Skip navigation.

Using WebLogic Integration - Business Connect

  Previous Next vertical dots separating previous/next from contents/index/pdf Contents Index View as PDF   Get Adobe Reader

Keys and Certificates

WebLogic Integration - Business Connect offers true security by providing authentication, confidentiality, integrity and non-repudiation of documents. WebLogic Integration - Business Connect uses state-of-the-art cryptography to ensure the security of the documents you exchange over the public Internet. The following topics are provided.

Concepts

Windows and Fields

Procedures

 


What Is PKI?

WebLogic Integration - Business Connect supports public key infrastructure (PKI) to securely trade business documents over the Internet. PKI is a system of components that use digital certificates and public key cryptography to secure transactions and communications.

PKI uses certificates issued by certificate authorities (CAs) to provide authentication, confidentiality, integrity and non-repudiation of data. The following defines these in more detail.

Authentication

Authentication is verification of the identity of a person or process. Authentication confirms that a message truly came from the source that sent it.

Confidentiality

Confidentiality is the assurance that a message has been disclosed only to the parties authorized to share the information.

Integrity

Integrity is the assurance that the information has not been altered in any way and is precisely true to the source.

Non-repudiation

Non-repudiation is proof that a recipient received a message. This protects a sender from a false denial that a recipient did not receive a message.


 

PKI options

There are two PKI options, and WebLogic Integration - Business Connect supports both. They are self-signed certificates and commercial PKIs. The option you choose can depend on a number of factors, such as cost, human and system resources and the degree or sophistication of security desired.

Self-signed certificates generated by WebLogic Integration - Business Connect and certificates generated by commercial PKIs all support the X.509 standard for public key certificates. You can use any X.509 certificate, regardless of the source, in document transactions with partners. For example, you can generate a self-signed certificate for your company profile and export a public encryption key in a certificate with the profile to a partner for use in encrypting and signing documents sent to you. Meanwhile, you can engage in trading with partners who have sent you public keys in Entrust or VeriSign certificates.

The following sections explain each security option in more detail.

Self-Signed Certificates

WebLogic Integration - Business Connect can generate root certificates in which you are, in effect, acting as your own certificate authority. WebLogic Integration - Business Connect supports single-key pair self-signed certificates for both encrypting and signing documents and dual-key pair self-signed certificates in which one certificate is used for encrypting and the other for signing.

Self-signed certificates are easy to make and use. They are best suited for use within relatively small trading groups. This is because you must implicitly trust a partner's self-signed certificate; there is no chain of trust to independently vouch for the certificate. Such a trust relationship can more suitably be managed among a small number of partners.

Although self-signed certificates can provide a high-degree of security, the degree is dependent on the vigilance and administrative skills of the persons managing them. Generally speaking, the use of self-signed certificates does not have the rigorous discipline and orderly structure inherent to a commercial PKI.

Commercial PKIs

A commercial PKI is an organization set up for the centralized creation, distribution, tracking and revocation of keys for a potentially large community of partners. A commercial PKI has a documented certificate policy (CP) that indicates the applicability of a public key certificate to a specific community or class of application with common security requirements. A commercial PKI also has a certification practice statement (CPS), which details the practices the CA follows for issuing public key certificates.

There are two types of commercial PKIs:

In-house

An in-house PKI enables you to achieve complete control of security policies and procedures, but also carries the burden of management and cost to set up and maintain the system.

Outsourced

You can leverage the services of PKI systems such as VeriSign, Baltimore and other third-party certificate authorities. You purchase keys and certificates for use in trading partner relationships and let the CA manage security policies and such details as certificate revocation. The level of outsourcing can range from purchasing an end-entity public key certificate of a certain validity period from a commercial PKI to outsourcing all of the PKI services that your organization requires.


 

The Role of Trust in PKI

PKI establishes digital identities that can be trusted. The CA is the party in a PKI responsible for certifying identities. More than generating a certificate, this entails verifying the identity of a subscriber according to established policies and procedures. This is the case for in-house and outsourced PKIs. In an organization that generates and uses its own self-signed certificates, the trading parties must verify the certificates and establish a direct trust. Once established that an identity or issuer of an identity can be trusted, the trust anchor's certificate is stored in a local trust list.

WebLogic Integration - Business Connect has a local trust list for storing and managing established trust relationships (select Tools—>Certificates—>Trusted Roots in Administrator). The application maintains a list of common public CA certificates similar to those kept in web browsers. Although convenient, this pre-determination of trust might not compliment your organization's security policy. The decision of who to trust rests with your organization.

For example, a trader might accept certificates issued by its own root CA and its trading partners' root CA, but not from company B, who the trader has not done business with in the past. If you choose not to accept company B's root CA certificate, your system will not accept any certificates issued by company B. The greater the number of root CA certificates you choose to accept, the more open your community is to others.

Scalability

The use of self-signed certificates relies on users to exchange certificates and establish trust in each other. This informal web of trust works for small groups, but can become unmanageable for large numbers of partners. In contrast, an in-house or outsourced PKI uses hierarchies, where a certificate authority serves as a trust anchor for many users. Once trust has been established for the certificate authority, it is unnecessary to re-establish the trust for other certificates the CA issues. Establishing hierarchies of users scales equally well for small and large groups.

Certificate revocation

A certificate is expected to be usable for its entire validity period. However, there are circumstances when a certificate should no longer be considered valid even though it has not expired. Possible circumstances range from a user name change to suspected compromise of the private key. In such circumstances an in-house or outsourced CA can revoke the certificate. WebLogic Integration - Business Connect can be configured to compare your partners' certificates against lists of revoked certificates issued by CAs. However, self-signed certificates cannot be revoked. You must notify all partners using the certificate that it should no longer be trusted.

Dual-Key Pairs

Support for two pairs of public-private keys is a fundamental requirement for some PKIs (for example, Entrust). One key pair is for data encryption and the other key pair is for digitally signing documents. Encryption key pairs and signing key pairs are a result of conflicting requirements. One such requirement is to support different algorithms for encryption and digital signature pairs and different validity periods. Another reason is to support data recovery, which requires the private keys for decrypting to be securely backed up, but non-repudiation, which requires the private keys for signing, not to be backed up. There also might be the requirement to support updating encryption key pairs and managing decryption key histories even though this conflicts with the requirement to securely destroy the private key used for signing when updating signing key pairs. Using two key pairs, an encryption key pair and signing key pair, solves these conflicting requirements.

 


Why Use Encryption and Digital Signatures?

Encrypting and digitally signing documents by using certificates provides WebLogic Integration - Business Connect users with the following assurances about each of their document transmissions:

 


WebLogic Integration - Business Connect Encryption Method

WebLogic Integration - Business Connect uses a combination of public-private key encryption, which is also known as asymmetric encryption, and symmetric key encryption. This hybrid system uses the best characteristics of each method and minimizes the shortcomings of each. It follows the widely adopted S/MIME standard for securing messages.

The advantage of symmetric key encryption is that it performs the encryption task more quickly than asymmetric encryption. The advantage of asymmetric encryption is that it allows you to send an encrypted message to a partner who does not hold your secret key.

To use the best of both, WebLogic Integration - Business Connect uses the faster symmetric key to encrypt the document, such as a lengthy EDI transaction set, and the asymmetric key for the smaller task of encrypting the one-time session key. The session key can then be securely included with the message for transmission and allows your partner to decrypt the contents without sharing your secret key.

