Testing the Enterprise Certificate

CAL authentication relies on establishing a secure (TLS 1.2) connection to the Simphony Enterprise. Each Simphony client being upgraded to release 2.9.1 or later needs to validate the enterprise server certificate and support the TLS 1.2 protocol to establish a secure connection to the Enterprise. The certificate is validated when a connection is established, and in some cases this may require external network access to a certificate authority.

Prior to client upgrade, Oracle recommends that you confirm that the server certificate can be validated on at least one workstation at the property. Skipping this step may cause the upgrade process to fail and requires additional manual steps. To test the enterprise certificate using a web browser:

  1. Log in to a Simphony workstation.
  2. Open the web browser, and then go to the secure EGateway URL that is used for CAL. If you do not know the URL, contact your system administrator or Oracle support representative.
  3. If a Lock symbol is displayed in the address bar, the client has been successfully validated. The Lock symbol and parts of the URL address bar may be green or grey. If an X, red symbol, or error appears, the client has not been validated. Immediately take steps to remedy the issue by contacting the appropriate representative within your organization, or contact your Oracle support representative to begin the remediation process.

    The location and appearance of the symbol vary based on the web browser.

    Warning

    Failure to perform this validation stops the upgrade process for the property. As the ability to validate a certificate is controlled by the client side network, there is very little that Oracle can do to remedy the issue other than provide information on what is required. It is the responsibility of the customer to ensure that these requirements are met.

    Figure 5-1 Valid Certificate Examples by Browser


    This figure shows examples of valid certificates based on the browser that you are using.

    Figure 5-2 Invalid Certificate Example


    This figure shows an example of an invalid server certificate.