1/46
Contents
List of Figures
List of Tables
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
What's New in This Guide?
New and Changed Features for Oracle Fusion Middleware 11
g
Release 1 (11.1.1.8)
Part I Understanding Oracle Fusion Middleware
1
Introduction to Oracle Fusion Middleware
1.1
What Is Oracle Fusion Middleware?
1.2
Oracle Fusion Middleware Components
2
Understanding Oracle Fusion Middleware Concepts
2.1
Understanding Key Oracle Fusion Middleware Concepts
2.2
What Is an Oracle WebLogic Server Domain?
2.2.1
What Is the Administration Server?
2.2.2
Understanding Managed Servers and Managed Server Clusters
2.2.3
What Is Node Manager?
2.3
What Is an Oracle Instance?
2.4
What Is a Middleware Home?
2.5
What Is a WebLogic Server Home?
2.6
What Is an Oracle Home and the Oracle Common Home?
2.7
What Is the Oracle Metadata Services Repository?
Part II Basic Administration
3
Getting Started Managing Oracle Fusion Middleware
3.1
Setting Up Environment Variables
3.2
Overview of Oracle Fusion Middleware Administration Tools
3.3
Getting Started Using Oracle Enterprise Manager Fusion Middleware Control
3.3.1
Displaying Fusion Middleware Control
3.3.2
Using Fusion Middleware Control Help
3.3.3
Navigating Within Fusion Middleware Control
3.3.4
Understanding Users and Roles for Fusion Middleware Control
3.3.5
Viewing and Managing the Farm
3.3.6
Viewing and Managing Components
3.3.7
Viewing the Status of Applications
3.4
Getting Started Using Oracle WebLogic Server Administration Console
3.4.1
Displaying the Oracle WebLogic Server Administration Console
3.4.2
Locking the WebLogic Server Configuration
3.5
Getting Started Using Command-Line Tools
3.5.1
Getting Started Using the Oracle WebLogic Scripting Tool (WLST)
3.5.1.1
Using Custom WLST Commands
3.5.1.2
Using WLST Commands for System Components
3.5.2
Getting Started Using Oracle Process Manager and Notification Server
3.6
Getting Started Using the Fusion Middleware Control MBean Browsers
3.6.1
Using the System MBean Browser
3.6.2
Using the MBeans for a Selected Application
3.7
Managing Components
3.8
Changing the Administrative User Password
3.8.1
Changing the Administrative User Password Using the Command Line
3.8.2
Changing the Administrative User Password Using the Administration Console
3.9
Basic Tasks for Configuring and Managing Oracle Fusion Middleware
4
Starting and Stopping Oracle Fusion Middleware
4.1
Overview of Starting and Stopping Procedures
4.2
Starting and Stopping Oracle WebLogic Server Instances
4.2.1
Configuring Node Manager to Start Managed Servers
4.2.2
Starting and Stopping Administration Servers
4.2.3
Starting and Stopping Managed Servers
4.2.3.1
Starting and Stopping Managed Servers Using Fusion Middleware Control
4.2.3.2
Starting and Stopping Managed Servers Using WLST
4.2.4
Enabling Servers to Start Without Supplying Credentials
4.2.5
Setting Up an Oracle WebLogic Server as a Windows Service
4.3
Starting and Stopping Components
4.3.1
Starting and Stopping Components Using Fusion Middleware Control
4.3.2
Starting and Stopping Components Using the Command Line
4.4
Starting and Stopping Fusion Middleware Control
4.5
Starting and Stopping Oracle Management Agent
4.6
Starting and Stopping Applications
4.6.1
Starting and Stopping Java EE Applications Using Fusion Middleware Control
4.6.2
Starting and Stopping Java EE Applications Using WLST
4.7
Starting and Stopping Your Oracle Fusion Middleware Environment
4.7.1
Starting an Oracle Fusion Middleware Environment
4.7.2
Stopping an Oracle Fusion Middleware Environment
4.8
Starting and Stopping: Special Topics
4.8.1
Starting and Stopping in High Availability Environments
4.8.2
Forcing a Shutdown of Oracle Database
5
Managing Ports
5.1
About Managing Ports
5.2
Viewing Port Numbers
5.2.1
Viewing Port Numbers Using the Command Line
5.2.2
Viewing Port Numbers Using Fusion Middleware Control
5.3
Changing the Port Numbers Used by Oracle Fusion Middleware
5.3.1
Changing the Oracle WebLogic Server Listen Ports
5.3.1.1
Changing the Oracle WebLogic Server Listen Ports Using the Administration Console
5.3.1.2
Changing the Oracle WebLogic Server Listen Ports Using WLST
5.3.2
Changing the Oracle HTTP Server Listen Ports
5.3.2.1
Enabling Oracle HTTP Server to Run as Root for Ports Set to Less Than 1024 (UNIX Only)
5.3.2.2
Changing the Oracle HTTP Server Non-SSL Listen Port
5.3.2.3
Changing the Oracle HTTP Server SSL Listen Port
5.3.3
Changing Oracle Web Cache Ports
5.3.4
Changing OPMN Ports (ONS Local, Request, and Remote)
5.3.5
Changing Oracle Portal Ports
5.3.5.1
Changing the Oracle Portal Midtier Port
5.3.5.2
Changing the Oracle Web Cache Invalidation Port for Oracle Portal
5.3.5.3
Changing the Oracle Internet Directory Port for Oracle Portal
5.3.5.4
Changing the PPE Loopback Port
5.3.5.5
Changing Oracle Portal SQL*Net Listener Port
5.3.5.6
Restarting WLS_PORTAL Managed Server
5.3.6
Changing the Oracle Database Net Listener Port
5.3.6.1
Changing the KEY Value for an IPC Listener
Part III Secure Sockets Layer
6
Configuring SSL in Oracle Fusion Middleware
6.1
How SSL Works
6.1.1
What SSL Provides
6.1.2
About Private and Public Key Cryptography
6.1.3
Keystores and Wallets
6.1.4
How SSL Sessions Are Conducted
6.2
About SSL in Oracle Fusion Middleware
6.2.1
SSL in the Oracle Fusion Middleware Architecture
6.2.2
Keystores and Oracle Wallets
6.2.3
Authentication Modes
6.2.4
Tools for SSL Configuration
6.3
Configuring SSL for Configuration Tools
6.3.1
Oracle Enterprise Manager Fusion Middleware Control
6.3.2
Oracle WebLogic Server Administration Console
6.3.3
WLST Command-Line Tool
6.4
Configuring SSL for the Web Tier
6.4.1
Configuring Load Balancers
6.4.2
