Live Chat
Same Certs
Cheapest Price Seal
Less Price

How to Install SSL certificate on Oracle WebLogic Server?

Weblogic Server is a very popular and widely used Java Enterprise Edition application server (AKA Java EE) developed by BEA System and now wholly acquired by Oracle Corporation since 2008. Weblogic Server used to deploy server oriented web applications in a very highly secured and scalable environment. Weblogic Server came into existence because of the booming e-commerce industry. As you know, E-commerce industry needs a robust and reliable source of data transmission thus to attain this need Oracle Weblogic server required. It also manages system-level details and works on Java 2 Platform, Enterprise Edition (J2EE) technologies.

This blog specifies instructions for creating an encryption key pair, Certificate Signing Request (CSR) file and installing SSL certificate for Oracle WebLogic Server 12c (Any version supported). Make sure WebLogic Server must be installed and Running.

To Generate CSR & Install SSL Certificate on WebLogic Server, Perform the following steps:

Step 1: Create Java KeyStore (JKS) and Generate Private Key with Java keytool utility

Browse \weblogic..\$JAVA_HOME\bin> folder and type the following command:

keytool -genkey -alias [alias_name] -keyalg RSA -keysize 2048 - sigalg SHA1withRSA -validity [valDays] -keystore /path_to_keystore[keystore_name].jks

Note:

i) Make sure items in square brackets should be replaced with suitable values when running a command.
ii) Alias name will be used when you import the CA-signed certificate in KeyStore.
iii) KeyStore used to specify a location of JKS file, if no JKS file present in the path given, new KeyStorewill be created.

Step 2: Create Certificate Signing Request (CSR) for Key [alias_name] generated in the previous step

Next step, Generate a Certificate Signing Request (CSR) for WebLogic Server. Now, You will be prompted to enter following attributes of the certificate and keystore upon execution of the previous command:

Enter keystore password: [Enter a password to protect the keystore]
Re-enter new password: [Confirm the password used to access the key in keystore]
What is your first and last name? [Type your Domain name to which certificate key is created, for instance; www.example.com ]
What is the name of your organizational unit? [for instance, IT]
What is the name of your organization? [for instance, XYZ Corporation]
What is the name of your City or Locality? [for instance, Los Angeles]
What is the name of your State or Province? [for instance, California ]
What is the two-letter country code for this unit? [for instance,  US]
Is CN=example.com, OU=IT, O=XYZ Corporation, L=Los Angeles, ST=California, C=US correct? 

If all information is correct, then enter ‘YES
Now, Enter the following command under bin folder of the JRE:

keytool -certreq -alias [alias_name] [certificate_request].csr -keystore /path_to_keystore [keystore_name].jks

Upon execution of a command, CSR file will be generated including server’s public key that you need to send to Certificate Authority (CA) to obtain trusted SSL certificate.

Step 3: Extract your SSL certificate files

Certificate Authority (CA) validates your domain name and issue an SSL certificate in .zip file based your submitted CSR [certificate_request].csr and send it on your email. You will received SSL certificate including Root, Intermediate and Primary Server certificate files. Just You need to extract issued certificate files and open using text editor (the recommended editor is Notepad). Next, you need to merge all files and convert into [mycertificate].pem format using text editor.

Step 4: Install your SSL certificate

To import the myCertificate.pem file that you have created earlier you will need java key-tool command line utility. With the help of this utility type the following command in a single line. See below:

keytool -import -alias [alias_name] -file [myCertificate].pem -keystore /path_to_keystore[keystore_name].jks

The above-mentioned code will import the file (myCertificate.pem) into your Keystore (for instance, [keystore_name].jks).

Step 5: Configure Identity and Trust Stores and SSL for Weblogic Server Console

Follow steps as mentioned below:

  1. Log into the “Oracle WebLogic Server Admin Console
  2. Expand ‘Environment > Servers‘ node under Domain Structure
  3. Domain Structure Wizard of WebLogic Server

  4. Select server name for which you want to configure Identity and Trust KeyStores
  5. Go to ‘Configuration‘ and select ‘keystores‘ tab.
  6. Under ‘Change Center‘, click the button ‘Lock & Edit
  7. Change Center of WebLogic Server

  8. Select ‘Keystores’ from ‘Identity and Trust Locations’.
  9. Under ‘Identity’ section, select custom identity and Custom Trust
  10. You need to specify the fully qualified path to ‘custom Identity, Trust KeyStore‘ as well as enter custom Passphrase for Identity and Trust KeyStore on the Keystores page and click on Save button.
  11. Next, Specify properties of Private key Alias and Passphrase under WebLogic Server Console using SSL section under Configuration Tab.
  12. Click ‘Save

Step 6: Final set-up & Testing Configuration

Finally, click on check box next to the SSL Listen Port Enabled, which located under the General and Enter the SSL Listen Port as 8011.

enable SSL on WebLogic

Note: By default, SSL listen Port is 7002.
Now, Click on Activate changes button in the ‘Change Center’.

Activate Changes on WebLogic

Once the entire process of installation is completed, it is time to restart Weblogic Admin server using controls tab.

In order to check whether your SSL is correctly installed or not, you can confirm it with SSL installation checker.

Cheap SSL Shop
4.8/5 overall satisfaction rating

Based on 2981 ratings from actual customers

Customer Reviews
"Not a new customer just a new account due to a name change. Love your prices and service. Thanks for everything! Jimmy - Prestacarts Global Commerce"
Jimmy Ray Warren J / TX, United States
"I have to say your tech "Mike" went out of his way to help me setup the CSR for our SSL. I am not a techie, and Mike was extremely helpful and patient with me. You need to hire more support personnel like Mike! Great job Mike!! Thank you for all your help!! Jana"
Jana K
"Been using you guys for several years. Clean built website with a great UI/UX that lets me get to what I need to buy quickly. I couldn't ask for more. Thanks!"
Devin N
5 Star
80%
4 Star
13%
3 Star
3%
2 Star
2%
1 Star
2%