This tutorial covers installation and configuration of Oracle® Hyperion Enterprise Performance Management (EPM) System 11.1.2 with Secure Sockets Layer (SSL) enabled on all layers, with WebLogic 11gR1 and Oracle HTTP Server (OHS) 11gR1.
Approximately 4 hours
This tutorial covers the following topics:
Click icon to show all screenshots
Note: Alternatively, you can click an individual icon (or image) associated with each step to view (or hide) the screenshot associated with that step.
In this tutorial, you perform a full SSL EPM System 11.1.2 installation and configuration. You learn how to:
This tutorial uses the same principle as other SSL configurations (for example, SSL offloading and two-way SSL), that is separating internal and external communications flows with two URLs: epm.mycompany.com for browser and Smart View client connections to the web server; and epminternal.mycompany.com for server to server communications. Deployment architecture:
You are tasked with enabling SSL on a new EPM System installation. Your company is using its own certification authority to sign certificates, not relying on trusted third party root ca (root certificate authority).
Your setup is composed of seven machines:
Before starting this tutorial, you should:
1. | Download EPM System 11.1.2 assemblies from edelivery.oracle.com, including WebLogic 11gR1 and OHS 11gR1 |
|---|---|
2. | Define two DNS aliases - epminternal.mycompany.com and epm.mycompany.com pointing to your OHS server. |
Follow the steps below to install EPM System:
1. | Launch installTool.cmd.
|
|---|---|
2. | At the bottom of the installer window, ensure the prerequisites are met, and click Next.
|
3. | Enter the Middleware home, for example, d:\Oracle\Middleware, and click Next.
|
4. | Select New Installation > Choose components by tier, and click Next.
|
5. | In the Web Application colomn, select Foundation Services Web Applications, and uncheck all other components.
|
6. | Follow the wizard steps to complete the installation.
|
Configuring Foundation Services for SSL on WebLogic Server
1. | Import the root certification authority certificate for the database server for SSL JDBC into EPM Configurator keystore located in EPMSystem11r1/common/<jre-64|jre>/Sun/1.6.0/lib/security/cacerts. Use the following command: %EPM_ORACLE_HOME%\common\JRE\Sun\1.6.0\bin\keytool.exe -import -alias myrootca -keystore %EPM_ORACLE_HOME%\common\JRE\Sun\1.6.0\lib\security\cacerts -trustcacerts -file %EPM_ORACLE_HOME%\ssl\CA.crt -storepass changeit Note: The default password is changeit .
|
|---|---|
2. | From the Start menu, select All Programs > Oracle EPM System > Foundation Services > EPM System Configurator.
|
3. | Under Hyperion Foundation, select the following components:
|
4. | Click Advanced options, set up the SSL JDBC URL as specified in the following figure, and click OK. |
5. | Select Create Windows Services for configured components and Use SSL for Web application server communications (Requires manual configuration). Note: If you have an SSL SMTP server, select Use SSL to communicate with mail server.
|
6. | Click Next.
|
7. | Select Define a new Domain to deploy the web applications and enter a password for the domain. Note: Make sure the password has at least eight alphanumeric characters and at least one number or special character.
|
8. | Click Next.
|
9. | In the Advanced column, click Set up for each Ear/War component.
|
10. | Define a new logical address epminternal.mycompany.com (internal load balancer host) for Workspace and Shared Services. Specify the internal load balancer SSL port 19443.
|
11. | Click OK.
|
12. | Select the desired setting and click Next.
|
13. | Click Next.
|
14. | Click Next to complete the configuration. |
15. | Click Finish.
|
Configuring Web Server
1. | On the OHS server, launch EPM System Configurator, and select Configure Web Server.
|
|---|---|
2. | Click Next.
Note: This step configures OHS using HTTP. SSL configuration is manual, after certificates are created.
|
3. | Click Next.
|
4. | Click Next to complete the configuration.
|
5. | Click Finish. |
You need eight server certificates for this configuration:
Defining OHS Certificates
1. | On the OHS server, launch Wallet Manager.
|
|---|---|
2. | Click on Wallet/New to create a new wallet.
|
3. | Click OK.
|
4. | Click No (you don't need to create a certificate request for now).
|
5. | Right-click Trusted Certificates and select Import Trusted Certificate. |
6. | In the Import Trusted Certificate dialog box, select Select a file that contains the certificate and click OK.
|
7. | In Oracle Wallet Manager, in the Operations drop-down list, select Add Certificate Request. |
8. | In the Create Certificate Request dialog box, fill out the fields for epm.mycompany.com as specified in the following figure, and click OK.
