trust Keystore Passphrase: changeit
Confirm Java Standard Trust Keystore Passphrase: changeit
Disable Hostname Verification
The certificate is likely configured to resolve to the hostname of the external load-balancer. For inter-cluster communication, disable hostname verification.
This can be done within the Admin Console by navigating to:
Turn off hostname verification:
Hostname Verification: None
Or, you can disable hostname verification from the command-line:
-Dweblogic.security.SSL.ignoreHostnameVerification=true
Securing Node Manager
Securing Coherence
Securing SIP
By default, the Securing WebLogic section above will also configure SIPS (port 5061).
However, additional configurations can be made via the Server >> Protocols tab in the admin console.
Congratulations, you are now ready to move on to: BLADE Installation.