Note: As noted in Transport Selection Considerations, if you send documents using the HTTPS transport, double encrypting adds only marginally to data security. You can turn off document encryption by clearing the encrypt documents check box on the Partner Profile window Security tab.

Symmetric Key Encryption Algorithms

WebLogic Integration - Business Connect supports RC2, ARCFour, DES, and Triple DES encryption algorithms. The encryption algorithm is used in conjunction with a randomly generated session key to encrypt your document. When you set up a partner profile with WebLogic Integration - Business Connect, you must choose one of these encryption algorithms. WebLogic Integration - Business Connect provides you a full range of choices so that you are capable of trading with whatever algorithm your partner might require. However, when you choose an algorithm, you need to be careful to choose one your trading partner can support.

Symmetric Key Lengths

WebLogic Integration - Business Connect supports several key lengths for the symmetric key you choose. The choice you make depends on which encryption algorithm you choose. If you choose the RC2 or ARCFour algorithm, you can select 40-, 64-, or 128-bit key length. If you choose DES, the default key length is 56 bits. Triple DES, as the name implies, uses a 168-bit key length. As with algorithms, you need to be careful to choose a key length your trading partner can support.

Note: ARCFour is an independently developed algorithm that is interoperable with RSA RC4.

Public-Private (Asymmetric) Key Algorithms

WebLogic Integration - Business Connect uses the RSA cryptosystem for asymmetric encryption and the digital signatures provided by using certificates.

You can use two types of asymmetric RSA keys:

Public-Private (Asymmetric) Key Lengths

WebLogic Integration - Business Connect supports encryption key lengths of 512, 1024, and 2048 bits for the public-private key. You must choose one of these key lengths when you generate or obtain your certificate. You do not need to choose the same key length as your trading partner.

Summary of Algorithms and Key Lengths

To use strong encryption you must ensure that the partner's software supports such strong encryption algorithms and key lengths. The following table summarizes algorithms and key lengths for symmetric and asymmetric keys.

Table 7-1 Algorithms and Key Lengths

Symmetric algorithm for document encryption

RC2

ARCFour

The default is 40 bits. You can use this length for trading partners located in the U.S. and internationally.

You can also choose stronger key lengths of 64 or 128 bits. Longer key lengths require more processing time to encrypt and decrypt, but provide more protection against cryptographic attacks.

DES

Triple DES

The key length is 56 bits.

The key length is 168.

Asymmetric algorithm for authentication

RSA

The default key length is 512 bits when generating a self-signed certificate. You can also choose a key length of 1024 or 2048. The length of imported RSA keys is determined outside of WebLogic Integration - Business Connect.


 

Support for Dual Keys

WebLogic Integration - Business Connect supports single- and dual-key certificates. You do not need to do anything different to trade documents with a partner who uses dual keys.

When you import the certificates from a partner who uses two keys, both are displayed in the Certificates information viewer. How certificates are used is labeled in the Certificates information viewer as follows:

 


Encryption and Signing Summary

Described in the simplest terms, WebLogic Integration - Business Connect exchanges encrypted and signed documents in S/MIME format.

WebLogic Integration - Business Connect is certified S/MIME-compliant by RSA Data Security, Inc.

Outbound Documents

The document contains the data that needs to be protected. The encryption and signing processes take place for every document that WebLogic Integration - Business Connect sends over the Internet.

WebLogic Integration - Business Connect encrypts and signs each document by building three parts: the encrypted document, the encrypted session key and the digital signature. The following is the process for an outbound document:

  1. A hashing routine (MD5 or SHA-1) creates a digital digest of the document. This digest is a number. If the data in the transaction are changed, added to or subtracted from, reapplying the hashing routine will produce an entirely different digest. This characteristic of hashing routines makes it easy for a partner to verify the integrity of an inbound document.
  2. The digital digest is encrypted using your private key. This encrypted digest is the digital signature for this document. It ensures that the data in the document were not changed and that the document came from you and only you.
  3. WebLogic Integration - Business Connect generates a one-time session key. This is the symmetric key part of WebLogic Integration - Business Connect's hybrid encryption method.
  4. The session key is used to encrypt the document.
  5. Your partner's public key is provided in the certificate inside the profile your partner gave you. It is used to encrypt the session key for transmission. Thus, the key to decrypting the document has itself been encrypted by your partner's public key and can be decrypted only by your partner's private key.
  6. The document is then sent using whatever transport method you chose for this partner.

Inbound Documents

When a document is received by your trading partner, the process is reversed according to the following steps.

  1. Upon receiving the document, your partner's WebLogic Integration - Business Connect begins security processing.
  2. Your partner uses his or her private key (the matching half to the asymmetric public key you used to encrypt it) to decrypt your symmetric key.
  3. The one-time key that was just decrypted is used, in turn, to decrypt the document. Your partner now has your message in clear text.
  4. With the public half of your public-private key pair that you sent your trading partner in your certificate (inside your company profile), your trading partner decrypts the digital signature.
  5. Your partner uses the same hashing routine (MD5 or SHA-1) to create a digital digest of the document. This is called rehashing. Your trading partner then compares this to the digest in the digital signature you sent. If the two are identical, your partner has proof that the contents of the document were not altered and that it came from you and only you.
  6. The document is now ready to be read into and used by your partner's business application.
  7. Note: Any documents that cannot be successfully processed are placed in the Rejected directory, and a notification message is sent to your WebLogic Integration - Business Connect point of contact.

 


Certificate Basics

A certificate contains the public half of your public-private key pair along with other identifying information about your WebLogic Integration - Business Connect company profile and point of contact. WebLogic Integration - Business Connect uses certificates to distribute your public key and those of your partners. You use the public key in your partner's certificate to encrypt a document for transmission over the Internet. Your partner uses the public key in your certificate to verify the digital signature of a document received from you.

The following is some basic information about how WebLogic Integration - Business Connect uses certificates:

 


Where Certificates and Keys Are Stored

WebLogic Integration - Business Connect stores certificates and keys in two files: ConfigDB.db and keys.db. The ConfigDB.db file is in the root application directory. The keys.db file is in the keys subdirectory. The contents of these files are encrypted to ensure security. Do not attempt to alter these files.

The following describes the roles of these two files.

ConfigDB.db

All certificates are stored in ConfigDB.db. Certificates that you choose to trust are copied to keys.db.

keys.db

The public and private keys for your certificates are stored in keys.db. The trusted public keys of your partners and trusted anchors of certificate authorities also are stored in keys.db.

 


Certificate Status

WebLogic Integration - Business Connect manages certificates by using the following status categories.

Active Certificate (Yellow Bulb) Encrypting a Document Using a Key

A certificate identified with a yellow bulb is the active certificate for your company profile or for your trading partner's partner profile.

You distribute your public key to your trading partners in your certificate. Your trading partners use this key to verify the digital signature of documents they receive from you.

You receive your trading partner's public key in his or her certificate. You use your partner's public key to encrypt documents for transmission over the Internet.

There can be only one active certificate for signature and encryption or one active pair (one for signature, one for encryption) on your system. The active certificate on your system is also the active certificate on your partners' systems.

When you create or obtain a new certificate for your company profile, you can choose to activate it immediately or to save it in Pending status. If you choose to activate it immediately, WebLogic Integration - Business Connect places the active certificate for your profile in Valid status.

