Procure a Certificate Authority (CA) signed Oracle server certificate from the system administrator of your organization. Ensure that the certificate is in x509 format. For example, oracle.crt.
Procure and configure the Oracle wallet for the Oracle client.
Ensure that the Oracle client communicates with the server securely on TCPS port.
The Application Server and local ETL Engine Server use the cotruststore.ts truststore to communicate with the Oracle database. This truststore is bundled along with the Server installation, and is located in directory where you extracted the install files. For example, BCO/Disk1
.
Complete the following steps on both the Application Server and the local ETL Engine Server to import the security certificate into their truststore files:
Log on to the computer where the Server is installed. The keytool utility that is used to import the certificates is present in the directory where you extracted the install files. For example, BCO/jre/bin
. Add this directory path to the PATH environment variable by running the following command:
export PATH= BCO/jre/bin:$PATH
Navigate to the <Server Installation Directory>/secure directory and import the CA-trusted certificates that are allowed by JRE by running the following command:
keytool -importkeystore -srckeystore <Server Installation Directory>/jre/lib/security/cacerts -destkeystore cotruststore.ts -srcstorepass changeit -deststorepass <cotruststorepassword>
Note
Importing the CA-trusted certificates that are allowed by JRE must be done at least once before you import other certificates.
The <cotruststorepassword>
is the password for cotruststore.ts
truststore.
Navigate to the directory where you extracted the install files (For example, BCO/Disk1)
and import the procured certificates by running the following command:
keytool -importcert -trustcacerts -file <path>/oracle.crt -keystore cotruststore.ts -alias CODB -storepass changeit
Procure the Certificate Authority (CA) signed certificate for the PostgreSQL database from the system administrator of your organization. Ensure that the certificate is in x509 format. For example, postgres.crt.
Save the procured certificate file in the directory where you extracted the install files. For example, BCO/Disk1
.
The Application Server and local ETL Engine Server use the cotruststore.ts truststore to communicate with the PostgreSQL database. This truststore is bundled along with the Server installation, and is located in the directory where you extracted the install files. For example, BCO/Disk1
.
Complete the following steps on both the Application Server and the local ETL Engine Server to import the security certificate into their truststore files:
Log on to the computer where the Server is installed. The keytool utility that is used to import the certificates is present in the directory where you extracted the install files. For example, /BCO/jre/bin
. Add this directory path to the PATH environment variable by running the following command:
export PATH= BCO/jre/bin:$PATH
Navigate to the <Server Installation Directory>/secure directory and import the CA-trusted certificates that are allowed by JRE by running the following command:
keytool -importkeystore -srckeystore <Server Installation Directory>/jre/lib/security/cacerts -destkeystore cotruststore.ts -srcstorepass changeit -deststorepass <cotruststorepassword>
Note
Importing the CA-trusted certificates that are allowed by JRE must be done at least once before you import other certificates.
The <cotruststorepassword>
is the password for cotruststore.ts
truststore.
Navigate to the directory where you extracted the install files (For example, BCO/Disk1
) and import the procured certificates by running the following command:
keytool -importcert -trustcacerts -file <path>/postgres.crt -keystore cotruststore.ts -alias CODB -storepass changeit