A Configuring Oracle HTTP Server as Proxy
Oracle HTTP Server (OHS) can be used as a proxy server for Network Integrity. It can be installed in either collocated mode or in a standalone mode. Oracle recommends using the standalone mode to install OHS. This section provides instructions for installing OHS in standalone mode.
Directory Placeholders Used
Configuring Oracle HTTP Server as Proxy describes all the directory placeholders used in this section.
Table A-1 Description of Directory Placeholders
Placeholder | Directory Description |
---|---|
Oracle_Home | The home directory where OHS is installed. |
OHS_Domain |
The location where domain is created. The default location is Oracle_Home/user_projects/domains/OHS_DomainName where OHS_DomainName is the name of the OHS domain. |
OHS_Component | Component directory that is created during domain creation. |
Wallet_Path |
The directory where Oracle Wallet is created. By default, it is set to Oracle_Home/ohsfmw/user_projects/domains/OHS_DomainName/config/fmwconfig/components/OHS/instances/OHS_Component/keystores/Wallet_Name where Wallet_Name is the name of Oracle wallet. |
Configuring Oracle HTTP Server
To configure Oracle HTTP Server when installed in standalone domain:
Note:
For learning about the system requirements and specifications to install OHS, see Oracle Fusion Middleware System Requirements and Specifications.- Download and install Oracle HTTP Server 14.1.2.
For more information on installing Oracle HTTP Server, see Oracle Fusion Middleware Installing and Configuring Oracle HTTP Server.
- After installing Oracle HTTP Server, navigate to the /oracle_common/common/binOracle_Homedirectory and run the config.sh script to create a domain.
- After creating a domain, start the Node Manager.
If the node manager port of Oracle HTTP Server conflicts with the node manager port of WebLogic domain, change it using WLST.
- Start the Node Manager using the following options:
- Run the
./startNodeManager.sh
command. - Run the
nohup ./startNodeManger.sh
command to start the Node Manager with nohup.
You can locate this file in your OHS_Domain/bin directory.
Note:
Use the./stopNodeManager.sh
command to stop the Node Manager. - Run the
- Run the following command to view the
output:
tail -f nohup.out
- Once Node Manager is running, start your Oracle HTTP Server component
by using the following command and provide the node manager password
when
prompted:
./startComponent.sh ComponentName
A message indicating a successful connection to the component appears. You can locate this file in your OHS_Domain/bin directory.
- Access the following Oracle HTTP Server URL to verify that the Oracle HTTP Server is
running.
http://<OHS_HostName>:<OHS_NonSSLPort> or https://OHS_HostName:OHS_SSLPort
The Oracle HTTP Server welcome page appears.
Changing Node Manager Port
./wlst.sh
:[bin]$ ./wlst.sh Initializing WebLogic Scripting Tool (WLST) ... Welcome to WebLogic Server Administration Scripting Shell Type help() for help on available commands wls:/offline> readDomain('<Oracle_Home>/user_projects/domains/<OHS_DomainName>') wls:/offline/ohsop80idp4>cd('Machine') wls:/offline/ohsop80idp4/Machine>cd('localmachine') wls:/offline/ohsop80idp4/Machine/localmachine>cd('NodeManager') wls:/offline/ohsop80idp4/Machine/localmachine/NodeManager>cd('localmachine') wls:/offline/ohsop80idp4/Machine/localmachine/NodeManager/localmachine>ls() -rw- Adapter null -rw- AdapterName null -rw- AdapterVersion null -rw- DebugEnabled false -rw- Id 0 -rw- InstalledVMMAdapter -rw- ListenAddress localhost -rw- ListenPort 5556 -rw- NMSocketCreateTimeoutInMillis 15000 -rw- NMType null -rw- Name localmachine -rw- NodeManagerHome null -rw- Notes null -rw- PasswordEncrypted ******** -rw- ShellCommand null -rw- Tag -rw- UserName null wls:/offline/ohsop80idp4/Machine/localmachine/NodeManager/localmachine>set('ListenPort',5555) wls:/offline/ohsop80idp4/Machine/localmachine/NodeManager/localmachine>updateDomain() wls:/offline/ohsop80idp4/Machine/localmachine/NodeManager/localmachine>closeDomain() wls:/offline>exit() Exiting WebLogic Scripting Tool.
Updating the mod_wl_ohs.conf File
You must edit the mod_wl_ohs.conf file to enable the Oracle HTTP Server instance to forward requests to the applications deployed on the Oracle WebLogic Server or clusters.
