WebLogic Configure your own key store and SSL operation manual(Custom logo and custom trust keytooltls1.0)1. Enable SslportSave. Restart managed ServerInternet Explorer Access questionsGoogle Browser access2. View KeyStore and SSL configuration KeyStoreSsl3, Manual production Identity.jks and Trust.jks new JKs folder[Email protected] ~]$ mkdir JKSHL[Email protect
Time: 2003-07-22Author: Zhou YiNumber of Views: 4214This article keyword: "Tuxedo services", "Web services"
Article Toolsrecommend to a friend Print Article
Configure node Manger and SSL for WebLogic Server 8.1
Note: This article is only valid for WebLogic Server 8.1
Time: 2003-07-22Author: Zhou YiNumber of Views: 4214This article keyword: "Tuxedo services", "Web services"
Article Toolsrecommend to a friend Print Article
Configure node Manger and SSL for WebLogic Server 8.1
Note: This article is only valid for WebLogic Server 8.1
The file will be added to the C:\GetCA directory at this time Cik.jks
***********************************************************************
To use the command:
Keytool-certreq-alias cik-sigalg "Md5withrsa"-file careq.pem-keypass weblogic-keystore cik.jks-storepass WebLogic
Show Pictures:
The file will be added to the C:\GetCA directory at this time Careq.pem
b, apply for a digital certificate (a
Here's a simple way to configure the WebLogic managed encryption port:WebLogic Configuring the SSL feature reference methodWebLogic SSL Configuration PreparationNote: If the branch does not obtain the JKs file required for SSL configuration, you will need to manually generate the local self-signed
"authentication has been added to KeyStore" instead of the "authentication reply installed in KeyStore".Certificate Import complete, run the Keystool command to view the contents of the KeyStore file againKeytool-list-keystore C:\keystore.jks-storepass PasswordThird, install the server certificate1. Import the Keysotre KeyStoreLogin WebLogic ConsoleSelect "Lock Edit" To unlock the configuration and enter "Servers"Select the server for which you want
/user_projects/domains/base_domain/weblogic. PEM-keypass 123456789-storepass 123456789-keystore/mnt/Oracle/middleware/user_projects/domains/base_domain/weblogic. authentication requirements for saving jks in files
3: log on to the Weblogic console, go to the "Environment"-"servers" tab, directly click an existing Server, click "keystore" on the page after turni
for example, what do you do with a javabean that you write?
Domain directory/server directory/applications, put the application directory in this directory will be available as an application access
, if the Web application, the application directory needs to meet the requirements of the Web application directory, JSP files can be directly placed in the application directory
, JavaBean needs to be placed in the classes directory of the Web-inf directory of the application directory, and the def
Development environment: Win7_64+weblogic 10.3.1.0+myeclipse Stable 2Note: WebLogic Installation root directory is D:\program\weblogicAction: After installing WebLogic, configure the WebLogic Association in MyEclipse, select the WebLogic root hints as follows:D:\program\
When starting WebLogic with the root user will be in the domain of the root of the file, or the root of the file to overwrite some of the original WebLogic user belongs to the file, when the switch to WebLogic user, when the start of the issue of permissions, So report the above error. This error is because the permissions of the Embeddedldap.tran file become roo
weblogic new domain, WebLogic New deployment environment, WebLogic to rebuild a domain========================Sweet potato Yiu January 29, 2018http://www.cnblogs.com/fanshuyao/do not see the picture, please visit:http://fanshuyao.iteye.com/blog/2409648First, click: Configuration WizardSecond, choose to create a new WebLogic
The latest project to use WebLogic, version is 10. Installed on a Linux system.
These 2 days hurriedly to this research under how to use, the article writes relatively simple, mainly is to record some questions, also for sharing the knowledge.
First of all, the problems I have encountered:
1,weblogic has been installed, the installation process is very good to do, do not say, in the start of the
the message running on each server cannot be the same.
The broadcast address cannot be a group broadcast address that has already been configured, that is, a broadcast address for testing purposes needs to be used separately.
Schedule-Common parameters for plug-ins (case sensitive):
Parameters
Default value
Describe
Weblogichost(This parameter should be set if the proxy is to a single WebLogic server)
None
HT
Weblogic dual-host cluster construction, weblogic dual-host Cluster
The basic steps for building weblogic dual-machine clusters reference an article by Baidu Library:
Basic Steps for wenlogic dual-host Cluster
The following describes the problems that will occur after this article is set up:
1. Host Name Verification Failed
Javax.net.
ProvidersManaging Security RealmsCreating and signing ing a New Security RealmRefreshing the Security ProvidersProcessing the Auditing ProviderProcessing Entitlements CachingUsers, Groups, Roles, and Security Groups iesUsersGroupsSecurity RolesRefreshing ing Security PoliciesStatic and Dynamic Security ConditionsSecurity Models for Web Applications and EJBsThe Deployment Descriptor Only ModelThe Custom Roles ModelThe Custom Roles and Policies ModelThe Advanced ModelSecurity-Related Deployment D
SSL is a security protocol that provides privacy and integrity between communication applications that use TCP/IP. The Hypertext Transfer Protocol (HTTP) of the Internet uses SSL for secure communication.The data that is transferred between the client and the server is encrypted by using a symmetric algorithm such as DES or RC4. The public key algorithm (usually RSA) is used to obtain encryption key exchang
encrypted HTTPS protocol, if the HTTPS communication packets are intercepted during transmission, we can decipher the information in these packets, there are some user name, password, cell phone number and other sensitive information, and if the use of HTTPS communication, even if the packet is intercepted, And we can't decipher what's inside.
Interpreting the SSL workflow
The browser sends an HTTPS request to the server;
Server to
. Admin for use)
Set the port number (WebLogic. Admin for use)
Set the SSL port number (Weblogic.admin used), note: This first in the console http://localhost:7001/console/ first set before the line, or save the detection can not be saved.
Set the administrator name (the name of the user who has permission to start this server, such as the default WebLogi
10.3.6 version of WebLogic requires patches to 10.3.6.0.171017 (October 2017 patch, Java deserialization vulnerability upgrade), Oracle official recommends at least October 2017 patch; 10.3.6 The following versions need to be upgraded to 10.3.6 and then in the patch upgrade.First, view version1. Use the following command to re-match environment variablesD:\Oracle\Middleware\wlserver_10.3\server\binSetwlsenv.cmd1.1. View
Weblogic deployment problem locating and solving, weblogic deployment
Weblogic, as a commercial middleware (EJB, jndi data source, log management, memory management, resource configuration management...), is a small open-source free container.
Weblogic was first developed by weblog
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.