Enabling SSL for Oracle Web Cache Endpoints
6.4.2.1
Enable Inbound SSL for Oracle Web Cache Using Fusion Middleware Control
6.4.2.2
Enable Inbound SSL for Oracle Web Cache Using WLST
6.4.2.3
Enable Outbound SSL for Oracle Web Cache Using Fusion Middleware Control
6.4.2.4
Specify the Wallet for Outbound SSL from Oracle Web Cache Using WLST
6.4.3
Enabling SSL for Oracle HTTP Server Virtual Hosts
6.4.3.1
Enable SSL for Inbound Requests to Oracle HTTP Server Virtual Hosts Using Fusion Middleware Control
6.4.3.2
Enable SSL for Inbound Requests to Oracle HTTP Server Virtual Hosts Using WLST
6.4.3.3
Enable SSL for Outbound Requests from Oracle HTTP Server
6.5
Configuring SSL for the Middle Tier
6.5.1
Configuring SSL for Oracle WebLogic Server
6.5.1.1
Inbound SSL to Oracle WebLogic Server
6.5.1.2
Outbound SSL from Oracle WebLogic Server
6.5.1.2.1
Outbound SSL from Oracle Platform Security Services to LDAP
6.5.1.2.2
Outbound SSL from Oracle Platform Security Services to Oracle Database
6.5.1.2.3
Outbound SSL from LDAP Authenticator to LDAP
6.5.1.2.4
Outbound SSL to Database
6.5.2
Configuring SSL for Oracle SOA Suite
6.5.3
Configuring SSL for Oracle WebCenter Portal
6.5.4
Configuring SSL for Oracle Identity and Access Management
6.5.4.1
Configuring SSL for Oracle Directory Integration Platform
6.5.4.2
Configuring SSL for Oracle Identity Federation
6.5.4.3
Configuring SSL for Oracle Directory Services Manager
6.5.5
SSL-Enable Oracle Reports, Forms, Discoverer, and Portal
6.5.5.1
SSL for Oracle Reports
6.5.5.2
SSL for Oracle Forms
6.5.5.3
SSL for Oracle Discoverer
6.5.5.4
SSL for Oracle Portal
6.5.6
Client-Side SSL for Applications
6.6
Configuring SSL for the Data Tier
6.6.1
Enabling SSL on Oracle Internet Directory Listeners
6.6.1.1
Enable Inbound SSL on an Oracle Internet Directory Listener Using Fusion Middleware Control
6.6.1.2
Enabling Inbound SSL on an Oracle Internet Directory Listener Using WLST
6.6.1.3
Enabling Outbound SSL from Oracle Internet Directory to Oracle Database
6.6.2
Enabling SSL on Oracle Virtual Directory Listeners
6.6.2.1
Enable SSL for Oracle Virtual Directory Using Fusion Middleware Control
6.6.2.2
Enabling SSL on an Oracle Virtual Directory Listener Using WLST
6.6.3
Configuring SSL for the Database
6.6.3.1
SSL-Enable Oracle Database
6.6.3.2
SSL-Enable a Data Source
6.7
Advanced SSL Scenarios
6.7.1
Hardware Security Modules and Accelerators
6.7.2
CRL Integration with SSL
6.7.2.1
Configuring CRL Validation for a Component
6.7.2.2
Manage CRLs on the File System
6.7.2.3
Test a Component Configured for CRL Validation
6.7.3
Oracle Fusion Middleware FIPS 140-2 Settings
6.7.3.1
FIPS-Configurable Products
6.7.3.2
Setting the SSLFIPS_140 Parameter
6.7.3.3
Selecting Cipher Suites
6.7.3.4
Other Configuration Parameters
6.8
Best Practices for SSL
6.8.1
Best Practices for Administrators
6.8.2
Best Practices for Application Developers
6.9
WLST Reference for SSL
6.9.1
addCertificateRequest
6.9.1.1
Description
6.9.1.2
Syntax
6.9.1.3
Example
6.9.2
addSelfSignedCertificate
6.9.2.1
Description
6.9.2.2
Syntax
6.9.2.3
Example
6.9.3
changeKeyStorePassword
6.9.3.1
Description
6.9.3.2
Syntax
6.9.3.3
Example
6.9.4
changeWalletPassword
6.9.4.1
Description
6.9.4.2
Syntax
6.9.4.3
Example
6.9.5
configureSSL
6.9.5.1
Description
6.9.5.2
Syntax
6.9.5.3
Examples
6.9.6
createKeyStore
6.9.6.1
Description
6.9.6.2
Syntax
6.9.6.3
Example
6.9.7
createWallet
6.9.7.1
Description
6.9.7.2
Syntax
6.9.7.3
Examples
6.9.8
deleteKeyStore
6.9.8.1
Description
6.9.8.2
Syntax
6.9.8.3
Example
6.9.9
deleteWallet
6.9.9.1
Description
6.9.9.2
Syntax
6.9.9.3
Example
6.9.10
exportKeyStore
6.9.10.1
Description
6.9.10.2
Syntax
6.9.10.3
Example
6.9.11
exportKeyStoreObject
6.9.11.1
Description
6.9.11.2
Syntax
6.9.11.3
Examples
6.9.12
exportWallet
6.9.12.1
Description
6.9.12.2
Syntax
6.9.12.3
Examples
6.9.13
exportWalletObject
6.9.13.1
Description
6.9.13.2
Syntax
6.9.13.3
Examples
6.9.14
generateKey
6.9.14.1
Description
6.9.14.2
Syntax
6.9.14.3
Examples
6.9.15
getKeyStoreObject
6.9.15.1
Description
6.9.15.2
Syntax
6.9.15.3
Examples
6.9.16
getSSL
6.9.16.1
Description
6.9.16.2
Syntax
6.9.16.3
Example
6.9.17
getWalletObject
6.9.17.1
Description
6.9.17.2
Syntax
6.9.17.3
Examples
6.9.18
importKeyStore
6.9.18.1
Description
6.9.18.2
Syntax
6.9.18.3
Example
6.9.19
importKeyStoreObject
6.9.19.1
Description
6.9.19.2
Syntax
6.9.19.3
Examples
6.9.20
importWallet
6.9.20.1
Description
6.9.20.2
Syntax
6.9.20.3
Examples
6.9.21
importWalletObject
6.9.21.1
Description
6.9.21.2
Syntax
6.9.21.3
Examples
6.9.22
listKeyStoreObjects
6.9.22.1
Description
6.9.22.2
Syntax
6.9.22.3
Examples
6.9.23
listKeyStores
6.9.23.1
Description
6.9.23.2
Syntax
6.9.23.3
Example
6.9.24
listWalletObjects
6.9.24.1
Description
6.9.24.2
Syntax
6.9.24.3
Examples
6.9.25
listWallets
6.9.25.1
Description
6.9.25.2
Syntax
6.9.25.3
Example
6.9.26
removeKeyStoreObject
6.9.26.1
Description
6.9.26.2
Syntax
6.9.26.3
Examples
6.9.27
removeWalletObject
6.9.27.1
Description
6.9.27.2
Syntax
6.9.27.3
Examples
6.9.28
Properties Files for SSL
6.9.28.1
Structure of Properties Files
6.9.28.2
Examples of Properties Files
7
Using the SSL Automation Tool
7.1
Introduction to the SSL Automation Tool
7.2
Prerequisites
7.2.1
Setting up Oracle Fusion Middleware Environment
7.2.2
Assembling Required Information
7.3
Generating the CA Certificate
7.3.1
Example: Generating a Certificate
7.4
Configuring a Component Server
7.4.1
Example: Configuring a WebLogic Server and Java EE Components
7.4.2
Example: Configuring an Oracle Internet Directory Server Component
7.4.3
Example: Configuring an Oracle Virtual Directory Server Component
7.4.4
Example: Configuring an Oracle Access Manager 10g Server Component
