Installing and Configuring Oracle® Hyperion Enterprise Performance Management System 11.1.2 with SSL Enabled on All Layers


Purpose


This tutorial covers installation and configuration of Oracle® Hyperion Enterprise Performance Management (EPM) System 11.1.2 with Secure Sockets Layer (SSL) enabled on all layers, with WebLogic 11gR1 and Oracle HTTP Server (OHS) 11gR1.

Time to Complete


Approximately 4 hours

Topics


This tutorial covers the following topics:

Overview
Scenario
Prerequisites
Installing EPM System
Configuring Foundation Services and Enabling SSL
Defining and Importing Certificates
Configuring OHS Web Server
Configuring WebLogic Applications with SSL
Installing Remaining Products
Summary
Resources


Viewing Screenshots



Click icon to show all screenshots Click icon to show all screenshots

Note: Alternatively, you can click an individual icon (or image) associated with each step to view (or hide) the screenshot associated with that step.

Overview


In this tutorial, you perform a full SSL EPM System 11.1.2 installation and configuration. You learn how to:

  • Define and manage certificates for Oracle Wallet and JKS
  • Configure OHS for SSL
  • Configure WebLogic for SSL
  • Configure EPM System for SSL

This tutorial uses the same principle as other SSL configurations (for example, SSL offloading and two-way SSL), that is separating internal and external communications flows with two URLs: epm.mycompany.com for browser and Smart View client connections to the web server; and epminternal.mycompany.com for server to server communications. Deployment architecture:

Back to Topic List

Scenario


You are tasked with enabling SSL on a new EPM System installation. Your company is using its own certification authority to sign certificates, not relying on trusted third party root ca (root certificate authority).

Your setup is composed of seven machines:

  • OHS web server to proxy requests to web applications
  • Two WebLogic servers to run Planning and other java applications
  • Two Internet Information Services (IIS) servers to run Financial Management and other IIS application servers
  • Oracle Database server
  • External LDAP server

Back to Topic List

Prerequisites


Before starting this tutorial, you should:

1.

Download EPM System 11.1.2 assemblies from edelivery.oracle.com, including WebLogic 11gR1 and OHS 11gR1

2.

Define two DNS aliases - epminternal.mycompany.com and epm.mycompany.com pointing to your OHS server.

Back to Topic List

Installing EPM System


Follow the steps below to install EPM System:

1.

Launch installTool.cmd.

 

2.

At the bottom of the installer window, ensure the prerequisites are met, and click Next.

 

3.

Enter the Middleware home, for example, d:\Oracle\Middleware, and click Next.

 

4.

Select New Installation > Choose components by tier, and click Next.

 

5.

In the Web Application colomn, select Foundation Services Web Applications, and uncheck all other components.

 

6.

Follow the wizard steps to complete the installation.

 

Back to Topic List

Configuring Foundation Services and Enabling SSL


Configuring Foundation Services for SSL on WebLogic Server

1.

Import the root certification authority certificate for the database server for SSL JDBC into EPM Configurator keystore located in EPMSystem11r1/common/<jre-64|jre>/Sun/1.6.0/lib/security/cacerts. Use the following command:

%EPM_ORACLE_HOME%\common\JRE\Sun\1.6.0\bin\keytool.exe -import -alias myrootca -keystore %EPM_ORACLE_HOME%\common\JRE\Sun\1.6.0\lib\security\cacerts -trustcacerts -file %EPM_ORACLE_HOME%\ssl\CA.crt -storepass changeit  

Note: The default password is changeit .

 

2.

From the Start menu, select All Programs > Oracle EPM System > Foundation Services > EPM System Configurator.

The EPM System Configurator is launched.  

3.

Under Hyperion Foundation, select the following components:

  • Common Settings
  • Configure Database
  • Configure Oracle Configuration Manager
  • Deploy to Application Server

The "Set up Shared Services and Registry Database Connection associated with the instance home" dialog box is displayed.

 

4.