To update the mod_wl_ohs.conf file:
- Navigate to <OHS_Domain>/config/fmwconfig/components/OHS/instances/<OHS_component> and open mod_wl_ohs.conf.
- Add directives as follows:
- To forward requests to the UIM application running on a single
Oracle WebLogic Server instance, specify
/NetworkIntegrity
within the<location>
element as follows:<Location /NetworkIntegrity > SetHandler weblogic-handler WebLogicHost host WebLogicPort port </Location>
Where:
host
is the name of the WebLogic Administration server machine.port
is the port of the server on which UIM is installed.
-
- To forward requests to the Network Integrity application running on
a cluster of Oracle WebLogic Server instances, specify
/NetworkIntegrity
within a new<location>
element as follows:<Location /NetworkIntegrity > SetHandler weblogic-handler WebLogicCluster host1:port1,host2:port2 </Location>
Where:
host1
andhost2
are host names of the managed servers.port1
andport2
are ports of the managed servers.
- To forward requests to the Network Integrity application running on
a cluster of Oracle WebLogic Server instances, specify
- To forward requests to the Network Integrity Web services running on a
single Oracle WebLogic Server instance, specify
/NetworkIntegrityApp-NetworkIntegrityControlWebService-context-root
within the
<location>
element as follows:<Location /NetworkIntegrityApp-NetworkIntegrityControlWebService-context-root> SetHandler weblogic-handler WebLogicHost host WebLogicPort port </Location>
Where:
host
is the name of the WebLogic Administration server machine.port
is the port of the server on which Network Integrity is installed.
- To forward requests to the Network Integrity application running on a single
Oracle WebLogic Server instance into which you want to deploy cartridges,
specify /cartridge within the
<location>
element as follows:<Location /cartridge> SetHandler weblogic-handler WebLogicHost host WebLogicPort port </Location>
Where:
host
is the name of the WebLogic Administration server machine.port
is the port of the server on which Network Integrity is installed.
- Similarly, specify
/em
within the<location>
element to access em console.<Location /cartridge> SetHandler weblogic-handler WebLogicHost host WebLogicPort port </Location>
Where:
host
is the name of the WebLogic Administration server machine.port
is the port of the server on which Network Integrity is installed.
- To forward requests to the UIM application running on a single
Oracle WebLogic Server instance, specify
Configuring SSL for OHS
Pre-requisite: The custom certificate and corresponding keystore should be generated for Network Integrity.
To configure SSL for OHS:
- Go to the path <OHS_Domain>/
config/fmwconfig/components/OHS/instances/<Component> /keystores/ and
create Oracle wallet for OHS as
follows:
./orapki wallet create -wallet <Wallet_Name> -auto_login_only ./orapki wallet add -wallet <Wallet_Name> -trusted_cert -cert <CERT_FILE> -auto_login_only
The wallet is created.
- Add keystore to the wallet as
follows:
./orapki wallet jks_to_pkcs12 -wallet <Wallet_Name> -keystore <Keystore file> -jkspwd <Password>
- Go to <Oracle_Home>/user_projects/domains/<OHS _Domain>/config/fmwconfig/components/OHS/instances/<OHS_Component> to edit the ssl.conf file. Search for Path to the wallet and update the SSLWallet sample path with the created wallet path.
- Update the mod_wl_ohs.conf file, located at
<Oracle_Home>/user_projects/domains/<OHS
Domain>/config/fmwconfig/components/OHS/instances/<OHS component> with
the created wallet as follows:
<IfModule weblogic_module> WLSSLWallet “<Wallet_Path>” </IfModule> SSL ports of managed servers should be mentioned for WeblogicCluster and add SecureProxy ON and WLProxySSLPassThrough ON parameters in <Location/>. Example: <Location /NetworkIntegrity > SetHandler weblogic-handler WebLogicCluster <Host1>:<MS1_SSL_Port>,<Host2>:<MS2_SSL_Port> Debug ALL DebugConfigInfo ON SecureProxy ON WLProxySSLPassThrough ON </Location>
- Restart the component after updating SSL and mod_wl_ohs.conf as follows:
./restartComponent.sh ComponentName
- Verify if all files are created in keystore, instance PEM, CRT, and SSO.
- Go to CL1. In General tabs, go to Advance Fields and enable the WebLogic plugin for Admin Server and Managed Servers.
- In the WebLogic console, update the frontend host and HTTPS port with the OHS host and port.
- To configure the SSL Policy/Certificate in WebLogic Console, follow the procedure provided in Network Integrity System Administrator's Guide.