|
9. | Repeat the previous two steps for epminternal.mycompany.com. |
10. | Obtain server certificates from the certification authority (sign the certificate requests). Certificate requests are available in Wallet Manager. |
11. | In the Operations drop-down list, select Import User Certificate.
|
12. | Select Paste the certificate and click OK.
|
13. | Remove the trailing carriage return. |
14. | Click OK.
|
15. | Follow the steps above to sign the certificate request and add the user certificate to Wallet for epminternal .mycompany.com
|
16. | In the Wallet drop-down list:
|
Defining WebLogic Certificates
Complete the following steps on weblogic1 server:
1. | Create an ssl folder under EPM_ORACLE_HOME. For example, d:\Oracle\Middleware\EPMSystem11R1\ssl. Note: You can change the keystore password in the storepass parameter below for production systems.
|
|---|---|
2. | Use the following command to create a keystore with RSA key for server weblogic1: %EPM_ORACLE_HOME%\common\JRE\Sun\1.6.0\bin\keytool.exe -genkey -dname "cn=weblogic1, ou=EPM, o=orcl, c=US" -alias epm_ssl -keypass password -keystore %EPM_ORACLE_HOME%\ssl\keystore -storepass password -validity 365 -keyalg RSA Note: The common name weblogic1 has to be changed to match your WebLogic server hostname in the following line: cn=weblogic1, ou=EPM, o=orcl, c=US
|
3. | Use the following command to import your root certification authority certificate into the keystore. It is assumed the cert is called CA.crt: %EPM_ORACLE_HOME%\common\JRE\Sun\1.6.0\bin\keytool.exe -import -alias myrootca -keystore %EPM_ORACLE_HOME%\ssl\keystore -trustcacerts -file %EPM_ORACLE_HOME%\ssl\CA.crt -storepass password
|
4. | Use the following command to generate a certificate signing request for weblogic1, and name it weblogic1.csr: %EPM_ORACLE_HOME%\common\JRE\Sun\1.6.0\bin\keytool.exe -certreq -alias epm_ssl -keyalg RSA -file %EPM_ORACLE_HOME%\ssl\weblogic1.csr -keystore %EPM_ORACLE_HOME%\ssl\keystore -storepass password
|
5. | Sign the csr file and obtain your weblogic1.crt server certificate.
|
6. | Use the following command to Import weblogic1.crt into keystore: %EPM_ORACLE_HOME%\common\JRE\Sun\1.6.0\bin\keytool.exe -import -alias epm_ssl -keystore %EPM_ORACLE_HOME%\ssl\keystore -storepass password -file %EPM_ORACLE_HOME%\ssl\weblogic1.crt |
Importing Root Certificates into Java Keystores
Complete the following steps on all EPM servers. CA.crt should be located in %EPM_ORACLE_HOME%\ssl\CA.crt.
1. | Use the following command to import CA.crt into JDK: %EPM_ORACLE_HOME%\..\jdk160_11\jre\bin\keytool.exe -import -alias myrootca -keystore %EPM_ORACLE_HOME%\..\jdk160_11\jre\lib\security\cacerts -trustcacerts -file %EPM_ORACLE_HOME%\ssl\CA.crt -storepass changeit
|
|---|---|
2. | Use the following command to Import CA.crt to EPM JRE: %EPM_ORACLE_HOME%\common\JRE\Sun\1.6.0\bin\keytool.exe -import -alias myrootca -keystore %EPM_ORACLE_HOME%\common\JRE\Sun\1.6.0\lib\security\cacerts -trustcacerts -file %EPM_ORACLE_HOME%\ssl\CA.crt -storepass changeit Note: If you are using a 64-bit system, you should also import CA.crt into JRE-64 (both locations).
|
Importing Root Certificates Into IIS Windows Keystore
Complete the following steps on all IIS servers:
1. | Use the following command to import CA.crt into JRockit on WebLogic servers: %EPM_ORACLE_HOME%\..\jdk160_11\jre\bin\keytool.exe -import -alias myrootca -keystore %EPM_ORACLE_HOME%\..\jrockit_160_05\jre\lib\security\cacerts -trustcacerts -file %EPM_ORACLE_HOME%\ssl\CA.crt -storepass changeit Note: if you changed JVM, update location above.
|
|---|---|
2. | Select Start > Run > mmc.
|
3. | In the File menu, select Add/Remove Snap-in , and then click Add.
|
4. | Select Certificates, and click Add.
