Enabling TLS server certificate validation between internal Oracle database and product components
The internal Oracle database communicates with the following components of TrueSight Capacity Optimization:
- Application Server
- Local ETL Engine Server
Before you begin
- Ensure that you use the Oracle database and client versions that support TLS 1.2. For more information, see TLS-considerations-for-TrueSight-Capacity-Optimization.
- Ensure that the Oracle database is configured in TLS 1.2 mode.
Ensure that a TLS 1.2 compliant ojdbc7.jar file exists in the <Oracle client home>/jdbc/lib directory. If not, copy the file from the Oracle website.
To enable TLS 1.2 with server certificate validation, complete the following steps:
I. Procure the security certificate and configure the Oracle wallet
- Procure the Oracle database certificate (in the x509 format) from the system administrator of your organization if a self-signed certificate is used. For example, oracle.crt. If a certificate that is signed for the Oracle database by an enterprise certificate authority (CA) or a third-party CA as a trusted root authority is used, import this signed certificate to avoid importing of multiple signed certificates for all TLS connections.
- Procure and configure the Oracle wallet for the Oracle client.
- Ensure that the Oracle client communicates with the server securely on TCPS port.
II. Install the security certificate
The Application Server and local ETL Engine Server use the cotruststore.ts truststore to communicate with the Oracle database. This truststore is bundled along with the Server installation, and is located in the <Server Installation Directory>/secure directory.
Complete the following steps on both the Application Server and the local ETL Engine Server to import the security certificate into their truststore files:
Log on to the computer where the Server is installed. The keytool utility that is used to import the certificates is present in the <Server Installation Directory>/jre/bin directory. Add this directory path to the PATH environment variable by running the following command:
export PATH=<Server Installation Directory>/jre/bin:$PATHNavigate to the <Server Installation Directory>/secure directory and import the procured certificates by running the following command:
keytool -importcert -trustcacerts -file <path>/oracle.crt -keystore cotruststore.ts -alias CODB- When you are prompted, enter the password to access the keystore.
- When you are prompted to trust the certificate, enter Yes.
III. Configure the product components to use TLS
Complete the following configuration steps on both the Application Server and the local ETL Engine Server:
Navigate to the <Server Installation Directory>/tools directory and run the switchTLSmode.pl script.
#Example
switchTLSmode.pl -on –dbport 2484 -tspwd -flow codb- When you are prompted, enter the password to access the truststore.
The communication between the internal Oracle database and the Application Server, and between the internal Oracle database and local ETL Engine Server are now TLS 1.2 enabled with server certificate validation.