If you import your partner's certificate, WebLogic Integration - Business Connect activates it and places the active certificate for that profile in Valid status.

Valid or Inactive Certificate (Blue Bulb) Encrypting a Document Using a Key

A certificate identified with a blue bulb is in the Valid or Inactive state.

A valid certificate is one that was formerly active on your computer. You can have multiple valid certificates on your system.

If WebLogic Integration - Business Connect fails to verify an inbound document using the public key in the active certificate, the application tries again with each of the valid keys. If one of these succeeds, processing proceeds normally and no alert is sent.

An inactive certificate is one that is valid but is not used to verify signatures or to encrypt messages to a partner.

Pending Certificate (Red Bulb) Encrypting a Document Using a Key

A certificate identified with a red bulb is in the Pending state:

In either of the preceding cases, you must use the Certificate Profile window to activate a pending certificate. See Activating a Pending or Valid Certificate.

Retired Certificate (Clear Bulb) Encrypting a Document Using a Key

A retired certificate is one that was formerly active or valid. You can have multiple retired certificates on your system.

WebLogic Integration - Business Connect does not use the keys associated with retired certificates to sign, verify, encrypt or decrypt documents.

 


Exchanging Profiles and Certificates

Before you can exchange encrypted and signed documents with a trading partner, each of you must obtain the other's public key. You do this after you have created your company profile. Each of you generates a self-signed certificate or obtains one from a certificate authority (CA). Either way, the process creates a public-private key pair for your company profile. The private half of this key pair always remains on your computer. The public half is exported to a file and distributed to your trading partners on diskette by a secure means.

The following describes how to exchange profiles and certificates with your WebLogic Integration trading partners. In all cases, it is recommended that you confirm the certificate fingerprint with your trading partner before exchanging documents.

Exchanging Certificate Information with WebLogic Integration Trading Partners

If you are using the Bundled HTTPS transport to exchange messages with a WebLogic Integration trading partner, the certificate information is exchanged as follows:

When you update the certificate associated with your company profile, it is important to coordinate the update process with your trading partners. For guidelines, see When to Get Certificates.

 


Self-Signed or CA Certificates

You and your trading partners should decide whether to use WebLogic Integration - Business Connect self-signed X.509 certificates or X.509 certificates from a third-party certificate authority (CA).

Consider the following in deciding whether to generate a self-signed certificate or obtain one from a CA:

 


When to Get Certificates

You can generate or obtain new certificates when:

Also, by using the Certificates information viewer, you can make sure you and your trading partners keep your certificates current.

Note: WebLogic Integration - Business Connect notifies you when an active certificate associated with an active company profile is about to expire. See Preferences General Tab.

The procedure used depends on whether you are generating or loading a certificate for your company profile, or importing certificate information for one of your partners. See Setting Up Certificates for a Company Profile or Importing Certificates for Partners.

When you generate or load a new certificate for your company profile, you must export the certificate information (your public key) to a file for distribution to your partners. See Exporting Your Certificate for Backup or Distribution.

When you generate a new certificate for your company profile because it has expired, become defective or corrupted, or cannot be used for any other reason, we recommend that you distribute it to your trading partners on diskette by a secure means. Recommended secure means include in-person, U.S. mail or private delivery service.

When you generate or load a new certificate for your company profile, you can choose to have WebLogic Integration - Business Connect activate the certificate, or save the certificate in Pending status until a later date. To avoid rejection of documents it is important that you coordinate the process of distributing and activating a replacement certificate. The following topics provide guidelines:

Replacing a Certificate for Non HTTPS Encryption

When you update a non-HTTPS certificate for your company profile (that is, one used to encrypt documents exchanged), you must carefully coordinate the timing of the update with your partners. If possible, you should perform such updates when your server is not processing outbound documents. By observing this precaution you can avoid documents being rejected by your trading partners.

If you create and activate a new certificate while WebLogic Integration - Business Connect is encrypting and signing outbound documents, documents that are signed by the private key associated with the new certificate will be rejected by your trading partners, if they have not yet received and activated the new certificate.

The update process for a non-HTTPS certificate does not affect inbound documents because your WebLogic Integration - Business Connect can decrypt and verify them with the last valid certificate.

Replacing a Certificate for Bundled HTTPS with Authentication

If you have enabled the bundled HTTPS inbound transport, with the authenticate check box selected, you should exercise care when you create and distribute a new certificate. We recommend that you:

It is important to coordinate the update with each partner ahead of time so they avoid sending you any documents until the new certificate has been activated on their system. The reason you must exercise this care is that your bundled HTTPS server can use only the active certificate to authenticate the SSL connection. Likewise, each partner must also hold your current certificate to authenticate the connection with you.

To minimize the number of errors during the process of certificate update, you and your partners should activate the new certificate nearly simultaneously, at a pre-designated time when traffic is at a minimum.

If you implement a new certificate while you are trading documents, your trading partners will not be able to establish the SSL connection required to communicate with you. During this time, your trading partners receive alerts stating that their system cannot connect with you. This situation clears itself up after your partners receive and begin using your new certificate to authenticate the SSL connection.

 


Certificates Information Viewer

The Certificates information viewer in Administrator enables you to manage certificates for your company and partner profiles. Open the viewer by selecting Certificates on the Administrator bar. To expand or collapse the certificate tree, click the plus or minus signs.

Using the viewer you can:

Displaying retired certificates is optional on the Certificates information viewer. To list retired certificates on the viewer, select View—>Retired Certificates. For more information about retired certificates, see Deleting Certificates, Retiring a Certificate or Un-Retiring a Certificate.

 


Certificate Window

Use the Certificate window to view information about a certificate for a company or partner profile. You also can export a certificate to a file.

To open the window, display the Certificates information viewer. Select the certificate you want and double-click it or click Open.

When you finish viewing the certificate information, click Close. To export the certificate, click Export to display the Export Certificate window. See Exporting Your Certificate for Backup or Distribution.

Figure 7-3 Certificate Window for a Self-Signed Certificate

Certificate Window for a Self-Signed Certificate


 

Field Descriptions

The following describes the fields on the Certificate window The information displayed on the window is defined by the X.509 standard.

Version

The version of the X.509 standard that applies to the certificate.

Serial Number

The serial number uniquely identifies the certificate. The CA or entity that issued the certificate assigned this number. If the issuer revokes a certificate, it can place the serial number on a certificate revocation (CRL) list.

Issuer and Subject

The issuer is the X.500 distinguished name of the CA or entity that signed the certificate. In cases of a self-signed certificate, the issuer and subject are the same. Using the certificate implies trusting the signer.

The subject is the X.500 distinguished name of the entity whose public key the certificate identifies.

A distinguished name has the following parts:

C

Two-letter ISO country code. See ISO Country Codes.

L

City or locality name

O

Organization name

OU

Organizational unit.

CN

Common name of a person


 

Valid Not Before

The date the certificate became valid.

Valid Not After

The date the certificate expires, provided it is not compromised or revoked before that date.

Signature Algorithm

The algorithm the CA used to sign the certificate.

Key Usage

Identifies the purpose of the key in the certificate, such as encipherment, digital signature or certificate signing.

Public Key

An algorithm identifier that specifies the public key crypto system this key belongs to and any associated key parameters, such as key length.