|
5. | In the Certificates snap-in dialog box, select an account and click Finish.
|
6. | Right-click Trusted Root Certification Authorities, then select All Tasks > Import.
|
Configuring Listen Ports
1. | On OHS server, manually enable two SSL pools:
|
|---|---|
2. | Edit ssl.conf located in <Oracle_home>\Middleware\user_projects\epmsystem1\httpConfig\ohs\config\OHS\ohs_component
|
Adding Internal Virtual Host
Follow the steps below to add a virtual host for internal SSL communications on port 19443:
Adding External Virtual Host
Follow the steps below to add a virtual host for external SSL communications on port 443:
Redirecting the WebLogic Server
Follow the steps below to configure WebLogic redirection in OHS server:
Proxying to IIS Applications
Follow the steps below to edit httpd.conf:
1. | In ssl.conf, add NameVirtualHost epminternal.mycompany.com:19443.
|
|---|---|
2. | Change virtual host to VirtualHost epminternal.mycompany.com:19443.
|
3. | Within the VirtualHost tag:
Note: The IPs listed in the Location tag have to be changed to match the server environments.
|
2. | In ssl.conf, add NameVirtualHost epminternal.mycompany.com:19443
|
| 3. | Duplicate epminternal virtual host section, and change it to VirtualHost epminternal.mycompany.com:443
|
4. | Within the VirtualHost tag:
Note: Tthe IPs listed in the Location tag have to be changed to match the server environments.
|
5. | In <oracle_home>\Middleware\user_projects\epmsystem1\httpConfig\ohs\config\OHS\ohs_component\mod_wl_ohs.conf
|
6. | In location tags, check WebLogic cluster physical nodes and SSL ports. Interop example:
|
7. | Add the following lines:
Note: Make sure mod_header is loaded.
|
8. | Configure mod_proxybalancer to load balance to different IIS servers: Note: youriis1 and youriis2 are two physical hostnames/dns names for the IIS machines. <Proxy balancer://iisappshfm> BalancerMember http://iis1.mycompany.com:443/hfm loadfactor=1 route=1 BalancerMember http:// iis2.mycompany.com:443/hfm loadfactor=1 route=2 ProxySet lbmethod=bytraffic </Proxy> Header add Set-Cookie "ORA_EPM_IIShfm_ROUTE_ID=iisappshfm .%{BALANCER_WORKER_ROUTE}e; path=/hfm ;" env=BALANCER_ROUTE_CHANGED Replace existing ProxyPass directives with this: ProxyPass /hfm balancer://iisappshfm/ stickysession=ORA_EPM_IIShfm_ROUTE_ID nofailover=OnProxyPassReverse /hfm http://epm.mycompany.com:19000/hfm ProxyPreserveHost ONSSLProxyEngine On
|
9. | Add the same proxy pass and proxy balancer directives for other IIS applications (other Financial Management root contexts, FDM, Strategic Finance, EPMA).
|
10. | Copy cwallet.sso and ewallet.p12 t o Oracle_home>\Middleware\user_projects\epmsystem1\httpConfig\ohs\config\OHS\ohs_component\proxy-wallet. Note: You should perform this step even if SSL Proxy Wallet location is set to Oracle_home>\Middleware\user_projects\epmsystem1\httpConfig\ohs\config\OHS\ohs_component\keystores\default |
1. | Start WebLogic administration console:
|
|---|---|
2. | Enter credentials as specified in EPM System Configurator while creating a domain.
|
3. | Click Lock & Edit.
|
4. | Select Environments > Servers > FoundationServices0.
|
5. | Deselect Listen Port Enabled for http listen port, and select SSL Listen Port Enabled:
|
6. | Navigate to the Configuration > Keystores tab, and define keystores:
|
7. | Follow the step above to fill out the information for the Trust keystore:
|
8. | Select the Configuration > SSL tab and note the Private Key Alias:
|
9. | Click Save, and then click Active Changes.
|
10. | In Windows Services, start OHS.
|
11. | In Windows Services, start Foundation Services.
|
12. | Test by connecting to https://epm.mycompany.com/interop and https://epm.mycompany.com/workspace.
|
Follow the steps below to install remaining products:
1. | Launch EPM System Configurator on WebLogic server.
|
|---|---|
2. | For each web application deployment, select Advanced setup and change the logical web application to: epminternal.mycompany.com on SSL port 19443
|
3. | Once all products are configured:
|
4. | Validate WebLogic redirection and httpd.conf.
|
5. | On the IIS server, import server certificates to enable SSL:
|
In this tutorial, you have learned how to: