Sample Header Ad - 728x90

Renew Certificate in Oracle Enterprise Cloud Control OMS Manager Console

3 votes
2 answers
3408 views
Environment: - Oracle Enterprise Manager Cloud Control 13.4 - OMS console with third party certificate - Secured My situation is the following: 1. I am new in this client and apparently the former DBA added a third party certificate in the OMS console, which is near to expire. 2. I've been reading the documentation but I can't find the keystore or the wallet associated to this certificate. So far, I checked the following [oracle@hcbae2p01ora022 bin]$ $OMS_HOME/bin/emctl status oms -details Oracle Enterprise Manager Cloud Control 13c Release 4 Copyright (c) 1996, 2020 Oracle Corporation. All rights reserved. Enter Enterprise Manager Root (SYSMAN) Password : Console Server Host : hcbae2p01ora022.hcbe.corp HTTP Console Port : 7788 HTTPS Console Port : 7803 HTTP Upload Port : 4889 HTTPS Upload Port : 4903 EM Instance Home : /u01/app/oracle_em/gc_inst/em/EMGC_OMS1 OMS Log Directory Location : /u01/app/oracle_em/gc_inst/em/EMGC_OMS1/sysman/log OMS is not configured with SLB or virtual hostname Agent Upload is locked. OMS Console is locked. Active CA ID: 1 Console URL: https://hcbae2p01ora022.hcbe.corp:7803/em Upload URL: https://hcbae2p01ora022.hcbe.corp:4903/empbs/upload WLS Domain Information Domain Name : GCDomain Admin Server Host : hcbae2p01ora022.hcbe.corp Admin Server HTTPS Port: 7102 Admin Server is RUNNING Oracle Management Server Information Managed Server Instance Name: EMGC_OMS1 Oracle Management Server Instance Host: hcbae2p01ora022.hcbe.corp WebTier is Up Oracle Management Server is Up JVMD Engine is Up BI Publisher Server Information BI Publisher Managed Server Name: BIP BI Publisher Server is Up BI Publisher HTTP Managed Server Port : 9701 BI Publisher HTTPS Managed Server Port : 9803 BI Publisher HTTP OHS Port : 9788 BI Publisher HTTPS OHS Port : 9851 BI Publisher is locked. BI Publisher Server named 'BIP' running at URL: https://hcbae2p01ora022.hcbe.corp:9851/xmlpserver/servlet/home BI Publisher Server Logs: /u01/app/oracle_em/gc_inst/user_projects/domains/GCDomain/servers/BIP/logs/ BI Publisher Log : /u01/app/oracle_em/gc_inst/user_projects/domains/GCDomain/servers/BIP/logs/bipublisher/bipublisher.log As you can see for the information above, the console is secured in port 7803. I thought that the certificates should be stored in a wallet, but I can't find the wallet anywhere. I neither was able to find any command in emctl or in emcli that can show me where this certificate is stored. What I know is that the certificate is there, as I used the secdiag option of emctl [oracle@hcbae2p01ora022 bin]$ $OMS_HOME/bin/emctl secdiag openurl -url https://hcbae2p01ora022.hcbe.corp:7803/em Oracle Enterprise Manager Cloud Control 13c Release 4 Copyright (c) 1996, 2020 Oracle Corporation. All rights reserved. Log file: /tmp/OpenPage_2023_02_21_13_45_115472876152891123503.log Opening page: https://hcbae2p01ora022.hcbe.corp:7803/em Using non-validating trust manager; all certificates will be blindly accepted. Proxy server is not set Using protocol: TLSv1 Negotiated protocol: TLSv1 Getting the certificate chain Details of cert# 1 in chain: Subject: EMAILADDRESS=xxxxxxx, CN=hcbae2p01ora022.hcbe.corp, OU=xxxxxxx, O=xxxxxxxxxx, L=xxxxxxxxxxxxxx, ST=xxxxxxxx, C=xx Issuer: CN=XXXXX CA, DC=cloud, DC=corp Valid from: Tue Mar 23 13:54:18 UTC 2021 Valid till: Thu Mar 23 13:54:18 UTC 2023 Serial#: 914345119400343461451536535824392411922746991 Public key: Sun RSA public key, 2048 bits modulus: 231855705770066152570314131577369954637603242446759578989206803754751294824351565914129743732110994827544588460966543883605976172129693569117661509357921588815183478850378089638600314229871995314771805178017341640817875936605315833364302707372595554647453833532393376815757155001416722179412428142624866504902792330046510191621551136336433918248638504659645288726326144907300691458403587891238454297424723893811783631933359920866785373444400398845738032568684675766778615996191586165668755883030522959798859689120112193205210100146390085495955132802650583693008692078856106184239283369895227655357520072938286 public exponent: 65537 Signature algorithm: SHA256withRSA Following headers are present in the response: Date : Tue, 21 Feb 2023 13:45:12 GMT Vary : Accept-Encoding Adf-Context-Id : fd3875f9-7da2-4e9a-bbe1-cdbc60ba6af8-00000002 X-Frame-Options : sameorigin X-ORCL-EMOA : true X-ORACLE-DMS-RID : 0:3:1 X-Content-Type-Options : nosniff, nosniff X-XSS-Protection : 1; mode=block, 1; mode=block X-ORACLE-DMS-ECID : fd3875f9-7da2-4e9a-bbe1-cdbc60ba6af8-00000002 Adf-View-Id : %2Flogon%2Fcore-uifwk-console-login Content-Type : text/html;charset=UTF-8 Cache-Control : no-store, no-cache, must-revalidate, post-check=0, pre-check=0, max-age=0 Response saved at : /tmp/hcbae2p01ora022.hcbe.corp_7803_2023_02_21_13_45_134697786630783685089.html [oracle@hcbae2p01ora022 bin]$ As you can see above, the certificate that allows me to access by https to the OMS console is stored somehow in OMS. But I can't find where exactly. I have tried to check all wallets in the server, but I could not find anything. I'd like to know how can I update this certificate with a new one that I have already in my hands. Is there a way to identify whether this certificate was included using emctl secure createca ? if so, how can I update the certificate stored there ? **UPDATE** Thanks to @Balazs Papp, I was able to find the wallet used by the OMS Console [oracle@hcbae2p01ora022 console]$ pwd /u01/app/oracle_em/gc_inst/user_projects/domains/GCDomain/config/fmwconfig/components/OHS/instances/ohs1/keystores/console [oracle@hcbae2p01ora022 console]$ orapki wallet display -wallet pwd Oracle PKI Tool Release 19.0.0.0.0 - Production Version 19.4.0.0.0 Copyright (c) 2004, 2020, Oracle and/or its affiliates. All rights reserved. Requested Certificates: User Certificates: Subject: EMAIL=xxxxxxxxxxxxx,CN=hcbae2p01ora022.hcbe.corp,OU=xxxxxx,O=xxxxxx,L=xxxxxxxxx,ST=xxx,C=xx Trusted Certificates: [oracle@hcbae2p01ora022 console]$ What I don't get is why it does not appear as a Trusted certificate ? If I copy this wallet to a different location, then I can use orapki to import the new certificate into the wallet, and then use emctl secure console -wallet to renew the certificate ? I have read somewhere that if there is a change in the certificate, such as the email address, you have to do it from scratch. Is that so ?
Asked by Roberto Hernandez (143 rep)
Feb 21, 2023, 01:55 PM
Last activity: Oct 12, 2023, 02:44 PM