Recently a customer asked me how to import his private key and certificate into an Oracle HTTP Server Wallet.
The customer generated a CSR outside the OHS Wallet Manager, using Open SSL, and sent it to a CA to get his certificates issued by them.
Unfortunately, the Wallet Manager only allows you to import certificates which were created for a CSR generated by the Wallet itself.
Despite this minor limitation, there is a workaround to get your private key, certificate and CA trusted certificates chain into Oracle Wallet.
This post explains the simple steps to achieve this, with a little help from Open SSL.
What you will need:
- openssl installed in a machine
- The server’s certificate (PEM format)
- The server’s encrypted private key and it’s password
- The CA root and intermediate certificates (these must be concatenated into a single file, also in PEM format)
On a server with openssl installed, issue the following command:
openssl pkcs12 -export -in certfile -inkey keyfile -certfile cacertfile -out ewallet.p12
certfile: is the server’s certificate
keyfile: is the server’s private key
cacertfile: is the CA’s concatenated root and intermediate certificates.
Note that the resulting file must be named ewallet.p12 in order to be recognized by Oracle Wallet Manager.
Enter the private key’s passphrase when prompted for it.
Enter an export password when prompted for it. You MUST supply a non-blank password. You will need to type it again as verification.
Upload the ewallet.p12 file to the Oracle Application Server. Move it to where the OHS can access it.
Start the Oracle Wallet Manager application.
Under the Wallet menu, click Open.
You will likely receive an error message about the default wallet directory not existing, and asking you if you want to continue. Click Yes.
You will be asked to select the directory where the wallet file is located. Find the directory where you moved the file ewallet.p12 to.
You will be asked for the wallet password. Enter the export password you entered when converting the certificate.
The wallet should open, and the certificate may be displayed as “empty” – don’t worry about that right now. You should also see the CA certificate under “Trusted Certificates”.
Under the Wallet menu, select “Auto Login”. Verify that it was selected by viewing the Wallet menu again; the Auto Login box should now have a check mark.
Under the Wallet menu, select “Exit” to quit the Oracle Wallet Manager application.
Now you should have 2 files in the directory: ewallet.p12 and cwallet.sso. Both files must be together at the same directory so the OHS can access the wallet.
Modify your OSH ssl.conf (default location should look something like /home/oracle/Middleware/Oracle_WT1/instances/instance1/config/OHS/ohs1/ssl.conf) so the directive SSLWallet points to the directory where you saved both files, for example:
Start OHS and access its HTTPS home page. Inspect the certificate presented by the browser and you should see your new certificate and the CA chain.
All site content is the property of Oracle Corp. Redistribution not allowed without written permission