7.5
Configuring a Client
7.5.1
Example: Downloading the CA Certificate for SSL Clients
7.5.2
Example: Downloading the Certificate and Configuring a WebLogic Client
7.5.3
Example: Downloading the Certificate and Configuring a WebGate Client
8
Managing Keystores, Wallets, and Certificates
8.1
Key and Certificate Storage in Oracle Fusion Middleware
8.1.1
Types of Keystores
8.1.1.1
JKS Keystore and Truststore
8.1.1.2
Oracle Wallet
8.1.2
Keystore Management Tools
8.1.2.1
About Importing DER-encoded Certificates
8.1.2.2
Using a Keystore Not Created with WLST or Fusion Middleware Control
8.1.2.3
Copying Keystores to File System is Not Supported
8.1.2.4
About Using Oracle Wallet Manager in a Stand-alone Environment
8.1.2.5
Additional Information about Keystore Management
8.2
Command-Line Interface for Keystores and Wallets
8.3
JKS Keystore Management
8.3.1
About Keystores and Certificates
8.3.1.1
Sharing Keystores Across Instances
8.3.1.2
Keystore Naming Conventions
8.3.2
Managing the Keystore Life Cycle
8.3.3
Common Keystore Operations
8.3.3.1
Creating a Keystore Using Fusion Middleware Control
8.3.3.2
Creating a Keystore Using WLST
8.3.3.3
Exporting a Keystore Using Fusion Middleware Control
8.3.3.4
Exporting a Keystore Using WLST
8.3.3.5
Deleting a Keystore Using Fusion Middleware Control
8.3.3.6
Deleting a Keystore Using WLST
8.3.3.7
Importing a Keystore Using Fusion Middleware Control
8.3.3.8
Importing a Keystore Using WLST
8.3.3.9
Changing the Keystore Password Using Fusion Middleware Control
8.3.3.10
Changing the Keystore Password Using WLST
8.3.4
Managing the Certificate Life Cycle
8.3.5
Common Certificate Operations
8.3.5.1
Generating a New Key for the Keystore Using Fusion Middleware Control
8.3.5.2
Generating a New Key for the Keystore Using WLST
8.3.5.3
Generating a Certificate Signing Request Using Fusion Middleware Control
8.3.5.4
Generating a Certificate Signing Request Using WLST
8.3.5.5
Importing a Certificate or Trusted Certificate into a Keystore Using Fusion Middleware Control
8.3.5.6
Importing a Certificate or Trusted Certificate into a Keystore Using WLST
8.3.5.7
Exporting a Certificate or Trusted Certificate from the Keystore Using Fusion Middleware Control
8.3.5.8
Exporting a Certificate or Trusted Certificate from the Keystore Using WLST
8.3.5.9
Deleting a Certificate or Trusted Certificate from the Keystore Using Fusion Middleware Control
8.3.5.10
Deleting a Certificate or Trusted Certificate from the Keystore Using WLST
8.3.5.11
Converting a Self-Signed Certificate to a Third-Party Certificate Using Fusion Middleware Control
8.3.5.12
Converting a Self-Signed Certificate to a Third-Party Certificate Using WLST
8.3.6
Keystore and Certificate Maintenance
8.3.6.1
Location of Keystores
8.3.6.2
Replacing Expiring Certificates
8.3.6.3
Effect of Host Name Change on Keystores
8.4
Wallet Management
8.4.1
About Wallets and Certificates
8.4.1.1
Password-Protected and Autologin Wallets
8.4.1.2
Self-Signed and Third-Party Wallets
8.4.1.3
Sharing Wallets Across Instances
8.4.1.4
Wallet Naming Conventions
8.4.2
Accessing the Wallet Management Page in Fusion Middleware Control
8.4.3
Managing the Wallet Life Cycle
8.4.4
Common Wallet Operations
8.4.4.1
Creating a Wallet Using Fusion Middleware Control
8.4.4.2
Creating a Wallet Using WLST
8.4.4.3
Creating a Self-Signed Wallet Using Fusion Middleware Control
8.4.4.4
Creating a Self-Signed Wallet Using WLST
8.4.4.5
Changing a Self-Signed Wallet to a Third-Party Wallet Using Fusion Middleware Control
8.4.4.6
Changing a Self-Signed Wallet to a Third-Party Wallet Using WLST
8.4.4.7
Exporting a Wallet Using Fusion Middleware Control
8.4.4.8
Exporting a Wallet Using WLST
8.4.4.9
Importing a Wallet Using Fusion Middleware Control
8.4.4.10
Importing a Wallet Using WLST
8.4.4.11
Deleting a Wallet Using Fusion Middleware Control
8.4.4.12
Deleting a Wallet Using WLST
8.4.5
Managing the Certificate Life Cycle
8.4.6
Accessing the Certificate Management Page for Wallets in Fusion Middleware Control
8.4.7
Common Certificate Operations
8.4.7.1
Adding a Certificate Request Using Fusion Middleware Control
8.4.7.2
Adding a Certificate Request Using WLST
8.4.7.3
Exporting a Certificate, Certificate Request, or a Trusted Certificate Using Fusion Middleware Control
8.4.7.4
Exporting a Certificate, Certificate Request, or a Trusted Certificate Using WLST
8.4.7.5
Importing a Certificate or a Trusted Certificate Using Fusion Middleware Control
8.4.7.6
Importing a Certificate or a Trusted Certificate Using WLST
8.4.7.7
Deleting a Certificate Request, a Certificate, or a Trusted Certificate Using Fusion Middleware Control
8.4.7.8
Deleting a Certificate Request, a Certificate, or a Trusted Certificate Using WLST
8.4.7.9
Converting a Self-Signed Certificate into a Third-Party Certificate Using Fusion Middleware Control
8.4.7.10
Converting a Self-Signed Certificate into a Third-Party Certificate Using WLST
8.4.8
Wallet and Certificate Maintenance
8.4.8.1
Location of Wallets
8.4.8.2
Effect of Host Name Change on a Wallet
8.4.8.3
Changing a Self-Signed Wallet to a Third-Party Wallet
8.4.8.4
Replacing an Expiring Certificate in a Wallet
Part IV Deploying Applications
9
Understanding the Deployment Process
9.1
What Is a Deployer?
9.2
General Procedures for Moving from Application Design to Production Deployment
9.2.1
Designing and Developing an Application
9.2.2
Deploying an Application to Managed Servers
9.2.3
Automating the Migration of an Application to Other Environments
9.3
Diagnosing Typical Problems
10
Deploying Applications
10.1
Overview of Deploying Applications
10.1.1
What Types of Applications Can You Deploy?