Extension

Optional information present in version 3 certificates. Extensions can be key and policy information, certificate subject and issuer attributes, certificate path constraints, distribution points for certificate revocation lists (CRLs) and private extensions.

For a CA-issued certificate, the CRL distribution point information is present in the form of a URL. This is one place you can find a CA's distribution point for a CRL if you want to configure WebLogic Integration - Business Connect to use CRLs. See Using Certificate Revocation Lists. A self-signed certificate does not have CRL distribution point information.

Fingerprint

The fingerprints are a way to verify the source of a certificate. After you import or export a certificate, you should contact your partner and ensure that the fingerprints at both ends are identical. You should do this before you attempt to exchange documents. If the fingerprints do not match, one of the certificates might be corrupted or out of date.

 


Setting Up Certificates for a Company Profile

Use this procedure to create new, self-signed certificates for your company profile or to load a new, third-party certificate for your company profile.

If you want to use a certificate from a third-party CA such as VeriSign, you must obtain that certificate using your Internet browser and export it to a file before you begin this procedure. You must export the certificate to a file that contains the private key and the entire chain of trust. You will need the password used to export the file from your browser to load the certificate into WebLogic Integration - Business Connect.

This is not the procedure to use for importing a partner's certificate. See Importing Certificates for Partners.

Steps

  1. When you save a new company profile, the system prompts you to associate a certificate with the profile. Click Yes on the dialog box prompt to start the New Certificate wizard.
  2. If you want to associate a certificate with an existing company profile, click Certificates on the Administrator bar to display the Certificates information viewer. Select the company you want and click New to start the New Certificate wizard.

    Figure 7-4 New Certificate Wizard, Select Certificate Type Window

    New Certificate Wizard, Select Certificate Type Window


     
  3. Select the appropriate certificate option, as described in the following table.
  4. Table 7-2 Certificate Options 

    Option

    Description

    Generate self-signed certificates

    Click if you want WebLogic Integration - Business Connect to generate one self-signed certificate, for both signature and encryption, or two self-signed certificates, one for signature and one for encryption. Go to Generating Self-Signed Certificates.

    Acquire Entrust certificates

    Click if your organization has an Entrust Technologies server and administrator and plans to use Entrust certificates. Go to Importing Entrust Certificates.

    Acquire RSA Keon certificates

    Click if your organization has an RSA Keon server and plans to use RSA Keon certificates. Go to Importing RSA Keon Certificates.

    Acquire a VeriSign XKMS certificate

    Click to import a new VeriSign XML Key Management Specification (XKMS) certificate. Go to Importing VeriSign XKMS Certificates

    Import from PKCS #12 file (.pfx or .p12)

    Click if you want to use a third-party certificate. Go to Importing Third-Party CA Certificates.


     

Generating Self-Signed Certificates

Use this procedure if you selected generate self-signed certificates in step 2 of Setting Up Certificates for a Company Profile.

The following are the steps for generating and associating with a company profile either a single self-signed certificate for both encrypting and signing documents or two self-signed certificates, one for encrypting and one for signing.

Steps

  1. On the first New Certificate wizard window, click Next to display the New Certificate select key type window.
  2. Figure 7-5 New Certificate Wizard, Select Key Type Window

    New Certificate Wizard, Select Key Type Window


     
  3. Click single key if you want one certificate for both signing and encrypting documents. Click dual key if you want two certificates, one for signing documents and another for encrypting documents.
  4. Select one of the following encryption key lengths from the key length drop-down list.
  5. 512

    Standard encryption. For highly sensitive or valuable information, stronger encryption is recommended.

    1024

    Strong encryption.

    2048

    Very strong encryption.


     
  6. For the validity period, if you want other than the default value of 2 years, type the length of time you want the certificate to be valid in the validity period field. Select days, months or years from the drop-down list.
  7. Click Next to display the New Certificate summary window.
  8. Figure 7-6 New Certificate Wizard, Summary Window

    New Certificate Wizard, Summary Window


     
  9. Review the information in the window. Click Back to change any information or click Finish to generate the certificate.
  10. When you click Finish, a dialog box appears with a message that the certificates are being generated and might take a few minutes to complete.

    If there are no other certificates for this company profile, the new certificate is placed in Active status.

    If a certificate already exists for this company profile, a dialog box appears asking whether you want to activate the new certificate.

    Figure 7-7 Activate Certificate Dialog Box

    Activate Certificate Dialog Box


     

    When this message appears, click Yes or No as follows:

    Yes

    Places the new certificate in Active status and any earlier certificate in Valid status.

    No

    Places the new certificate in Pending status.


     

    After the certificate is generated, the Company Profile or Certificates information viewer reappears, depending on whether you imported a certificate for a new or existing company profile. The new certificate appears on the Certificates information viewer.

  11. Whether you are adding a certificate to new company profile, or replacing the certificate for an existing company profile, you must distribute the new certificate to partners on diskette or by some secure means. To export certificate information to a file for distribution, see Exporting Your Certificate for Backup or Distribution. For guidelines on coordinating the update of your certificate, see When to Get Certificates.

Note: Before you attempt to exchange encrypted and signed documents, you should contact each partner with whom you exchanged certificates and confirm that the fingerprints in both your certificates are identical. For more information see Certificate Window.

Importing Entrust Certificates

Use this procedure if you selected acquire Entrust certificates in step 2 of Setting Up Certificates for a Company Profile.

The following are the steps for importing a new Entrust certificate into WebLogic Integration - Business Connect or for updating an Entrust certificate that is already associated with a company profile. Before you can use this procedure, you must consult with your organization's Entrust administrator about the information required to connect with the Entrust/PKI server and import a new or updated certificate for your company profile.

WebLogic Integration - Business Connect fulfills a client role in supporting the certificate management tasks of an Entrust server. The prerequisites for this client-server relationship are your Entrust server and a person who is designated as your organization's Entrust administrator. Lacking these two requirements, your organization cannot use Entrust certificates in exchanging documents with your trading partners through WebLogic Integration - Business Connect.

WebLogic Integration - Business Connect enables an organization with an Entrust/PKI server to:

WebLogic Integration - Business Connect does not support Entrust certificate revocation or recovery.

WebLogic Integration - Business Connect supports Entrust versions 4 and 5.

The following describes the certificate-generation process involving WebLogic Integration - Business Connect and the Entrust server.

After WebLogic Integration - Business Connect creates the key pair for signing documents, the application hands the public key to the Entrust server. The Entrust server creates the signing certificate and passes the certificate to WebLogic Integration - Business Connect. The public key is within the certificate. WebLogic Integration - Business Connect retains the private signing key. The private signing key is not disclosed to the Entrust server; the private key remains secure within WebLogic Integration - Business Connect. This guarantees security integrity.

Meanwhile, the Entrust server creates the encryption key pair and creates an encryption certificate, which includes the public key. The Entrust server passes to WebLogic Integration - Business Connect the encryption key pair and the encryption certificate.

Steps

  1. On the first New Certificate wizard window, click Next to display the Entrust server information window.
  2. Figure 7-8 New Certificate Wizard, Entrust Server Information Window

    New Certificate Wizard, Entrust Server Information Window


     
  3. Consult with your Entrust administrator on whether to select CMP or SEP.
  4. Have your Entrust administrator provide the information for completing the host and port fields.
  5. Click whether you want to update or acquire certificates. For acquiring certificates, have your Entrust administrator provide the information for the reference and authorization fields.
  6. Click Next to display the New Certificate summary window.
  7. Figure 7-9 New Certificate Wizard, Summary Window

    New Certificate Wizard, Summary Window


     

    The window displays applicable summary information depending on the option you specified in step 4.