Click Advanced options, set up the SSL JDBC URL as specified in the following figure, and click OK.

 

5.

Select Create Windows Services for configured components and Use SSL for Web application server communications (Requires manual configuration).

Note: If you have an SSL SMTP server, select Use SSL to communicate with mail server.

 

6.

Click Next.

The "Information of the WebLogic Domain to which the web applications are deployed" dialog box is displayed.

 

7.

Select Define a new Domain to deploy the web applications and enter a password for the domain.

Note: Make sure the password has at least eight alphanumeric characters and at least one number or special character.

 

8.

Click Next.

The Application Server Deployment: Oracle WebLogic dialog box is displayed.

 

9.

In the Advanced column, click Set up for each Ear/War component.

The Advanced Setup dialog box is displayed.

 

10.

Define a new logical address epminternal.mycompany.com (internal load balancer host) for Workspace and Shared Services. Specify the internal load balancer SSL port 19443.

 

11.

Click OK.

The Oracle Configuration Manager Registration dialog box is displayed.

 

12.

Select the desired setting and click Next.

The "Set Shared Services admin user password" dialog box is displayed.

 

13.

Click Next.

The list of products and tasks to be configured is displayed.

 

14.

Click Next to complete the configuration.

 

15.

Click Finish.

 

 

Configuring Web Server

1.

On the OHS server, launch EPM System Configurator, and select Configure Web Server.

 

2.

Click Next.

The Configure Web Server dialog box is displayed.

Note: This step configures OHS using HTTP. SSL configuration is manual, after certificates are created.

 

3.

Click Next.

The list of configuration tasks is displayed.

 

4.

Click Next to complete the configuration.

 

5.

Click Finish.  

Back to Topic List

Defining and Importing Certificates


You need eight server certificates for this configuration:

  • Two server certificates for OHS ( epm.mycompany.com and epminternal.mycompany.com). These two certificates are stored in the same Oracle Wallet.
  • WebLogic servers 1 and 2 ( weblogic1.mycompany.com and weblogic2.mycompany.com). These certificates are stored in java keystores.
  • IIS ( iis1.mycompany.com and iis2.mycompany.com). The certificates are stored in the windows keystore.
  • Oracle database ( db.mycompany.com). This certificate are stored in Oracle Wallet.
  • External LDAP ( ldap.mycompany.com). The certificate storage is vendor dependent.

Defining OHS Certificates

1.

On the OHS server, launch Wallet Manager.

 

2.

Click on Wallet/New to create a new wallet.

The New Wallet dialog box is displayed.

 

3.

Click OK.

The Oracle Wallet Manager dialog box is displayed.

 

4.

Click No (you don't need to create a certificate request for now).

The Oracle Wallet Manager is displayed.

 

5.

Right-click Trusted Certificates and select Import Trusted Certificate.

 

6.

In the Import Trusted Certificate dialog box, select Select a file that contains the certificate and click OK.

The "The trusted certificate has been successfully imported into wallet" dialog box is displayed.

 

7.

In Oracle Wallet Manager, in the Operations drop-down list, select Add Certificate Request.

 

8.

In the Create Certificate Request dialog box, fill out the fields for epm.mycompany.com as specified in the following figure, and click OK.

A dialog box confirming the certificate request creation is displayed.

9.

Repeat the previous two steps for epminternal.mycompany.com.

 

10.

Obtain server certificates from the certification authority (sign the certificate requests). Certificate requests are available in Wallet Manager.

 

11.

In the Operations drop-down list, select Import User Certificate.

The Import Certificate dialog box is displayed.

 

12.

Select Paste the certificate and click OK.

The Import Certificate "Please paste a BASE64 format certificate below" dialog box is displayed.

 

13.

Remove the trailing carriage return.

 

14.

Click OK.

The epm.mycompany.com certificate is displayed under Trusted Certificates.

 

15.

Follow the steps above to sign the certificate request and add the user certificate to Wallet for epminternal .mycompany.com

 

16.