10.1.2
Understanding Deployment, Redeployment, and Undeployment
10.2
Understanding and Managing Data Sources
10.2.1
Understanding Data Sources
10.2.2
Creating and Managing JDBC Data Sources
10.2.2.1
Creating a JDBC Data Source Using Fusion Middleware Control
10.2.2.2
Editing a JDBC Data Source Using Fusion Middleware Control
10.2.2.3
Monitoring a JDBC Data Source Using Fusion Middleware Control
10.2.2.4
Controlling a JDBC Data Source Using Fusion Middleware Control
10.2.2.5
Creating a GridLink Data Source Using Fusion Middleware Control
10.3
Deploying, Undeploying, and Redeploying Java EE Applications
10.3.1
Deploying Java EE Applications
10.3.1.1
Deploying Java EE Applications Using Fusion Middleware Control
10.3.1.2
Deploying Java EE Applications Using WLST
10.3.2
Undeploying Java EE Applications
10.3.2.1
Undeploying Java EE Applications Using Fusion Middleware Control
10.3.2.2
Undeploying Java EE Applications Using WLST
10.3.3
Redeploying Java EE Applications
10.3.3.1
Redeploying Java EE Applications Using Fusion Middleware Control
10.3.3.2
Redeploying Java EE Applications Using WLST
10.4
Deploying, Undeploying, and Redeploying Oracle ADF Applications
10.4.1
Deploying Oracle ADF Applications
10.4.1.1
Deploying ADF Applications Using Fusion Middleware Control
10.4.1.2
Deploying ADF Applications Using WLST or the Administration Console
10.4.2
Undeploying Oracle ADF Applications
10.4.3
Redeploying Oracle ADF Applications
10.5
Deploying, Undeploying, and Redeploying SOA Composite Applications
10.5.1
Deploying SOA Composite Applications
10.5.2
Undeploying SOA Composite Applications
10.5.3
Redeploying SOA Composite Applications
10.6
Deploying, Undeploying, and Redeploying WebCenter Portal Applications
10.6.1
Deploying WebCenter Portal Applications
10.6.2
Undeploying WebCenter Portal Applications
10.6.3
Redeploying WebCenter Portal Applications
10.7
Managing Deployment Plans
10.8
About the Common Deployment Tasks in Fusion Middleware Control
10.9
Changing MDS Configuration Attributes for Deployed Applications
10.9.1
Changing the MDS Configuration Attributes Using Fusion Middleware Control
10.9.2
Changing the MDS Configuration Using WLST
10.9.3
Restoring the Original MDS Configuration for an Application
Part V Monitoring Oracle Fusion Middleware
11
Monitoring Oracle Fusion Middleware
11.1
Monitoring the Status of Oracle Fusion Middleware
11.1.1
Viewing General Information
11.1.2
Monitoring an Oracle WebLogic Server Domain
11.1.3
Monitoring an Oracle WebLogic Server Administration or Managed Server
11.1.4
Monitoring a Cluster
11.1.5
Monitoring a Java Component
11.1.6
Monitoring a System Component
11.1.7
Monitoring Java EE Applications
11.1.8
Monitoring ADF Applications
11.1.9
Monitoring SOA Composite Applications
11.1.10
Monitoring Oracle WebCenter Portal and Portal Framework Applications
11.1.11
Monitoring Applications Deployed to a Cluster
11.2
Viewing the Performance of Oracle Fusion Middleware
11.3
Viewing the Routing Topology
12
Managing Log Files and Diagnostic Data
12.1
Overview of Oracle Fusion Middleware Logging
12.2
Understanding ODL Messages and ODL Log Files
12.3
Viewing and Searching Log Files
12.3.1
Viewing Log Files and Their Messages
12.3.1.1
Viewing Log Files and Their Messages Using Fusion Middleware Control
12.3.1.2
Viewing Log Files and Their Messages Using WLST
12.3.2
Searching Log Files
12.3.2.1
Searching Log Files Using Fusion Middleware Control
12.3.2.1.1
Searching Log Files: Basic Searches
12.3.2.1.2
Searching Log Files: Advanced Searches
12.3.2.2
Searching Log Files Using WLST
12.3.3
Downloading Log Files
12.3.3.1
Downloading Log Files Using Fusion Middleware Control
12.3.3.2
Downloading Log Files Using WLST
12.4
Configuring Settings for Log Files
12.4.1
Changing Log File Locations
12.4.1.1
Changing Log File Locations Using Fusion Middleware Control
12.4.1.2
Changing Log File Locations Using WLST
12.4.2
Configuring Log File Rotation
12.4.2.1
Specifying Log File Rotation Using Fusion Middleware Control
12.4.2.2
Specifying Log File Rotation Using WLST
12.4.3
Setting the Level of Information Written to Log Files
12.4.3.1
Configuring Message Levels Using Fusion Middleware Control
12.4.3.2
Configuring Message Levels Using WLST
12.4.4
Specifying the Log File Format
12.4.4.1
Specifying the Log File Format Using Fusion Middleware Control
12.4.4.2
Specifying the Log File Format Using WLST
12.4.5
Specifying the Log File Locale
12.4.5.1
Specifying the Log File Encoding Using WLST
12.4.5.2
Specifying the Log File Encoding in logging.xml
12.5
Correlating Messages Across Log Files and Components
12.6
Configuring Tracing
12.6.1
Configuring and Using QuickTrace
12.6.1.1
Configuring QuickTrace Using Fusion Middleware Control
12.6.1.1.1
Configuring QuickTrace Using Fusion Middleware Control
12.6.1.1.2
Writing the Trace Messages to a File Using Fusion Middleware Control
12.6.1.2
Configuring QuickTrace Using WLST
12.6.1.2.1
Configuring QuickTrace Using WLST
12.6.1.2.2
Writing the Trace Messages to a File Using WLST
12.6.1.2.3
Disabling QuickTrace Using WLST
12.6.2
Configuring and Using Selective Tracing
12.6.2.1
Configuring Selective Tracing Using Fusion Middleware Control
12.6.2.1.1
Configuring Selective Tracing Using Fusion Middleware Control
12.6.2.1.2
Viewing Selective Traces Using Fusion Middleware Control
12.6.2.1.3
Disabling Selective Tracing Using Fusion Middleware Control
12.6.2.2
Configuring Selective Tracing Using WLST
12.6.2.2.1
Configuring Selective Tracing Using WLST
12.6.2.2.2
Viewing Selective Traces Using WLST
12.6.2.2.3
Disabling Selective Traces Using WLST
13
Diagnosing Problems
13.1
Understanding the Diagnostic Framework
13.1.1
About Incidents and Problems
13.1.1.1
Incident Flood Control
13.1.2
Diagnostic Framework Components
13.1.2.1
Automatic Diagnostic Repository
13.1.2.2
Diagnostic Dumps
13.1.2.3
Management MBeans
13.1.2.4
WLST Commands for Diagnostic Framework
13.1.2.5
ADRCI Command-Line Utility
13.2
How the Diagnostic Framework Works
13.3
Configuring the Diagnostic Framework
13.3.1
Configuring Diagnostic Framework Settings
13.3.2
Configuring Custom Diagnostic Rules
13.3.3
Configuring Problem Suppression
13.3.4
Configuring WLDF Watch and Notification for the Diagnostic Framework
13.4
Investigating, Reporting, and Solving a Problem
13.4.1
Roadmap—Investigating, Reporting, and Resolving a Problem
13.4.2
Viewing Problems and Incidents
13.4.2.1
Viewing Problems
13.4.2.2
Viewing Incidents
13.4.3
Analyzing Specific Problem Keys
13.4.4
Working with Diagnostic Dumps
13.4.4.1
Listing Diagnostic Dumps
13.4.4.2
Viewing a Description of a Diagnostic Dump
13.4.4.3
Executing Dumps
13.4.5
Configuring and Using Diagnostic Dump Sampling
13.4.5.1
Understanding Diagnostic Dump Sampling
13.4.5.2
Configuring Dump Sampling
13.4.5.2.1
Activating the Default Samples
13.4.5.2.2
Creating Dump Samplings
13.4.5.2.3
Modifying Dump Sampling Settings
13.4.5.2.4
Removing Dump Samplings
13.4.5.2.5