  8. Review the information in the window. Click Back to change any information or click Finish to acquire or update a certificate.
  9. If there are no other certificates for this company profile, the new certificate is placed in Active status.

    If a certificate already exists for this company profile, a dialog box appears asking whether you want to activate the new certificate.

    Figure 7-10 Activate Certificate Dialog Box

    Activate Certificate Dialog Box


     

    When this message appears, click Yes or No as follows:

    Yes

    Places the new certificate in Active status and any earlier certificate in Valid status.

    No

    Places the new certificate in Pending status.


     

    After the certificate is generated, the Company Profile or Certificates information viewer reappears, depending on whether you imported a certificate for a new or existing company profile. The new certificate appears on the Certificates information viewer.

  10. Whether you are adding a certificate to new company profile, or replacing the certificate for an existing company profile, you must distribute the new certificate to partners on diskette or by some secure means. To export certificate information to a file for distribution, see Exporting Your Certificate for Backup or Distribution. For guidelines on coordinating the update of your certificate, see When to Get Certificates.

Note: Before you attempt to exchange encrypted and signed documents, you should contact each partner with whom you exchanged certificates and confirm that the fingerprints in both your certificates are identical. For more information see Certificate Window.

Importing RSA Keon Certificates

Use this procedure if you selected acquire an RSA Keon certificate in step 2. of Setting Up Certificates for a Company Profile.

The following are the steps for importing an RSA Keon certificate into WebLogic Integration - Business Connect and associating it with a company profile. Before you can use this procedure, you must consult with your organization's RSA Keon Certificate Authority administrator about the information required to connect with the Certificate Management Protocol (CMP) server and import a certificate for your company profile.

The CMP server must be running for WebLogic Integration - Business Connect to acquire a certificate. Further, the RSA Keon Certificate Authority system must be configured for automatic vetting of CMP requests. For details see the certificate enrollment protocols chapter in the RSA Keon Certificate Authority user documentation.

In this process WebLogic Integration - Business Connect generates the private-public key pair. The RSA Keon Certificate Authority system creates the certificate and certifies your organization as the owner of the public key.

Steps

  1. On the first New Certificate wizard window, click Next to display the RSA Keon certificate window.
  2. Figure 7-11 New Certificate Wizard, RSA Keon Certificate Window

    New Certificate Wizard, RSA Keon Certificate Window


     
  3. Using the information provided to you, complete the fields for importing the certificate. Type this information in the host, port, key ID and shared secret fields.
  4. Click Next to display the New Certificate summary window.
  5. Figure 7-12 New Certificate Wizard, Summary Window

    New Certificate Wizard, Summary Window


     
  6. Review the information in the window. Click Back to change any information or click Finish to import the certificate.
  7. If there are no other certificates for this company profile, the new certificate is placed in Active status.

    If a certificate already exists for this company profile, a dialog box appears asking whether you want to activate the new certificate.

    Figure 7-13 Activate Certificate Dialog Box

    Activate Certificate Dialog Box


     

    When this message appears, click Yes or No as follows:

    Yes

    Places the new certificate in Active status and any earlier certificate in Valid status.

    No

    Places the new certificate in Pending status.


     

    After the certificate is generated, the Company Profile or Certificates information viewer reappears, depending on whether you imported a certificate for a new or existing company profile. The new certificate appears on the Certificates information viewer.

  8. Whether you are adding a certificate to new company profile, or replacing the certificate for an existing company profile, you must distribute the new certificate to partners on diskette or by some secure means. To export certificate information to a file for distribution, see Exporting Your Certificate for Backup or Distribution. For guidelines on coordinating the update of your certificate, see When to Get Certificates.

Note: Before you attempt to exchange encrypted and signed documents, you should contact each partner with whom you exchanged certificates and confirm that the fingerprints in both your certificates are identical. For more information see Certificate Window.

Importing VeriSign XKMS Certificates

Use this procedure if you selected acquire a VeriSign XKMS certificate in step 2 of Setting Up Certificates for a Company Profile.

The following are the steps for importing a new XML Key Management Specification (XKMS) certificate into WebLogic Integration - Business Connect and associating it with a company profile. Before you can use this procedure, you must register for a new XKMS certificate from VeriSign. When the new certificate is ready, you will receive an e-mail containing the information needed to connect to a server and import the certificate for your company profile.

XKMS was designed in an effort to combine the interoperability afforded by Extensible Markup Language (XML) in business-to-business electronic commerce with secure and easy to use public key infrastructure (PKI). For information about XKMS see http://www.xmltrustcenter.org.

Steps

  1. On the first New Certificate wizard window, click Next to display the VeriSign XKMS certificate window.
  2. Figure 7-14 New Certificate Wizard, VeriSign XKMS Certificate Window

    New Certificate Wizard, VeriSign XKMS Certificate Window


     
  3. Using the information provided to you, complete the fields for importing the certificate. Type this information in the URL, key name and shared secret fields. In the password field, type a password that you can remember. You will need this password if you later ask VeriSign to revoke the certificate.
  4. Click Next to display the New Certificate summary window.
  5. Figure 7-15 New Certificate Wizard, Summary Window

    New Certificate Wizard, Summary Window


     
  6. Review the information in the window. Click Back to change any information or click Finish to import the certificate.
  7. If there are no other certificates for this company profile, the new certificate is placed in Active status.

    If a certificate already exists for this company profile, a dialog box appears asking whether you want to activate the new certificate.

    Figure 7-16 Activate Certificate Dialog Box

    Activate Certificate Dialog Box


     

    When this message appears, click Yes or No as follows:

    Yes

    Places the new certificate in Active status and any earlier certificate in Valid status.

    No

    Places the new certificate in Pending status.


     

    After the certificate is generated, the Company Profile or Certificates information viewer reappears, depending on whether you imported a certificate for a new or existing company profile. The new certificate appears on the Certificates information viewer.

  8. Whether you are adding a certificate to new company profile, or replacing the certificate for an existing company profile, you must distribute the new certificate to partners on diskette or by some secure means. To export certificate information to a file for distribution, see Exporting Your Certificate for Backup or Distribution. For guidelines on coordinating the update of your certificate, see When to Get Certificates.

Note: Before you attempt to exchange encrypted and signed documents, you should contact each partner with whom you exchanged certificates and confirm that the fingerprints in both your certificates are identical. For more information see Certificate Window.

Importing Third-Party CA Certificates

Use this procedure if you selected to import from PKCS #12 file in step 2 of Setting Up Certificates for a Company Profile.

The following are the steps for importing a third-party CA certificate into WebLogic Integration - Business Connect and associating it with a company profile. Such a certificate file contains both the public and private keys. Before you can use this procedure, you must perform the following tasks:

If WebLogic Integration - Business Connect cannot import a P12 certificate file, import the file in Internet Explorer, making sure to mark the private key as exportable when you do so. When you have imported the certificate, view the certification path to verify that the entire path is present. Export the certificate with the private key and include all certificates in the certification path. Then try again to import the P12 file in WebLogic Integration - Business Connect.

