Configuring OBIEE 11.1.1.7.x with Full End to End SSL

What do we need to configure SSL:
1. CA Root Certificate
2. CA Intermediate Certificate (if exists)
3. Java Keystores :: Identity Keystore and Trust Keystore
4. OBIEE Server Certificate
5. If External LDAP Directory like Oracle Internet Directory running in SSL
   OID Server’s CA Root Certificate
   OID Server’s CA Intermediate Certificate (if exists)
   OID Server Certificate

This is a Test Environment where OBIEE is configured in SSL with External LDAP (OID) in SSL. Here it is documented with OBIEE 11.1.1.7.1 Enterprise Install on a Single Machine, No Scaling is done.

Link to Download the document > https://blogs.oracle.com/pa/resource/Configuring_OBIEE_with_Ful_End_to_End_SSL.pdf

Links to Official documentations below:
OBIEE Security Guide: http://docs.oracle.com/cd/E28280_01/bi.1111/e10543/toc.htm


Comments:

Oracle today released the April 2014 Critical Patch Update. This Critical Patch Update provides fixes for 104 vulnerabilities across a number of product lines including: Oracle Database, Oracle Fusion Middleware, Oracle Hyperion, Oracle Supply Chain Product Suite, Oracle iLearning, Oracle PeopleSoft Enterprise, Oracle Siebel CRM, Oracle Java SE, Oracle and Sun Systems Products Suite, Oracle Linux and Virtualization, and Oracle MySQL. A number of the vulnerabilities fixed in this Critical Patch Update have high CVSS Base Score and are being highlighted in this blog entry. Oracle recommends this Critical Patch Update be applied as soon as possible.

Posted by it support london on July 18, 2014 at 05:01 AM PDT #

This Critical Patch Update also provides fixes for 20 Fusion Middleware vulnerabilities. The highest CVSS Base Score for these Fusion Middleware vulnerabilities is 7.5. This score affects one remotely exploitable without

Posted by it support essex on July 18, 2014 at 05:05 AM PDT #

Post a Comment:
  • HTML Syntax: NOT allowed