The Latest Oracle E-Business Suite Technology News direct from
Oracle E-Business Suite Development & Product Management

SAN and Wildcard Certificates Certified with EBS 12.2

Elke Phelps
Product Management Director

We are pleased to announce that Subject Alternative Name (SAN) and Wildcard Certificates are now certified with Oracle E-Business Suite 12.2 when enabling TLS.

Note: We previously announced certification of SAN and Wildcard Certificates with Oracle E-Business Suite Release 12.1.

What are SAN and Wildcard Certificates?

The use of the SAN field in a certificate request (CSR) allows you to specify multiple host names to be protected by a single public key certificate. Use of SAN will also allow using a single certificate for multiple domains.

A Wildcard Certificate is a public key certificate that can be used with multiple sub-domains of a domain.

Note: The latest releases of some browsers (e.g. Google Chrome) now require a SAN extension. Check your browser to determine if SAN is required.

How do you deploy SAN or Wildcard Certificates?

In the CSR SAN field, you may use the subjectAltName value, and optionally also use the wildcard character:

  • Example 1: SAN field entry for the CSR:

subjectAltName = DNS:www.example.com,DNS:example.com

  • Example 2: SAN field entry with a wildcard for the CSR:

subjectAltName = DNS:*.example.com

If you have already enabled TLS, you may need to redo your CSR using the SAN field. Check with your CA regarding their specific requirements for adding SAN. If you have not enabled TLS, simply follow the instructions for doing so, using the SAN field accordingly.

Note: We highly recommend that all customers migrate to TLS. If you have not already migrated to TLS, please do so as soon as possible.

For complete instructions, refer to the following My Oracle Support Knowledge Document:

Related Articles


Join the discussion

Comments ( 1 )
  • Narendra Buddhanna Wednesday, July 11, 2018
    "We highly recommend that ALL customers migrate to TLS." - what is the main reason behind this recommendation, please share

    why and who would opt for "end-to-end" TLS implementation (i.e., TLS at both OHS layer and Load Balancer layer) ?

    TLS termination at Load Balancer is enough to satisfy your recommendation ?

    Thank you
Please enter your name.Please provide a valid email address.Please enter a comment.CAPTCHA challenge response provided was incorrect. Please try again.