Steps

  1. On the first New Certificate wizard window, click Next to display the New Certificate third-party certificate window.
  2. Figure 7-17 New Certificate Wizard, Third-Party Certificate Window

    New Certificate Wizard, Third-Party Certificate Window


     
  3. To locate the PKCS#12 file containing your certificate, click Browse to display the Browse dialog box.
  4. Locate and select the certificate file. The file must have an extension of .pfx or .p12. Click Open and the New Certificate third-party certificate window reappears.
  5. Type the same password you used when you exported the certificate file from a browser or mail client.
  6. Click Next to display the New Certificate summary window.
  7. Figure 7-18 New Certificate Wizard, Summary Window

    New Certificate Wizard, Summary Window


     
  8. Review the certificate information in the window. Click Back to change any information or click Finish to import the certificate.
  9. If there are no other certificates for this company profile, the new certificate is placed in Active status.

    If a certificate already exists for this company profile, a dialog box appears asking whether you want to activate the new certificate.

    Figure 7-19 Activate Certificate Dialog Box

    Activate Certificate Dialog Box


     

    When this message appears, click Yes or No as follows:

    Yes

    Places the new certificate in Active status and any earlier certificate in Valid status.

    No

    Places the new certificate in Pending status.


     

    After the certificate is generated, the Company Profile or Certificates information viewer reappears, depending on whether you imported a certificate for a new or existing company profile. The new certificate appears on the Certificates information viewer.

  10. Whether you are adding a certificate to new company profile, or replacing the certificate for an existing company profile, you must distribute the new certificate to partners on diskette or by some secure means. To export certificate information to a file for distribution, see Exporting Your Certificate for Backup or Distribution. For guidelines on coordinating the update of your certificate, see When to Get Certificates.

Note: Before you attempt to exchange encrypted and signed documents, you should contact each partner with whom you exchanged certificates and confirm that the fingerprints in both your certificates are identical. For more information see Certificate Window.

 


Importing Certificates for Partners

Use this procedure to import a partner's certificate and associate it with a partner profile.

A partner's certificate is included in the partner profile you import from your WebLogic Integration partner. When you import the partner profile, the certificate appears in the Certificates information viewer.

However, you must manually import certificates for partners if the certificate information is not included in the partner profile. Moreover, partners sometime send you new certificates. Partners send replacement certificates as a matter of routine change of encryption keys or before certificates expire. They also might send replacement certificates because of suspected or actual compromise, corruption or loss of an encryption key.

If your partner wants to send you a certificate outside of their partner profile, advise the partner to export the certificate to a PKCS#7 file (.p7c) and include all certificates in the certification path, if possible.

Note: WebLogic Integration - Business Connect automatically places any existing partner certificate in Valid status when it imports a new one. The new certificate is automatically set to Active status.

Steps

  1. Make sure you can access on your system the replacement certificate file that your partner sent you.
  2. From the Certificates information viewer, select the partner you want and select File—>Import to open the Import Certificate window.
  3. Figure 7-20 Import Certificate Window

    Import Certificate Window


     
  4. Click Browse to open the Browse dialog box.
  5. Figure 7-21 Browse Dialog Box

    Browse Dialog Box


     
  6. Select the certificate file you want to import and click Open to redisplay the Import Certificate window.
  7. Click Next to display the Import Certificate summary window.
  8. Figure 7-22 Import Certificate Summary Window

    Import Certificate Summary Window


     
  9. Review the certificate information in the window. Click Back to change any information or click Finish to import the certificate. When you click Finish a dialog box appears with the message that the active certificate already associated with the profile will be set to valid so the new certificate can be set to active.
  10. Click OK. The Certificates information viewer is redisplayed with the new certificate you imported. The certificate you just imported has a status of active. The replaced certificate has a status of valid.
  11. If the partner uses a trading engine other than WebLogic Integration - Business Connect and sent you a self-signed certificate, select Tools—>Certificates > Trusted Roots and trust the imported certificate.

Note: Before you attempt to exchange encrypted and signed documents, contact the partner and confirm that the fingerprints in the certificate you imported are identical to the partner's. For more information see Certificate Window.

 


Exporting Your Certificate for Backup or Distribution

Use this procedure to export a certificate to a file.

When exporting your certificate for distribution to your partners, only export your public key. Never give your partner a certificate that contains your private key.

When exporting your certificate for backup purposes, you can export a certificate that contains your private key. If you do so, keep this certificate in a secure place and never give it to anyone.

After you export a certificate with a public key for distribution to your trading partners, you can send the file to your trading partners by e-mail or on diskette. This is one way to save a certificate to a file. For another way to export a certificate see Viewing Certificate Information.

Steps

  1. On the Certificates information viewer, select the certificate you want to export and select File—>Export to open the Export Certificate selection window.
  2. Figure 7-23 Export Certificate Selection Window

    Export Certificate Selection Window


     
  3. Select an export option. If you are exporting a certificate for use by a trading partner, note that the DER and PKCS#7 options are functionally the same. However, the one to select depends primarily on what your partner's trading engine supports.
  4. For trading between partners who both use WebLogic Integration - Business Connect, we recommend selecting PKCS#7 and the check box for include all certificates in the certification path. Although this is the most all-inclusive choice, you can nevertheless choose DER instead with no adverse effects.

    The following table explains the options in more detail. If you trade with partners who use a trading engine other than WebLogic Integration - Business Connect, we recommend that you determine whether their software supports DER, PKCS#7 or both.

    Table 7-3 Export Options 

    Export option

    Description

    DER encoded binary X.509 (.cer)

    Select this option to export a binary file with an extension of cer. The file contains a single binary certificate containing a public key.

    Note: If you are exporting a certificate for distribution to a WebLogic Integration trading partner, you must select this option.

    PKCS #7 (.p7c)

    Select this option to export a file with an extension of p7c. The file can contain all the certificates needed to support trading, if more than one is required.

    Include all certificates in the certification path if possible

    If you select PKCS #7 (.p7c), select this option to include all certificates in the chain of trust for the certificate. This is the most all-inclusive method for exporting a certificate. However, be aware that your partner's software, if not WebLogic Integration - Business Connect, might not support the entire certificate path in the p7c file.

    PKCS #12 (.p12, .pfx)

    Select this option to export a certificate containing your private key. You should do this only if you can keep the certificate in a highly secure place.

    This option is only available for exporting one of your certificates and not one of your partner's certificates. Your partner would not send you a certificate that contains a private key.


     
  5. Click Next to display the Export Certificate file name and path window.
  6. Figure 7-24 Export Certificate File Name and Path Window

    Export Certificate File Name and Path Window


     
  7. Review the file name and path for the file you are exporting. If you want to change the path or name, type your changes or click Browse to open a Browse window.
  8. Click Next to display the Export Certificate summary window.
  9. Figure 7-25 Export Certificate Summary Window

    Export Certificate Summary Window


     
  10. Review the certificate information in the window. Click Back to change any information or click Finish to export the certificate. When you click Finish a dialog box appears with the message that the export succeeded. Click OK.
  11. If you exported the certificate for a partner, send the certificate file to the partner by a secure means.

 


Deleting Certificates

Use this procedure to retire certificates that you or your partners no longer use for verifying signatures or encrypting messages.