Enabling or Disabling All Dump Sampling
13.4.5.3
Listing Dump Samplings
13.4.5.4
Retrieving the Dump Sampling Output
13.4.5.4.1
Retrieving Dump Samples Using the executeDump Command
13.4.5.4.2
Retrieving Dump Samples Using the getSamplingArchives Command
13.4.6
Managing Incidents
13.4.6.1
Creating an Incident Manually
13.4.6.2
Packaging an Incident
13.4.6.3
Purging Incidents
13.4.7
Generating an RDA Report
13.5
Managing and Running the Health Test Framework
13.5.1
Understanding the Health Test Framework
13.5.2
Understanding the Health Test Framework File Repository
13.5.3
Using the Health Test Framework Command Line
13.5.3.1
dfwhealthtestadminctl.sh Command Line
13.5.3.1.1
help
13.5.3.1.2
register
13.5.3.1.3
index
13.5.3.2
dfwhealthtestctl.sh Command Line
13.5.3.2.1
desctest
13.5.3.2.2
help
13.5.3.2.3
listrun
13.5.3.2.4
listtest
13.5.3.2.5
report
13.5.3.2.6
run
13.5.3.2.7
status
13.5.4
Managing the Health Test Framework
13.5.4.1
Creating a Repository and Registering Health Test Framework Tests
13.5.4.2
Rebuilding the Health Test Framework Indexes
13.5.5
Running Health Test Framework Diagnostic Tests
13.5.6
Searching for Health Test Framework Diagnostic Tests
13.5.7
Retrieving a Description of a Health Test Framework Test
13.5.8
Listing Health Test Framework Test Runs
13.5.9
Generating Health Test Framework Reports
Part VI Advanced Administration
14
Managing the Metadata Repository
14.1
Understanding a Metadata Repository
14.2
Creating a Database-Based Metadata Repository
14.3
Managing the MDS Repository
14.3.1
Understanding the MDS Repository
14.3.1.1
Databases Supported by MDS
14.3.1.2
Understanding MDS Operations
14.3.2
Registering and Deregistering a Database-Based MDS Repository
14.3.2.1
Registering a Database-Based MDS Repository
14.3.2.1.1
Registering a Database-Based MDS Repository Using Fusion Middleware Control
14.3.2.1.2
Registering a Database-Based MDS Repository Using WLST
14.3.2.2
Adding or Removing Servers Targeted to the MDS Repository
14.3.2.3
Deregistering a Database-Based MDS Repository
14.3.2.3.1
Deregistering a Database-Based MDS Repository Using Fusion Middleware Control
14.3.2.3.2
Deregistering a Database-Based MDS Repository Using WLST
14.3.3
Registering and Deregistering a File-Based MDS Repository
14.3.3.1
Creating and Registering a File-Based MDS Repository
14.3.3.2
Deregistering a File-Based MDS Repository
14.3.4
Changing the System Data Source
14.3.5
Using System MBeans to Manage an MDS Repository
14.3.6
Viewing Information About an MDS Repository
14.3.6.1
Viewing Information About an MDS Repository Using Fusion Middleware Control
14.3.6.2
Viewing Information About an MDS Repository Using System MBeans
14.3.7
Configuring an Application to Use a Different MDS Repository or Partition
14.3.7.1
Cloning a Partition
14.3.7.2
Creating a New Partition and Reassociating the Application to It
14.3.8
Moving Metadata from a Source System to a Target System
14.3.8.1
Transferring Metadata Using Fusion Middleware Control
14.3.8.2
Transferring Metadata using WLST
14.3.9
Moving from a File-Based Repository to a Database-Based Repository
14.3.10
Deleting a Metadata Partition from a Repository
14.3.10.1
Deleting a Metadata Partition Using Fusion Middleware Control
14.3.10.2
Deleting a Metadata Partition Using WLST
14.3.11
Purging Metadata Version History
14.3.11.1
Purging Metadata Version History Using Fusion Middleware Control
14.3.11.2
Purging Metadata Version History Using WLST
14.3.11.3
Enabling Auto-Purge
14.3.12
Managing Metadata Labels in the MDS Repository
14.3.12.1
Creating Metadata Labels
14.3.12.2
Listing Metadata Labels
14.3.12.3
Promoting Metadata Labels
14.3.12.4
Purging Metadata Labels
14.3.12.4.1
Purging Metadata Labels Using Fusion Middleware Control
14.3.12.4.2
Purging Metadata Labels Using WLST
14.3.12.5
Deleting Metadata Labels
14.4
Managing Metadata Repository Schemas
14.4.1
Changing Metadata Repository Schema Passwords
14.4.2
Changing the Character Set of the Metadata Repository
14.5
Purging Data
14.5.1
Purging Oracle Infrastructure Web Services Data
14.5.2
Purging Oracle WebCenter Portal Data
14.5.2.1
Purging Oracle WebCenter Portal's Activity Stream Data
14.5.2.2
Purging Oracle WebCenter Portal's Analytics Data
14.5.2.2.1
Loading the Oracle WebCenter Portal Purge Package
14.5.2.2.2
Running the Oracle WebCenter Portal Purge Script
14.5.2.3
Partitioning Oracle WebCenter Portal's Analytics Data
15
Changing Network Configurations
15.1
Changing the Network Configuration of Oracle Fusion Middleware
15.1.1
Changing the Network Configuration of an Administration Server
15.1.2
Changing the Network Configuration of a Managed Server
15.1.3
Changing the Network Configuration of Web Tier Components
15.2
Changing the Network Configuration of a Database
15.3
Moving Between On-Network and Off-Network
15.3.1
Moving from Off-Network to On-Network (Static IP Address)
15.3.2
Moving from Off-Network to On-Network (DHCP)
15.3.3
Moving from On-Network to Off-Network (Static IP Address)
15.4
Changing Between a Static IP Address and DHCP
15.4.1
Changing from a Static IP Address to DHCP
15.4.2
Changing from DHCP to a Static IP Address
15.5
Using IPv6
15.5.1
Supported Topologies for IPv6 Network Protocols
15.5.2
Configuring Oracle HTTP Server for IPv6
15.5.3
Using Dual Stack with Oracle SOA Suite and Fusion Middleware Control
15.5.4
Disabling IPv6 Support for Oracle Web Cache
15.5.5
Configuring Oracle Single Sign-On to Use Oracle HTTP Server with IPv6
15.5.6
Configuring Oracle Access Manager 11
g
Support for IPv6
15.5.6.1
Prerequisites
15.5.6.2
Introduction to Oracle Access Manager and IPv6
15.5.6.2.1
Configuring IPv6 with Oracle Access Manager and Challenge Redirect
15.5.6.2.2
Considerations
15.5.6.3
Configuring IPv6: Separate Proxy for Oracle Access Manager and Webgates
15.5.7
Configuring Oracle Access Manager 10
g
Support for IPv6
15.5.7.1
Simple Authentication with IPv6
15.5.7.2
Configuring IPv6 with an Authenticating WebGate and Challenge Redirect
15.5.7.3
Considerations
15.5.7.4
Prerequisites
15.5.7.5
Configuring IPv6 with Simple Authentication
15.5.7.6
Configuring IPv6 with an Authenticating WebGate and Challenge Redirect
15.5.7.7
Configuring IPv6: Separate Proxy for Authentication and Resource WebGates
Part VII Advanced Administration: Backup and Recovery
16
Introducing Backup and Recovery
16.1
Understanding Oracle Fusion Middleware Backup and Recovery
16.1.1
Impact of Administration Server Failure
16.1.2
Managed Server Independence (MSI) Mode
16.1.3
Configuration Changes in Managed Servers
16.2
Oracle Fusion Middleware Directory Structure
16.3
Overview of the Backup Strategies
16.3.1
Types of Backups
16.3.2
Backup Artifacts
16.3.3
Recommended Backup Strategy
16.4
Overview of Recovery Strategies
16.4.1
Types of Recovery
16.4.2
Recommended Recovery Strategies
16.5
Backup and Recovery Recommendations for Oracle Fusion Middleware Components
16.5.1
