Performing Common Setup for All Microsoft Windows Servers
This section describes the setup tasks that must be performed on each Microsoft Windows-based server.
This section describes these common setup tasks that must be performed on all Linux servers that are deployed by JD Edwards EnterpriseOne One-Click Provisioning:
- General
- Enable Remote Command Execution
- Enable Inbound Ports in the Firewall
- Enable Outbound Ports in the Firewall
- Change Security Option
Prerequisite
- You must have a Microsoft Windows server for all servers that will be deployed by JD Edwards EnterpriseOne One-Click Provisioning. At a minimum, this includes the Provisioning Server, Database Server, Enterprise Server, WebLogic Server, and Deployment Server.
General
The following general prerequisites are required for each Microsoft Windows server:
- Ensure that hostname for the server contains only alphanumeric values. Special characters are not allowed.
-
All servers in provisioning cycle must be configured with same Microsoft Windows user name and credentials, where the user name must be opc. This common user must have administrator rights.; that is, it must be part of the Administrator group.
Note:JD Edwards EnterpriseOne One-Click Provisioning specifically supports only these special characters for Windows user passwords:
_@~!#%*+(){}[].? - If you change the password on any single machine in the provisioning cycle, you must likewise change the password on all other machines in with the new password and reboot the Provisioning Server to recognize those changes.
Enable Remote Command Execution
From PowerShell, use this command to enable remote command execution:
winrm quickconfig –q
Enable Inbound Ports in the Firewall
If you have the Microsoft Windows firewall enabled for any profile (public, private, default), which is recommended, in order for One-Click Provisioning to deploy to the Deployment Server in the Microsoft Windows instance in Oracle Cloud Infrastructure and for JD Edwards EnterpriseOne runtime to function properly, you will need to explicitly open Inbound and Outbound ports.
Use this procedure to open the Inbound ports for each Microsoft Windows instance.
- Go to Administrative Tools > Windows Firewall with Advanced Security.
- In the left pane, highlight Inbound Rules.
- In the right pane, Actions, Inbound Rules, click New Rule …
- On Rule Type, select the Port radio button as the type of rule to create.
- Click the Next button.
-
On Protocol and Ports:
- You can accept the default value of TCP for the protocol to which this rule applies.
- Choose the radio button for Specific local ports and, for each Windows Server, enter each of the ports shown in the following table, separated by a comma.
Windows Server Firewall Port List Component Inbound Ports to Open Provisioning Server
445
3000
3389
5150
5985
8998-8999
7000-7001
14501-14502
Database Server
445
3389
5150
5985
<DB_PORT>
Note:For SQL Server database, this is the value the user provides using the Provisioning Console.
14502-14510
Enterprise Server
445
3389
5150
5985
6017-6022
14502-14510
Web Server
445
3389
5150
5985
<WLS_ADMIN_PORT> See Note 1
<SSL_ACCESS_PORT> See Note 2
<SSL_ACCESS_PORT-1> See Note 3
14502-14520
Deployment Server
445
3389
5150
5985
6017-6022
14502-14510
Note 1: This is the Admin Port on which the Admin Server is running. This value is set by the user while creating a WebLogic domain.
Note 2: This SSL port must be opened to enable the Server Manager Console to complete the tasks.
- DV HTML
- PD HTML
- DV AIS
- PD AIS
The following example shows the ports you should specify for the Provisioning Server,
where the complete list is truncated by the visible input field.

- Click the Next button.
- On Action, you can accept the default value which is Allow the connection.
- Click the Next button.
- On Profile, select all firewall profile options (Domain, Private, Public).
- Specify a name for the rule. For example, JDESMC_RDP
- Click the Finish button to save the rule and exit the wizard.
Enable Outbound Ports in the Firewall
If you have the Microsoft Windows firewall enabled for any profile (public, private, default), which is recommended, in order for One-Click Provisioning to deploy to the Deployment Server in the Microsoft Windows instance and for JD Edwards EnterpriseOne runtime to function properly, you will need to explicitly open Inbound and Outbound ports.
Use this procedure to open the Outbound ports in your Microsoft Windows instance.
- Go to Administrative Tools > Windows Firewall with Advanced Security.
- In the left pane, highlight Outbound Rules.
- In the right pane, Actions, click New Rule …
- On Rule Type, select the Port radio button as the type of rule to create.
- Click the Next button.
On Protocol and Ports:
- You can accept the default value of TCP for the protocol to which this rule applies.
- Choose the radio button for All remote ports.

- On Action, you can accept the default value which is Allow the connection.
- Click the Next button.
- On Profile, select all firewall profile options (Domain, Private, Public).
- Specify a name for the rule.
- Click the Finish button to save the rule and exit the wizard.
Change Security Option
If you chose a user other than opc for the One-Click Provisioning deployment of your Deployment Server, use this procedure to change the Microsoft Windows security option so that user is recognized by JD Edwards EnterpriseOne.
- Log in to the Deployment Server as the user you configured, which is other than the opc user.
-
Open the Microsoft Windows Local Security Policy program by going to Start and selecting Run, or by using this Command Prompt:
secpol.msc - On the Local Security Policy window, navigate to Local Policies and select Security Options.
-
Locate and edit this setting:
Network Security: LAN Manager authentication level
Use the drop-down listto select this setting:
Send NTLM V2 response only

- Click the Apply button to save the setting.