Retiring a certificate is a pseudo-deleting process. A retired certificate does not appear on the Certificates information viewer if View—>Retired Certificates is turned off. A retired certificate remains in the system as a dormant entity that can be reactivated if need be. Allowing a certificate to be retired but not deleted is a safeguard for the future in the event a signature must be re-validated or a secure message decrypted again.

This is one way to retire certificates. You also can use the Certificate Profile window for a selected company or partner profile. See Retiring a Certificate.

For the steps to reactivate a certificate, see Un-Retiring a Certificate.

You can view a details window for retired certificates after you have withdrawn them.

Steps

  1. At the Certificates information viewer, select the certificate you want to retire and click Delete. A dialog box appears with a message asking whether you want to retire the certificate.
  2. Click Yes to retire the certificate or No to cancel the operation.
  3. If you click Yes, the certificate no longer appears on the Certificates information viewer if View—>Retired Certificates is turned off. Otherwise, the certificate's status changes to retired on the viewer.

  4. If you want to verify that the certificate has been retired, select the profile associated with the retired certificate and click Open to open the Certificate Profile window. Select the Retired Certificates tab. The certificate you retired appears on the tab. To view details of the retired certificate, click View Certificate.

 


Certificate Profile Window

The Certificate Profile window can be opened from the Certificates information viewer. You can use the Certificate Profile window to manage the certificates associated with company and partner profiles. The following topics are provided for using the window.

To open the window from the Certificates information viewer, select the name of the company or partner with the certificates you want and click Open.

The window has two tabs: Available Certificates and Retired Certificates.

Figure 7-26 Certificate Profile Window, Available Certificates Tab

Certificate Profile Window, Available Certificates Tab


 

Figure 7-27 Certificate Profile Window, Retired Certificates Tab

Certificate Profile Window, Retired Certificates Tab


 

Viewing Certificate Information

Use this procedure to view information about a certificate for a company or partner profile. You also can export a certificate to a file.

This procedure uses the Certificate window, which is the same one described in Certificate Window, but here you access the window through the Certificate Profile window. See Certificate Profile Window for details about the window.

Steps

  1. At the Certificates information viewer, select the name of the company or partner with the certificates you want. Click Open to open the Certificate Profile window with the Available Certificates tab selected.
  2. Select the certificate you want to view and click View Certificate to open the Certificate window.
  3. Figure 7-28 Certificate Window for a Self-Signed Certificate

    Certificate Window for a Self-Signed Certificate


     

    See Certificate Window for a description of the fields.

    If you want to export the certificate, click Export. See Exporting Your Certificate for Backup or Distribution.

  4. When you finish viewing the certificate information, click Close to return to the Certificate Profile window.

Viewing the Certificate Path

Use this procedure to view information about a certificate's chain of trust. You also can export a certificate or its trusted roots to a file.

This procedure uses the Certificate Profile window. See Certificate Profile Window for details about the window.

A chain of trust or certificate chain is an ordered list of certificates that includes the certificate of the end-user and certificates of the issuing CA. A trusted root is a public key that is verified as belonging to an issuing CA, which is called a trusted third party.

Steps

  1. At the Certificates information viewer, select the name of the company or partner with the certificates you want. Click Open to open the Certificate Profile window with the Available Certificates tab selected.
  2. Select the certificate you want to view and click View Cert Path to open the View Complete Certificate Path window.
  3. Figure 7-29 View Complete Certificate Path Window

    View Complete Certificate Path Window


     
  4. To view details about a certificate in the chain, select the certificate and click View to open the Certificate window. See Certificate Window for a description of the fields.
  5. To export a certificate in the chain, click Export on the Certificate window to display the Export Certificate window. You have the option to export a certificate file with an extension of .cer or .p7c. For procedure see Exporting Your Certificate for Backup or Distribution.
  6. Click Close to return to the Certificate Profile window.

Activating a Pending or Valid Certificate

Use this procedure to change the status of pending or valid certificates to active. A profile can have many certificates, but only one active certificate at a time. The active certificate is the one used for document trading.

This procedure uses the Certificate Profile window. See Certificate Profile Window for details about the window.

Steps

  1. At the Certificates information viewer, select the name of the company or partner with the certificates you want. Click Open to open the Certificate Profile window with the Available Certificates tab selected.
  2. Select the certificate with the pending or valid status that you want to set as the active certificate and click Set As Active. A dialog box appears asking you to confirm that you want to activate the certificate.
  3. Click Yes to activate the certificate or No to cancel the activation. If you click Yes, the Available Certificates tab shows the status of the certificate as active. If there was an existing active certificate, its status is changed to valid.
  4. Note: WebLogic Integration - Business Connect does not automatically distribute the certificate to your trading partners. You must use some method to distribute the certificate.

Retiring a Certificate

Use this procedure to retire a certificate. This procedure uses the Certificate Profile window and is one way to retire or delete a certificate. For details about inactivating certificates see Deleting Certificates.

For the steps to reactivate a certificate, see Un-Retiring a Certificate.

See Certificate Profile Window for details about the window.

  1. At the Certificates information viewer, select the name of the company or partner with the certificates you want. Click Open to open the Certificate Profile window with the Available Certificates tab selected.
  2. Select the certificate to retire and click Retire.
  3. Click Yes to confirm you want to retire the certificate.

Un-Retiring a Certificate

Use this procedure to change the status of a retired certificate to valid or active.

As explained in Deleting Certificates, certificates you have retired from use are maintained in the system in a dormant state in the event they are needed again. When you un-retire a certificate, its status changes to valid and it appears once more on the Certificates information viewer if View—>Retired Certificates is turned off. After changing the status to valid, you can make the certificate active if you want.

This procedure uses the Certificate Profile window. See Certificate Profile Window for details about the window.

Steps

  1. At the Certificates information viewer, select the name of the company or partner with the certificates you want. Click Open to open the Certificate Profile window with the Available Certificates tab selected.
  2. Select the Retired Certificates tab to view a list of the retired certificates, if any, associated with the profile.
  3. Select the certificate you want to bring out of retirement and click Un-retire. A dialog box opens with a message asking whether you want to bring the certificate out of retirement.
  4. Click Yes to un-retire the certificate or No to cancel the operation.
  5. If you click Yes, the certificate disappears from the Retired Certificates tab. The certificate status changes from retired to valid. The certificate now appears on the Available Certificates tab and the Certificates information viewer.

  6. To change the status of the un-retired certificate from valid to active, see Activating a Pending or Valid Certificate.

 


Trusted Roots

Trusted roots are the foundation upon which chains of trust are built in certificates. Underlying a certificate issued by a certificate authority is a root, self-signed certificate. In WebLogic Integration - Business Connect trusting a CA root means you trust all certificates issued by that CA. Conversely, if you elect not to trust a CA root, WebLogic Integration - Business Connect will not trust any certificates issued by that CA. Document trading fails in WebLogic Integration - Business Connect when a non-trusted certificate is used.

The self-signed certificates you can generate in WebLogic Integration - Business Connect are root certificates. This is because you are, in effect, your own CA when you generate a self-signed certificate.

WebLogic Integration - Business Connect by default trusts your and your partners' self-signed certificates that were generated by WebLogic Integration - Business Connect. WebLogic Integration - Business Connect also by default trusts the roots of many CA-issued certificates. You can, however, specify whether WebLogic Integration - Business Connect should not trust all or some certificates issued by a specific CA. You also can explicitly not trust a partner's self-signed certificate.

