EM 13c, 12c: How to Configure Enterprise Manager's Weblogic Server (WLS) for Secure Socket Layer Certificates
(Doc ID 2220788.1)
Last updated on AUGUST 14, 2018
Enterprise Manager Base Platform - Version 126.96.36.199.0 to 188.8.131.52.0 [Release 12.1 to 13c] Information in this document applies to any platform.
The WLS Stack (Admin Server, Managed Server, Node Manager) in EM is secured out-of-box with default WLS demo certificates (demonstration identity keystore DemoIdentity.jks and a trust keystore DemoTrust.jks)
EM 12c uses 10.3.6 WLS and the demo certificates have 512 bit keystrength and is signed with MD5withRSA signature algorithm
EM 13c uses 12.1.3 WLS and the demo certificates have 2048 bit keystrength and is signed with SHA256withRSA signature algorithm
This document provides steps to check the certificates used with WLS components in EM (Admin Server, Managed Server, Node Manager) and how to change these certificates if needed.
This document presents the complete set of actions required to establish valid wallet and java keystore functions in securing Enterprise Manager communications. See the following document for information about wallet and keystore definitions, when each are used, etc., in the WebLogic Server deployment environment:
<Note 1218603.1> Understanding Wallets and Keystores in Fusion Middleware 11g/12c
WLS in an EM Setup can be secured using either wallets or keystores by executing 'emctl secure wls [arguments]' command.Not required to use both wallets and keystores together
To view full details, sign in with your My Oracle Support account.
Don't have a My Oracle Support account? Click to get started!