Backup and Recovery Recommendations for Oracle WebLogic Server
16.5.1.1
Backup and Recovery Recommendations for Oracle WebLogic Server
16.5.1.2
Backup and Recovery Recommendations for Oracle WebLogic Server JMS
16.5.2
Backup and Recovery Recommendations for Oracle Identity Management
16.5.2.1
Backup and Recovery Recommendations for Oracle Internet Directory
16.5.2.2
Backup and Recovery Recommendations for Oracle Virtual Directory
16.5.2.3
Backup and Recovery Recommendations for Oracle Directory Integration Platform
16.5.2.4
Backup and Recovery Recommendations for Oracle Directory Services Manager
16.5.2.5
Backup and Recovery Recommendations for Oracle Identity Federation
16.5.2.6
Backup and Recovery Recommendations for Oracle Access Manager
16.5.2.7
Backup and Recovery Recommendations for Oracle Adaptive Access Manager
16.5.2.8
Backup and Recovery Recommendations for Oracle Identity Manager
16.5.2.9
Backup and Recovery Recommendations for Oracle Identity Navigator
16.5.3
Backup and Recovery Recommendations for Oracle SOA Suite
16.5.3.1
Backup and Recovery Recommendations for Oracle BPEL Process Manager
16.5.3.2
Backup and Recovery Recommendations for Oracle Business Activity Monitoring
16.5.3.3
Backup and Recovery Recommendations for Oracle B2B
16.5.3.4
Backup and Recovery Recommendations for Oracle Service Bus
16.5.3.5
Backup and Recovery Recommendations for Oracle Mediator
16.5.3.6
Backup and Recovery Recommendations for Oracle Business Rules
16.5.3.7
Backup and Recovery Recommendations for Oracle Business Process Management
16.5.4
Backup and Recovery Recommendations for Oracle WebCenter Portal
16.5.4.1
Backup and Recovery Recommendations for Oracle WebCenter Portal
16.5.4.2
Backup and Recovery Recommendations for Oracle WebCenter Portal's Portlet Producer
16.5.4.3
Backup and Recovery Recommendations for Oracle WebCenter Portal's Discussions Server
16.5.4.4
Backup and Recovery Recommendations for Oracle WebCenter Portal's Activity Graph
16.5.4.5
Backup and Recovery Recommendations for Oracle WebCenter Portal's Analytics
16.5.4.6
Backup and Recovery Recommendations for Content Server
16.5.5
Backup and Recovery Recommendations for Oracle JRF Installations
16.5.5.1
Backup and Recovery Recommendations for Oracle Web Services Manager
16.5.5.2
Backup and Recovery Recommendations for Oracle Platform Security Services
16.5.6
Backup and Recovery Recommendations for Web Tier Installations
16.5.6.1
Backup and Recovery Recommendations for Oracle HTTP Server
16.5.6.2
Backup and Recovery Recommendations for Oracle Web Cache
16.5.7
Backup and Recovery Recommendations for Oracle Portal, Oracle Forms Services, Oracle Reports, and Oracle BI Discoverer Installations
16.5.7.1
Backup and Recovery Recommendations for Oracle Portal
16.5.7.2
Backup and Recovery Recommendations for Oracle Forms Services
16.5.7.3
Backup and Recovery Recommendations for Oracle Reports
16.5.7.4
Backup and Recovery Recommendations for Oracle Business Intelligence Discoverer
16.5.8
Backup and Recovery Recommendations for Oracle Business Intelligence
16.5.8.1
Backup and Recovery Recommendations for Oracle BI Enterprise Edition
16.5.8.2
Backup and Recovery Recommendations for Oracle Business Intelligence Publisher
16.5.8.3
Backup and Recovery Recommendations for Oracle Real-Time Decisions
16.5.9
Backup and Recovery Recommendations for Oracle Hyperion Enterprise Performance Management System
16.5.9.1
Backup and Recovery Recommendations for Oracle Essbase
16.5.9.2
Backup and Recovery Recommendations for Oracle Hyperion Calculation Manager
16.5.9.3
Backup and Recovery Recommendations for Oracle Hyperion Financial Reporting
16.5.9.4
Backup and Recovery Recommendations for Oracle Hyperion Smart View
16.5.10
Backup and Recovery Recommendations for Oracle Data Integrator
16.5.11
Backup and Recovery Recommendations for Oracle WebCenter Content
16.5.11.1
Backup and Recovery Recommendations for Oracle Information Rights Management
16.5.11.2
Backup and Recovery Recommendations for Oracle WebCenter Content: Imaging
16.5.11.3
Backup and Recovery Recommendations for Oracle WebCenter Content
16.5.11.4
Backup and Recovery Recommendations for Oracle WebCenter Content: Records
16.6
Assumptions and Restrictions
17
Backing Up Your Environment
17.1
Overview of Backing Up Your Environment
17.2
Limitations and Restrictions for Backing Up Data
17.3
Performing a Backup
17.3.1
Performing a Full Offline Backup
17.3.2
Performing an Online Backup of Run-Time Artifacts
17.3.3
Backing Up Windows Registry Entries
17.4
Creating a Record of Your Oracle Fusion Middleware Configuration
18
Recovering Your Environment
18.1
Overview of Recovering Your Environment
18.2
Recovering After Data Loss, Corruption, Media Failure, or Application Malfunction
18.2.1
Recovering a Middleware Home
18.2.2
Recovering an Oracle WebLogic Server Domain
18.2.3
Recovering an Oracle Home
18.2.4
Recovering an Oracle Instance Home
18.2.4.1
Recovering After Oracle Instance Home Deleted from File System
18.2.4.2
Recovering After Oracle Instance Home Deregistered
18.2.5
Recovering the Administration Server Configuration
18.2.6
Recovering a Managed Server
18.2.6.1
Recovering a Managed Server When It Cannot Be Started
18.2.6.2
Recovering a Managed Server When It Does Not Function Correctly
18.2.6.3
Recovering an Oracle SOA Suite Managed Server That Has a Separate Directory
18.2.7
Recovering Components
18.2.7.1
Recovering a Component That Is Not Functioning Properly
18.2.7.2
Recovering a Component After Cluster Configuration Change
18.2.7.3
Recovering Oracle Identity Manager
18.2.7.4
Recovering Oracle Identity Navigator
18.2.7.5
Recovering Oracle Access Manager
18.2.7.6
Recovering Oracle Adaptive Access Manager
18.2.7.7
Recovering Oracle Business Process Management
18.2.7.8
Recovering Oracle WebCenter Portal's Activity Graph
18.2.7.9
Recovering Oracle WebCenter Portal's Analytics Data
18.2.7.10
Recovering Oracle BI Enterprise Edition
18.2.7.10.1
Recovering Oracle BI Enterprise Edition in a Non-Clustered Environment
18.2.7.10.2
Recovering Oracle BI Enterprise Edition in a Clustered Environment
18.2.7.10.3
Reconciling the LDAP Database with RPD
18.2.7.10.4
Reconciling the LDAP database with Oracle BI Presentation Catalog
18.2.7.11
Recovering Oracle Business Intelligence Publisher
18.2.7.12
Recovering Oracle Real-Time Decisions
18.2.7.13
Recovering Oracle Essbase
18.2.7.14
Recovering Oracle Hyperion Calculation Manager
18.2.7.15
Recovering Oracle Hyperion Financial Reporting
18.2.7.16
Recovering Oracle Hyperion Smart View
18.2.7.17
Recovering Oracle Data Integrator
18.2.7.18
Recovering Oracle Information Rights Management
18.2.7.19
Recovering Oracle WebCenter Content: Imaging
18.2.7.20
Recovering Oracle WebCenter Content
18.2.7.21
Recovering Oracle WebCenter Content: Records
18.2.8
Recovering a Cluster
18.2.8.1
Recovering a Cluster After Deletion or Cluster-Level Configuration Changes
18.2.8.2
Recovering a Cluster After Membership Is Mistakenly Modified