The Trusted Roots window displays trusted roots for various certificate authorities. It also displays the self-signed certificates of your partners and the certificates used by the WebLogic Integration - Business Connect SOAP-RPC HTTPS server and API HTTPS server (see Application Security).

Importing a trusted root is a task that rarely, if ever, must be performed. You might have to import a trusted root if, for example, your partner sends you a CA-issued certificate and your system does not have the trusted root for it. In such a case, document trading would fail. As a solution, you would need to import the root underlying the certificate and trust it.

WebLogic Integration - Business Connect can import trusted roots contained in files with the following extensions: .cer, .p7c and .p7b. There are various ways you can obtain such trusted root files:

When you import a trusted root for a certificate to WebLogic Integration - Business Connect, we recommend that you compare the MD5 fingerprints in both the trusted root and the certificate to verify that they match.

 


Viewing, Editing or Importing Trusted Roots

Use this procedure to specify whether to trust roots, view root details or import trusted roots. For details about trusted roots, see Trusted Roots.

Steps

  1. In Administrator select Tools—>Certificates—>Trusted Roots to open the Trusted Roots window. The window displays a list of CA roots and self-signed certificates your partners have sent you.
  2. Self-signed certificates that you have generated in WebLogic Integration - Business Connect for document trading do not display on the window. This is because you must trust your own self-signed certificates created for document trading; you cannot elect not to trust them. However, the self-signed certificates for the SOAP-RPC HTTPS server and API HTTPS server are listed on the window and are trusted by default. See Certificate Tool (certloader).

    Figure 7-30 Trusted Roots Window

    Trusted Roots Window


     
  3. Check or clear the trust check boxes to indicate whether to trust certain CA roots or self-signed certificates.
  4. There are multiple lines for each CA because each has multiple roots, each with unique fingerprints under which it issues certificates.

  5. To view the fingerprints, select a root and click View to open the Certificate window. By comparing fingerprints you can choose to trust or not trust some but not all of a CA's certificates. See Certificate Window for a description of the fields on the window.
  6. To import a trusted root, click Import on the Trusted Roots window to open the Import Certificate dialog box. Select the certificate file to import and click Open. You can import a file with an extension of .cer, .p7c or .p7b.
  7. Click OK to save your changes and close the Trusted Roots window or Cancel to cancel the operation and close the window.

 


Using Certificate Revocation Lists

Use this procedure to configure WebLogic Integration - Business Connect to compare your partners' certificates against lists of invalid certificates that are maintained by the issuing certificate authorities.

A ertificate revocation list (CRL) is a list of third-party certificates that are no longer valid. Certificate authorities maintain such lists of certificates they issued, but later invalidated for one reason or another. CRLs are accessible on the Internet, and you need an Internet connection for WebLogic Integration - Business Connect to use them.

WebLogic Integration - Business Connect enables you to check your partners' certificates against CRLs. When you direct WebLogic Integration - Business Connect to use CRLs, your partners' certificates are checked each time documents are exchanged. For example, when a partner sends you an encrypted document, WebLogic Integration - Business Connect checks the certificate associated with the inbound document against the CRL. If the certificate is on the CRL, WebLogic Integration - Business Connect rejects the inbound document.

Although using CRLs can enhance security, the checking process can result in longer processing times. Consequently, your decision whether to use CRLs should weigh the security advantage against the performance handicap.

You can configure WebLogic Integration - Business Connect to check certificates against the CRLs of one or more certificate authorities. However, WebLogic Integration - Business Connect checks a specific certificate only against the appropriate CRL. For example, if you configure WebLogic Integration - Business Connect to use CRLs maintained by VeriSign, Inc. and GlobalSign and an inbound document is associated with a VeriSign certificate, the system checks only against the VeriSign CRL and not the GlobalSign CRL.

You are responsible for obtaining from the certificate authority the information required for accessing the CRL. WebLogic Integration - Business Connect downloads the latest CRL in performing certificate checks. It also downloads updates of the CRL, based on the update interval in the previously downloaded CRL.

Steps

  1. In Administrator, select Tools—>Certificates—>Cert. Revocation List to open the Certificate Revocation List window. Go to one of the following:

Adding CRLs

Do the following on the Certificate Revocation List window to configure WebLogic Integration - Business Connect to use one or more CRLs.

  1. Select the Use CRLs check box.
  2. Obtain the information required to access the CA's CRL. This includes the CRL distribution point, the host name, port number and the TCP/IP protocol. Type the CRL access information in the appropriate fields.
  3. The protocols are hypertext transfer protocol (HTTP) and lightweight directory access protocol (LDAP). For example, VeriSign CRLs are accessed via HTTP and Entrust CRLs are accessed via LDAP.

    You can obtain the CRL information by viewing the details of a CA-issued certificate. See Certificate Window. The information, if present, is in the extensions section and is labeled as CRL distribution point.

    As an example, the following is the CRL distribution point within a VeriSign certificate. This is a URL as follows:

    http://crl.verisign.com/class1.crl

    This URL corresponds to the fields on the Certificate Revocation List window as described in the following table.

    Table 7-4 URL Components

    http:

    Select http from the protocol drop-down list.

    [port number]

    When a port number does not follow http:, the port number is 80 for HTTP only. Type 80 in the port field. If the port is other than 80, the URL will specify the port number.

    crl.verisign.com

    This is the value for the host field.

    class1.crl

    This is the value for the distribution point field.


     
  4. Click Add to add to the CRL and display it on the window. By default the Update check box next to the new CRL is selected. The Update check box must be selected for WebLogic Integration - Business Connect to initially download and subsequently perform update downloads of the CRL.
  5. Repeat the previous steps to add another CRL.
  6. Click OK to complete the configuration.
  7. After you add one or more CRLs and if the Server application is running, the system downloads the CRLs into the crls directory under the WebLogic Integration - Business Connect installation directory. There might be a delay of up to one hour before Server downloads a CRL the first time. This is because the application polls for new CRLs once an hour.

    Each CRL contains a refresh date that indicates when the CA updates the list. WebLogic Integration - Business Connect downloads the updated CRL after each refresh date, provided the Update check box next to the CRL is selected.

    The Update check boxes next to the CRLs tell WebLogic Integration - Business Connect whether to monitor the refresh dates within the CRLs and download updated CRLs from CAs at the appropriate times. When the Update check boxes are selected, WebLogic Integration - Business Connect downloads the latest available CRLs.

Deleting CRLs

Do the following on the Certificate Revocation List window to delete CRLs.

  1. Make sure the Use CRLs check box is selected.
  2. Select the CRL you want to delete and click Delete. Repeat to delete another CRL.
  3. Click OK for the deletions to become effective.

Turning CRL Checking On and Off

Do the following on the Certificate Revocation List window to turn CRL checking on and off.

  1. If you want WebLogic Integration - Business Connect to check your partners' certificates against CRLs, select the Use CRLs check box. If you want to turn off CRL checking, clear the Use CRLs check box.
  2. The Use CRLs check box controls whether all CRL checking is turned on or off. You cannot turn on or off checking for a particular CRL by selecting or clearing the Update check box next to a CRL.

  3. Click OK for the selection to become effective.

 

Skip navigation bar  Back to Top Previous Next