Generating Self-Signed Certificates for Load Balancing as a Service (LBaaS)
This section shows you how to generate the public, private, and device self-signed certificates that are required as input into the JD Edwards EnterpriseOne Infrastructure Provisioning Console for Oracle Cloud Infrastructure in support of Load Balancing as a Service (LBaaS), which is a core functionality for infrastructure provisioning.
Prerequisite
- Access to a machine running Oracle Enterprise Linux. For example, this can be the Linux instance that you created for the OpenTofu staging server in Oracle Cloud Infrastructure.
Generating Self-Signed Certificates
On any machine running Oracle Enterprise Linux, use this procedure to generate self-signed root and device certificates. You will be prompted for these certificates by the Infrastructure Provisioning Console, which runs on the OpenTofu staging server. Therefore, the OpenTofu staging server is a logical choice of a server on which to perform this procedure.
-
Generate a rootCA private key using this command:
openssl genrsa -out rootCA.key 2048 -days 365 -
Generate rootCA public key using this command:
openssl req -x509 -new -nodes -key rootCA.key -sha256 -days 365 -out rootCA.pem -subj "/C=<country>/ST=<state>/L=<location>/O=<company>/OU=<organization unit>/CN=localhost"where C=<country> is the country where you will be submitting the CA Certificates Service Request (CSR), and
where ST=<state> is the state within the country you specified in
C=,andwhere L=<location> is the location or city within the state, and
where O=<organization> is the organization for which the CSR will be issued, and
where OU = <organization unit> is the originzational unit of the organization
For example, if the CSR is being requested for Oracle Corporation, for the JD Edwards EnterpriseOne division, in Denver, Colorado, United States, the command would be:
openssl req -x509 -new -nodes -key rootCA.key -sha256 -days 365 -out rootCA.pem -subj "/C=US/ST=CO/L=Denver/O=Oracle Corporation/OU=EnterpriseOne/CN=localhost" -
Create a configuration file named
device-csr.confthat includes these sections and settings:[req]distinguished_name = req_distinguished_namereq_extensions = v3_reqprompt = no[req_distinguished_name]C = <country>ST = <state>L = <location>O = <organization>OU = <organization unit>CN = localhost[v3_req]keyUsage = keyEncipherment, dataEnciphermentextendedKeyUsage = serverAuthsubjectAltName = @alt_names[alt_names]DNS.1 = localhostDNS.2 = <logic Enterprise Server>DNS.3 = <batch Enterprise Server>DNS.4 = <HTML web server>where C=<country> is the country where you will be submitting the CA Certificates Service Request (CSR), and
where ST=<state> is the state within the country you specified in
C=,andwhere L=<location> is the location or city within the state, and
where O=<organization> is the organization for which the CSR will be issued, and
where OU = <organization unit> is the unit of the organization, and
where <logic Enterprise Server> is the name of your JD Edwards Enterprise Server running application logic, which must be limited to 15 alphanumeric characters, and
where <batch Enterprise Server> is the name of your JD Edwards Enterprise Server running UBE batch processes, which must be limited to 15 alphanumeric characters, and
where <HMTL Web Server> is the name of your JD Edwards Web Server running HTML application logic, which must be limited to 15 alphanumeric characters
For example, a properly configured
device-csr.conffile might look like this:[req]distinguished_name = req_distinguished_namereq_extensions = v3_reqprompt = no[req_distinguished_name]C = USST = COL = DenverO = Oracle CorporationOU = EnterpriseOneCN = localhost[v3_req]keyUsage = keyEncipherment, dataEnciphermentextendedKeyUsage = serverAuthsubjectAltName = @alt_names[alt_names]DNS.1 = localhostDNS.2 = logiclbDNS.3 = batchlbDNS.4 = weblb -
Generate a device key using this command:
openssl genrsa -out device.key 2048 -days 365 -
Generate a device CSR using this command:
openssl req -new -key device.key -out device.csr -subj "/C=<country>/ST=<state>/L=<location>/O=<organization>/OU=<organization_unit>/CN=localhost"For example:
openssl req -new -key device.key -out device.csr -subj "/C=US/ST=CO/L=Denver/O=Oracle Corporation/OU=EnterpriseOne/CN=localhost" -
Generate a device certificate using this command, where you have created and configured the input file
device-csr.conffile as described in the previous step in this procedure:openssl x509 -req -in device.csr -CA rootCA.pem -CAkey rootCA.key -CAcreateserial -out