In the Wallet drop-down list:

  • Select Save As, and save the certificate to Oracle_home>\Middleware\user_projects\epmsystem1\httpConfig\ohs\config\OHS\ohs_component\keystores\default
  • Select Auto Login

 

 

 

Defining WebLogic Certificates

Complete the following steps on weblogic1 server:  

1.

Create an ssl  folder under EPM_ORACLE_HOME. For example, d:\Oracle\Middleware\EPMSystem11R1\ssl.

Note: You can change the keystore password in the storepass parameter below for production systems.

 

2.

Use the following command to create a keystore with RSA key for server weblogic1:

%EPM_ORACLE_HOME%\common\JRE\Sun\1.6.0\bin\keytool.exe -genkey -dname "cn=weblogic1, ou=EPM, o=orcl, c=US" -alias epm_ssl -keypass password -keystore %EPM_ORACLE_HOME%\ssl\keystore -storepass password -validity 365 -keyalg RSA

Note: The common name weblogic1 has to be changed to match your WebLogic server hostname in the following line: cn=weblogic1, ou=EPM, o=orcl, c=US

 

3.

Use the following command to import your root certification authority certificate into the keystore. It is assumed the cert is called CA.crt:

%EPM_ORACLE_HOME%\common\JRE\Sun\1.6.0\bin\keytool.exe -import -alias myrootca -keystore %EPM_ORACLE_HOME%\ssl\keystore -trustcacerts -file %EPM_ORACLE_HOME%\ssl\CA.crt -storepass password

 

4.

Use the following command to generate a certificate signing request for weblogic1, and name it   weblogic1.csr:

%EPM_ORACLE_HOME%\common\JRE\Sun\1.6.0\bin\keytool.exe -certreq -alias epm_ssl -keyalg RSA -file %EPM_ORACLE_HOME%\ssl\weblogic1.csr -keystore %EPM_ORACLE_HOME%\ssl\keystore -storepass password

 

5.

Sign the csr file and obtain your weblogic1.crt server certificate.

 

6.

Use the following command to Import weblogic1.crt into keystore:

%EPM_ORACLE_HOME%\common\JRE\Sun\1.6.0\bin\keytool.exe -import -alias epm_ssl -keystore %EPM_ORACLE_HOME%\ssl\keystore -storepass password -file %EPM_ORACLE_HOME%\ssl\weblogic1.crt

 

Importing Root Certificates into Java Keystores

Complete the following steps on all EPM servers. CA.crt should be located in %EPM_ORACLE_HOME%\ssl\CA.crt.  

1.

Use the following command to import CA.crt into JDK:

%EPM_ORACLE_HOME%\..\jdk160_11\jre\bin\keytool.exe -import -alias myrootca -keystore %EPM_ORACLE_HOME%\..\jdk160_11\jre\lib\security\cacerts -trustcacerts -file %EPM_ORACLE_HOME%\ssl\CA.crt -storepass changeit

 

2.

Use the following command to Import CA.crt to EPM JRE:

%EPM_ORACLE_HOME%\common\JRE\Sun\1.6.0\bin\keytool.exe -import -alias myrootca -keystore %EPM_ORACLE_HOME%\common\JRE\Sun\1.6.0\lib\security\cacerts -trustcacerts -file %EPM_ORACLE_HOME%\ssl\CA.crt -storepass changeit

Note: If you are using a 64-bit system, you should also import CA.crt into JRE-64 (both locations).

 

 

Importing Root Certificates Into IIS Windows Keystore

Complete the following steps on all IIS servers:  

1.

Use the following command to import CA.crt into JRockit on WebLogic servers:

%EPM_ORACLE_HOME%\..\jdk160_11\jre\bin\keytool.exe -import -alias myrootca -keystore %EPM_ORACLE_HOME%\..\jrockit_160_05\jre\lib\security\cacerts -trustcacerts -file %EPM_ORACLE_HOME%\ssl\CA.crt -storepass changeit  

Note: if you changed JVM, update location above.

 

2.

Select Start > Run > mmc.