18.2.9
Recovering Applications
18.2.9.1
Recovering Application Artifacts
18.2.9.2
Recovering a Redeployed Application That Is No Longer Functional
18.2.9.3
Recovering an Undeployed Application
18.2.9.4
Recovering a Composite Application
18.2.10
Recovering a Database
18.3
Recovering After Loss of Host
18.3.1
Recovering After Loss of Oracle WebLogic Server Domain Host
18.3.2
Recovering After Loss of Administration Server Host
18.3.2.1
Recovering the Administration Server to the Same Host
18.3.2.2
Recovering the Administration Server to a Different Host
18.3.3
Recovering After Loss of Managed Server Host
18.3.3.1
Recovering a Managed Server to the Same Host
18.3.3.2
Recovering a Managed Server to a Different Host
18.3.3.3
Recovering an Oracle SOA Suite Managed Server That Has a Separate Directory
18.3.4
Recovering After Loss of Component Host
18.3.4.1
Recovering a Java Component to the Same Host
18.3.4.2
Recovering a Java Component to a Different Host
18.3.4.3
Recovering a System Component to the Same Host
18.3.4.4
Recovering a System Component to a Different Host
18.3.4.5
Recovering Identity Management Components to a Different Host
18.3.4.5.1
Recovering Oracle Internet Directory to a Different Host
18.3.4.5.2
Recovering Oracle Virtual Directory to a Different Host
18.3.4.5.3
Recovering Oracle Directory Integration Platform to a Different Host
18.3.4.5.4
Recovering Oracle Identity Federation to a Different Host
18.3.4.5.5
Recovering Oracle Identity Manager to a Different Host
18.3.4.5.6
Recovering Oracle Identity Navigator to a Different Host
18.3.4.5.7
Recovering Oracle Access Manager to a Different Host
18.3.4.5.8
Recovering Oracle Adaptive Access Manager to a Different Host
18.3.4.6
Recovering Oracle SOA Suite After Loss of Host
18.3.4.7
Recovering Web Tier Components to a Different Host
18.3.4.7.1
Recovering Oracle HTTP Server to a Different Host
18.3.4.7.2
Recovering Oracle Web Cache to a Different Host
18.3.4.8
Recovering Oracle Portal, Oracle Reports, Oracle Forms Services, and Oracle Business Intelligence Discoverer to a Different Host
18.3.4.8.1
Recovering Oracle Portal to a Different Host
18.3.4.8.2
Recovering Oracle Forms Services to a Different Host
18.3.4.8.3
Recovering Oracle Reports to a Different Host
18.3.4.8.4
Recovering Oracle Business Intelligence Discoverer to a Different Host
18.3.4.9
Recovering Oracle BI Enterprise Edition to a Different Host
18.3.4.9.1
Recovering Oracle BI EE to a Different Host in a Non-Clustered Environment
18.3.4.9.2
Recovering Oracle BI EE to a Different Host in a Clustered Environment
18.3.4.9.3
Additional Steps for Recovering Oracle BI EE
18.3.4.9.4
Importing Oracle BI EE Registry Entries
18.3.4.10
Recovering Oracle Business Intelligence Publisher to a Different Host
18.3.4.11
Recovering Oracle Real-Time Decisions to a Different Host
18.3.4.12
Recovering Oracle Essbase After Loss of Host
18.3.4.13
Recovering Oracle Hyperion Calculation Manager After Loss of Host
18.3.4.14
Recovering Oracle Hyperion Financial Reporting After Loss of Host
18.3.4.15
Recovering Oracle Data Integrator to a Different Host
18.3.4.16
Recovering Oracle WebCenter Content to a Different Host
18.3.4.16.1
Recovering Oracle WebCenter Content to a Different Host
18.3.4.16.2
Recovering Oracle WebCenter Content: Records After Loss of Host
18.3.5
Additional Actions for Recovering Entities After Loss of Host
18.3.5.1
Recovering Fusion Middleware Control to a Different Host
18.3.5.2
Changing the Host Name in the targets.xml File for Fusion Middleware Control
18.3.5.3
Recovering Oracle Management Agent When Components Are Recovered to a Different Host
18.3.5.4
Modifying the mod_wl_ohs.conf File
18.3.5.5
Creating a New Machine for Certain Components
18.3.5.6
Reassociating Users to Groups for Certain Identity Management Components
18.3.5.7
Updating Oracle Inventory
18.3.5.8
Recovering the Windows Registry
18.3.6
Recovering After Loss of Database Host
Part VIII Advanced Administration: Expanding Your Environment
19
Scaling Your Environment
19.1
Overview of Scaling Your Environment
19.2
Extending a Domain to Support Additional Components
19.3
Adding Additional Managed Servers to a Domain
19.3.1
Applying Oracle JRF Template to a Managed Server or Cluster
19.4
Creating Additional Oracle Instances and System Components
19.4.1
Creating an Oracle Instance Using a Non-Secure Port
19.4.2
Creating an Oracle Instance Using a Secure Port
19.4.3
Disabling a System Component
19.5
Creating Clusters
19.6
Copying a Middleware Home or Component
20
Using the Movement Scripts
20.1
Introduction to the Movement Scripts
20.2
Movement Scripts
20.2.1
Movement Scripts Syntax
20.2.1.1
copyBinary Script
20.2.1.2
pasteBinary Script
20.2.1.3
copyConfig Script for Java Components
20.2.1.4
copyConfig Script for Oracle Instances
20.2.1.5
copyConfig Script for System Components
20.2.1.6
copyConfig Script for Node Manager
20.2.1.7
extractMovePlan Script
20.2.1.8
pasteConfig Script for Java Components
20.2.1.9
pasteConfig Script for Oracle Instances
20.2.1.10
pasteConfig Script for System Components
20.2.1.11
pasteConfig Script for Node Manager
20.2.1.12
obfuscatePassword Script
20.3
Modifying Move Plans
20.3.1
Locating configGroup Elements
20.3.2
Move Plan Properties
21
Moving from a Test to a Production Environment
21.1
Introduction to Moving Oracle Fusion Middleware Components
21.2
Overview of Procedures for Moving from a Source to a Target Environment
21.3
Common Procedures for Moving to a Target Environment
21.3.1
Preparing the Source Environment
21.3.2
Preparing the Target Environment
21.3.3
Installing the Database on the Target Environment
21.3.4
Moving the Middleware Home and the Binary Files
21.3.5
Moving the Configuration of Java Components
21.3.6
Moving the Configuration of Oracle Instances and System Components
21.3.6.1
Moving an Oracle Instance and All of Its System Components
21.3.6.2
Moving an Individual System Component
21.3.7
Configuring Users and Groups
21.4
Moving Oracle Fusion Middleware Components
21.4.1
Moving Identity Management Components to a Target Environment
21.4.1.1
Moving Identity Management to a New Target Environment
21.4.1.2
Moving Identity Management to an Existing Target Environment
21.4.2
Moving Oracle SOA Suite to a Target Environment
21.4.2.1
Moving Oracle SOA Suite to a New Target Environment
21.4.2.2
Moving Oracle SOA Suite to an Existing Target Environment
21.4.3
Moving Oracle WebCenter Portal to a Target Environment
21.4.3.1
Moving Oracle WebCenter Portal to a New Target Environment
21.4.3.2
Moving Oracle WebCenter Portal to an Existing Target Environment
21.4.4
Moving Oracle WebCenter Content to a Target Environment
21.4.4.1
Moving Oracle WebCenter Content to a New Target Environment
21.4.4.2
Moving Oracle WebCenter Content to an Existing Target Environment
21.4.5
Moving Oracle Hyperion Enterprise Performance Management System to a Target Environment
21.4.6
