Oracle® Health Sciences Information Gateway CONNECT Gateway and Adapter Installation and Configuration Guide Release 2.0.1 E37024-02 |
|
|
PDF · Mobi · ePub |
This appendix describes how to create and import certificates using the GlassFish self-signed certificate scripts. It contains the following topics:
Installing Self-signed Certificates on Oracle Health Sciences Information Gateway CONNECT Adapter
Installing Self-signed Certificates on Oracle Health Sciences Information Gateway CONNECT Gateway
Perform the following steps to install self-signed certificates on the OHIG CONNECT adapter:
Log in to the adapter machine.
Stop the application server using the following commands:
> cd <glassfish_install_dir>/bin
> asadmin stop-domain <domain_name>
Navigate to the directory <install_dir>/addons/connect/scripts
using the following command:
> cd <install_dir>/addons/connect/scripts
Execute create-and-import-selfsigned-certs.sh
to install the self-signed certificate.
> sh create-and-import-selfsigned-certs.sh
This performs the following:
creates the keystore for the private internal key
exports the certificate that will authenticate the internal key
imports the trusted certificates into the truststore
provides these certificates to the server to use for authentication purposes
Install the certificates from the other components that will communicate with the Adapter (Gateway, OHMPI, HPE, HPM, HRL, HTB, and so on).
Copy the certificate of the component machine <COMPONENT_HOSTNAME.cer>
to the <glassfish_install_dir>/domains/<domain_name>/config
folder.
Navigate to and execute <install_dir>/addons/connect/scripts/import-others-cert.sh
. When prompted by the scripts, enter the machine hostname (it should match the cert file you copied to the config folder without .cer
suffix).
> bash import-others-cert.sh
Perform the following steps to install self-signed certificates on the OHIG CONNECT gateway:
Log in to the gateway machine.
Stop the application server using the following commands:
> cd <glassfish_install_dir>/bin
> asadmin stop-domain <domain_name>
Navigate to the directory <install_dir>/addons/connect/scripts
using the following command:
> cd <install_dir>/addons/connect/scripts
Execute create-and-import-selfsigned-certs.sh
to install the self-signed certificate.
> sh create-and-import-selfsigned-certs.sh
This performs the following:
creates the keystore for the private internal key
exports the certificate that will authenticate the internal key
imports the trusted certificates into the truststore
provides these certificates to the server to use for authentication purposes
Install the adapter machine certificate.
Copy the adapter machine certificate of <ADAPTER_ HOSTNAME.cer>
to the <glassfish_install_dir>/domains/<domain_name>/config
folder.
Navigate to and execute <install_dir>/addons/connect/scripts/import-others-cert.sh
. When prompted by the scripts, enter the adapter machine hostname (it should match with the cert file you copied to the config folder without .cer
suffix).
> bash import-others-cert.sh
To avoid a java.security.cert.CertificateException
you must ensure that your OHIM host names are not fully qualified.
To Make the Hostname Not Fully Qualified
Set the OHIM and OHIG host names to be not fully qualified.
Add aliases for all hosts.
Regenerate and reimport the certificates.
Restart all the servers.
Test that you do not have a Java security certificate exception.