The Console1 window is displayed.

 

3.

In the File menu, select Add/Remove Snap-in , and then click Add.

 

4.

Select Certificates, and click Add.

 

5.

In the Certificates snap-in dialog box, select an account and click Finish.

 

6.

Right-click Trusted Root Certification Authorities, then select All Tasks > Import.

 

Back to Topic List

Configuring OHS Web Server


Configuring Listen Ports

1.

On OHS server, manually enable two SSL pools:

  • For logical web applications, server to server communications, on port 19443
  • For browser access, on port 443

 

2.

Edit ssl.conf located in <Oracle_home>\Middleware\user_projects\epmsystem1\httpConfig\ohs\config\OHS\ohs_component

  • Replace Listen 19000 with Listen 443
  • Add Listen 19443

 

Adding Internal Virtual Host

Follow the steps below to add a virtual host for internal SSL communications on port 19443:  

Adding External Virtual Host

Follow the steps below to add a virtual host for external SSL communications on port 443:  

Redirecting the WebLogic Server

Follow the steps below to configure WebLogic redirection in OHS server:  

Proxying to IIS Applications

Follow the steps below to edit httpd.conf:  

1.

In ssl.conf, add NameVirtualHost epminternal.mycompany.com:19443.

 

2.

Change virtual host to VirtualHost epminternal.mycompany.com:19443.

 

3.

Within the VirtualHost tag:

  • Add ServerName epminternal.mycompany.com
  • Check path to SSL wallet and SSL proxy wallet:
    • SSLWallet ${ORACLE_INSTANCE}/config/${COMPONENT_TYPE}/${COMPONENT_NAME}/keystores/default
    • SSLProxyWallet ${ORACLE_INSTANCE}/config/${COMPONENT_TYPE}/${COMPONENT_NAME}/keystores/default
  • Add before closing </VirtualHost>  : <Location /> Options FollowSymLinks AllowOverride None Order Deny,Allow Deny from All # list of allowed servers ip connecting on https: To be modified Allow from 10.200.33.65 10.200.32 DirectoryIndex welcome-index.html </Location>

Note: The IPs listed in the Location tag have to be changed to match the server environments.

 

2.

In ssl.conf, add NameVirtualHost epminternal.mycompany.com:19443

 

3.

Duplicate epminternal virtual host section, and change it to VirtualHost epminternal.mycompany.com:443

 

4.

Within the VirtualHost tag:

  • Add ServerName epm.mycompany.com
  • Check path to SSL wallet and SSL proxy wallet:
    • SSLWallet ${ORACLE_INSTANCE}/config/${COMPONENT_TYPE}/${COMPONENT_NAME}/keystores/default
    • SSLProxyWallet ${ORACLE_INSTANCE}/config/${COMPONENT_TYPE}/${COMPONENT_NAME}/keystores/default
  • In the epm.mycompany.com virtual host section, remove the following code: <Location /> Options FollowSymLinks AllowOverride None Order Deny,Allow Deny from All # list of allowed servers ip connecting on https: To be modified Allow from 10.200.33.65 10.200.32 DirectoryIndex welcome-index.html </Location>

Note: Tthe IPs listed in the Location tag have to be changed to match the server environments.

 

5.

In <oracle_home>\Middleware\user_projects\epmsystem1\httpConfig\ohs\config\OHS\ohs_component\mod_wl_ohs.conf

  • Check that WLSSLWallet location is set to Oracle_home>\Middleware\user_projects\epmsystem1\httpConfig\ohs\config\OHS\ohs_component\keystores\default
  • Make sure SecureProxy ON  is defined  

 

6.

In location tags, check WebLogic cluster physical nodes and SSL ports. Interop example:  

  • <LocationMatch ^/interop>
  • SetHandler weblogic-handler
  • WebLogicCluster weblogic1:28443,weblogic2:28443
  • </LocationMatch>  

 

7.

