1. Use the built-in keytool in Java SDK to generate the key:
Linux: # keytool-genkey-v-alias weblogicssl-keyalg RSA-keysize 512-keypass 123456789-validity 365-keystore/mnt/Oracle/middleware/user_projects/domains/base_domain/weblogic. jks-storepass 123456789 What is your first name and last name? [UNKNOWN]: localhost // if it is a real server, enter the IP address of the server. What is the name of your organization unit used in the test here? [UNKNOWN]: CN What is your organization name? [UNKNOWN]: What is the name of your city or region in CN? [UNKNOWN]: CN What is the name of your state or province? [UNKNOWN]: CN What is the two-letter country code for this unit [UNKNOWN]: CNCN = localhost, ou = sxrq, O = sxrq, L = ty, St = Sx, is c = cn correct? [No]: Y is generating a 512-bit RSA key pair and self-signed certificate (sha1withrsa) for the following objects (valid for 365 days): Cn = localhost, ou = Cn, O = Cn, L = Cn, St = Cn, c = Cn
2. Use the built-in keytool in Java SDK to generate a certificate:
Linux :#. /keytool-certreq-v-alias weblogicssl-file/mnt/Oracle/middleware/user_projects/domains/base_domain/weblogic. PEM-keypass 123456789-storepass 123456789-keystore/mnt/Oracle/middleware/user_projects/domains/base_domain/weblogic. authentication requirements for saving jks in files </mnt/Oracle/middleware/user_projects/domains/base_domain/weblogic. PEM> submit this to your ca
3: log on to the Weblogic console, go to the "Environment"-"servers" tab, directly click an existing Server, click "keystore" on the page after turning to, and enter the following information:
4: click "SSL" and configure as follows:
5: click the "General" tab and configure it as follows:
If everything is correct, you can see the following results after accessing through HTTPS and port 7002: