first of all you have to got a keystore in order to store you certificates.
to create it, just have to type this line
keytool -genkey -alias mydomain -keyalg RSA -keystore keystore.jks -keysize 2048
then create a CSRequest to get a private key from a CA
keytool -certreq -alias mydomain -keystore keystore.jks -file mydomain.csr
when it comes then type this command
keytool -import -trustcacerts -alias mydomain -file mydomain.crt -keystore keystore.jks
or you can create your own but this time you can use this private key only known systems or systems that knows you.
keytool -genkey -keyalg RSA -alias selfsigned -keystore keystore.jks -storepass password -validity 360 -keysize 2048
in order to define this keystore to your weblogic login and get the lock
the goto Servers->your-server-> configuration->keystores screen
change the keystore type to (Custom Identity and java trust store)
at the sametime copy the keystore.jks file that just have prepared previous step under the folder ...jre/lib/security or where you want and give that path in weblogic
also check the option and type the number for secure port in weblogic as can seen in below
and define the security policy with named "oracle/wss_username_token_over_ssl_server_policy" on the composite as described in this link.
hereafter you can call it like in this description as well.
This journey is all about
* Edge stack like Scala,Spark,Kafka etc
* Cloud(Kubernetes,Docker,CloudFoundry etc)
* Historically it was about mainly on JEE, SOA, BPEL/BPM but now mainly on Microservices
Yorumlar
Yorum Gönder