Add the following lines:

  • LoadModule proxy_balancer_module ${ORACLE_HOME}/ohs/modules/mod_proxy_balancer.so
  • LoadModule headers_module modules/mod_headers.so

Note: Make sure mod_header is loaded.

 

8.

Configure mod_proxybalancer to load balance to different IIS servers:

Note: youriis1 and youriis2 are two physical hostnames/dns names for the IIS machines.

<Proxy balancer://iisappshfm> BalancerMember http://iis1.mycompany.com:443/hfm loadfactor=1 route=1 BalancerMember http:// iis2.mycompany.com:443/hfm loadfactor=1 route=2 ProxySet lbmethod=bytraffic </Proxy> Header add Set-Cookie "ORA_EPM_IIShfm_ROUTE_ID=iisappshfm .%{BALANCER_WORKER_ROUTE}e; path=/hfm ;" env=BALANCER_ROUTE_CHANGED

Replace existing ProxyPass directives with this: ProxyPass /hfm balancer://iisappshfm/ stickysession=ORA_EPM_IIShfm_ROUTE_ID nofailover=OnProxyPassReverse /hfm http://epm.mycompany.com:19000/hfm ProxyPreserveHost ONSSLProxyEngine On  

 

9.

Add the same proxy pass and proxy balancer directives for other IIS applications (other Financial Management root contexts, FDM, Strategic Finance, EPMA).  

 

10.

 Copy cwallet.sso and ewallet.p12 t o Oracle_home>\Middleware\user_projects\epmsystem1\httpConfig\ohs\config\OHS\ohs_component\proxy-wallet.

Note: You should perform this step even if SSL Proxy Wallet location is set to Oracle_home>\Middleware\user_projects\epmsystem1\httpConfig\ohs\config\OHS\ohs_component\keystores\default

Back to Topic List

Configuring WebLogic Applications with SSL


1.

Start WebLogic administration console:

 

2.

Enter credentials as specified in EPM System Configurator while creating a domain.

 

3.

Click Lock & Edit.

 

4.

Select Environments > Servers > FoundationServices0.

 

5.

Deselect Listen Port Enabled for http listen port, and select SSL Listen Port Enabled:

 

6.

Navigate to the Configuration > Keystores tab, and define keystores:

  • Custom Identity Keystore: <Oracle_home>\Middleware\EPMSystem11R1\ssl\keystore
  • Custom Identity Keystore Type: jks
  • Custom Identity Keystore passphrase: password (or else if you changed it in the keytool scripts)  

 

7.

Follow the step above to fill out the information for the Trust keystore:

 

8.

Select the Configuration > SSL tab and note the Private Key Alias:

 

9.

Click Save, and then click Active Changes.

 

10.

In Windows Services, start OHS.

 

11.

In Windows Services, start Foundation Services.

 

12.

Test by connecting to https://epm.mycompany.com/interop and https://epm.mycompany.com/workspace.

 

Back to Topic List

Installing Remaining Products


Follow the steps below to install remaining products:

1.

Launch EPM System Configurator on WebLogic server.

 

2.

For each web application deployment, select Advanced setup and change the logical web application to: epminternal.mycompany.com  on SSL port 19443

 

3.

Once all products are configured:

  • Launch EPM System Configurator on OHS server.
  • Select Configure Web Server.

 

4.

Validate WebLogic redirection and httpd.conf.

 

5.

On the IIS server, import server certificates to enable SSL:  

  • For Financial Management, you need to import the ldap root certificate and OHS internal URL root certificate into java keystore of the Financial Management application server
  • All thick clients (for example, Financial Reporting and FDM), need root certificates of OHS external URL whether in windows keystore, or java keystore.

 

Back to Topic List

Summary


In this tutorial, you have learned how to:

  • Install EPM System
  • Configure Shared Services and Enable SSL
  • Define and Import Certificates
  • Configure OHS Web Server
  • Configure WebLogic Applications with SSL

Back to Topic List

Resources
 


  • Oracle® Hyperion Enterprise Performance Management System Release 11.1.2 Security Administration Guide

Back to Topic List