Moving the Web Tier to a Target Environment
21.4.6.1
Moving the Web Tier to a New Target Environment
21.4.6.1.1
Moving Oracle HTTP Server to a New Target Environment
21.4.6.1.2
Moving Oracle Web Cache to a New Target Environment
21.4.6.2
Moving the Web Tier to an Existing Target Environment
21.4.6.2.1
Moving Oracle HTTP Server to an Existing Target Environment
21.4.7
Moving Oracle Business Intelligence to a Target Environment
21.4.7.1
Moving Oracle Business Intelligence to a New Target Environment
21.4.7.2
Moving Oracle Business Intelligence to an Existing Target Environment When There Are Few Patches to Apply
21.4.7.3
Moving Oracle Business Intelligence Components to an Existing Target Environment When There are Many Patches to Apply
21.4.7.3.1
Moving Oracle BI EE to an Existing Target Environment When New Hardware Is Available
21.4.7.3.2
Moving Oracle BI EE to an Existing Target Environment When New Hardware Is Not Available
21.4.8
Moving Oracle Real-Time Decisions to a Target Environment
21.4.8.1
Moving Oracle Real-Time Decisions to a New Target Environment
21.4.8.2
Moving Oracle Real-Time Decisions to an Existing Target Environment
21.4.9
Moving Oracle Portal, Oracle Forms Services, Oracle Reports, and Oracle BI Discoverer to a Target Environment
21.4.9.1
Moving Oracle Portal, Oracle Forms Services, Oracle Reports, and Oracle Business Intelligence Discoverer to a New Target Environment
21.4.9.2
Moving Oracle Portal, Oracle Forms Services, Oracle Reports, and Oracle Business Intelligence Discoverer to an Existing Target Environment
21.4.10
Moving Oracle Data Integrator to a Target Environment
21.4.10.1
Moving Oracle Data Integrator to a New Target Environment
21.4.10.2
Moving Oracle Data Integrator to an Existing Target Environment
21.5
Considerations in Moving to and from Multihost Environments
21.6
Considerations in Moving to and from an Oracle RAC Environment
21.7
Limitations in Moving from Source to Target
21.8
Recovering from Test to Production Errors
Part IX Appendixes
A
Oracle Fusion Middleware Command-Line Tools
B
URLs for Components
C
Port Numbers
C.1
Port Numbers by Component
C.2
Port Numbers (Sorted by Number)
D
Metadata Repository Schemas
D.1
Metadata Repository Schema Descriptions
D.2
Metadata Repository Schemas, Tablespaces, and Data Files
E
Using Oracle Fusion Middleware Accessibility Options
E.1
Install and Configure Java Access Bridge (Windows Only)
E.2
Enabling Fusion Middleware Control Accessibility Mode
E.2.1
Making HTML Pages More Accessible
E.2.2
Viewing Text Descriptions of Fusion Middleware Control Charts
E.3
Fusion Middleware Control Keyboard Navigation
F
Examples of Administrative Changes
F.1
How to Use This Appendix
F.2
Examples of Administrative Changes (by Component)
G
Viewing Release Numbers
G.1
Release Number Format
G.2
Viewing the Software Inventory and Release Numbers
G.2.1
Viewing Oracle Fusion Middleware Installation Release Numbers
G.2.2
Viewing Oracle WebLogic Server Release Numbers
G.2.3
Viewing Component Release Numbers
G.2.4
Viewing Oracle Internet Directory Release Numbers
G.2.5
Viewing Metadata Repository Release Numbers
G.2.6
Viewing Schema Release Numbers
H
Oracle Wallet Manager and orapki
H.1
New orapki Features
H.1.1
orapki Usage Examples
H.1.2
New CRL Management Features
H.1.3
New Version 3 Certificate Support
H.1.4
Trust Chain Export
H.1.5
Wallet Password Change
H.1.6
Converting Between Oracle Wallet and JKS Keystore
H.2
Using the orapki Utility for Certificate Validation and CRL Management
H.2.1
orapki Overview
H.2.1.1
orapki Syntax
H.2.1.2
Environment Setup for orapki
H.2.2
Displaying orapki Help
H.2.3
Creating Signed Certificates for Testing Purposes
H.2.4
Managing Oracle Wallets with the orapki Utility
H.2.4.1
Creating and Viewing Oracle Wallets with orapki
H.2.4.2
Adding Certificates and Certificate Requests to Oracle Wallets with orapki
H.2.4.3
Exporting Certificates and Certificate Requests from Oracle Wallets with orapki
H.2.5
Managing Certificate Revocation Lists (CRLs) with orapki Utility
H.2.5.1
About Certificate Validation with Certificate Revocation Lists
H.2.5.1.1
What CRLs Should You Use?
H.2.5.1.2
How CRL Checking Works
H.2.5.2
Certificate Revocation List Management
H.2.5.2.1
Renaming CRLs with a Hash Value for Certificate Validation
H.2.5.2.2
Uploading CRLs to Oracle Internet Directory
H.2.5.2.3
Listing CRLs Stored in Oracle Internet Directory
H.2.5.2.4
Viewing CRLs in Oracle Internet Directory
H.2.5.2.5
Deleting CRLs from Oracle Internet Directory
H.2.6
orapki Utility Commands Summary
H.2.6.1
orapki cert create
H.2.6.1.1
Purpose
H.2.6.1.2
Syntax
H.2.6.2
orapki cert display
H.2.6.2.1
Purpose
H.2.6.2.2
Syntax
H.2.6.3
orapki crl create
H.2.6.3.1
Purpose
H.2.6.3.2
Syntax
H.2.6.4
orapki crl delete
H.2.6.4.1
Purpose
H.2.6.4.2
Syntax
H.2.6.5
orapki crl display
H.2.6.5.1
Purpose
H.2.6.5.2
Syntax
H.2.6.6
orapki crl hash
H.2.6.6.1
Purpose
H.2.6.6.2
Syntax
H.2.6.7
orapki crl list
H.2.6.7.1
Purpose
H.2.6.7.2
Syntax
H.2.6.8
orapki crl revoke
H.2.6.8.1
Purpose
H.2.6.8.2
Syntax
H.2.6.9
orapki crl status
H.2.6.9.1
Purpose
H.2.6.9.2
Syntax
H.2.6.10
orapki crl upload
H.2.6.10.1
Purpose
H.2.6.10.2
Syntax
H.2.6.11
orapki crl verify
H.2.6.11.1
Purpose
H.2.6.11.2
Syntax
H.2.6.12
orapki wallet add
H.2.6.12.1
Purpose
H.2.6.12.2
Syntax
H.2.6.13
orapki wallet change_pwd
H.2.6.13.1
Purpose
H.2.6.13.2
Syntax
H.2.6.14
orapki wallet create
H.2.6.14.1
Purpose
H.2.6.14.2
Syntax
H.2.6.15
orapki wallet display
H.2.6.15.1
Purpose
H.2.6.15.2
Syntax
H.2.6.16
orapki wallet export
H.2.6.16.1
Purpose
H.2.6.16.2
Syntax
H.2.6.17
orapki wallet export_trust_chain
H.2.6.17.1
Purpose
H.2.6.17.2
Syntax
H.3
Equivalent Features for Oracle Wallet Manager
H.4
Equivalent Features for orapki
H.5
Equivalent Features for the SSL Configuration Tool
I
Troubleshooting Oracle Fusion Middleware
I.1
Diagnosing Oracle Fusion Middleware Problems
I.2
Common Problems and Solutions
I.2.1
Running out of Data Source Connections
I.2.2
Using a Different Version of Spring
I.2.3
ClassNotFound Errors When Starting Managed Servers
I.3
Troubleshooting Fusion Middleware Control
I.3.1
Troubleshooting the Display of Performance Metrics and Charts in Fusion Middleware Control
I.3.1.1
What Are Agent-Monitored Targets?
I.3.1.2
Setting Monitoring Credentials for All Agent-Monitored Targets in a Farm
I.3.1.3
Changing the Monitoring Credentials for a Specific Agent-Monitored Target
I.3.1.4
Verifying or Changing the Oracle Management Agent URL
I.3.2
Securing the Connection from Fusion Middleware Control to Oracle WebLogic Server Administration Console
I.3.3
Configuring Fusion Middleware Control for Windows Native Authentication
I.4
Troubleshooting SSL
I.4.1
Components May Enable All Supported Ciphers
I.4.2
Replacement User Certificates for Oracle Wallets
I.5
Need More Help?
I.5.1
Using Remote Diagnostic Agent
Index
Scripting on this page enhances content navigation, but does not change the content in any way.