Skip Headers
Oracle® Fusion Middleware Administrator's Guide
11
g
Release 1 (11.1.1)
Part Number E10105-02
Home
Book List
Index
Contact Us
Next
View PDF
Contents
List of Figures
List of Tables
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
What's New in This Guide?
New Features for Oracle Fusion Middleware 11
g
Release 1 (11.1.1.2)
New Features for Oracle Fusion Middleware 11
g
Release 1 (11.1.1)
Part I Understanding Oracle Fusion Middleware
1
Introduction to Oracle Fusion Middleware
1.1
What Is Oracle Fusion Middleware?
1.2
Oracle Fusion Middleware Components
2
Understanding Oracle Fusion Middleware Concepts
2.1
Understanding Key Oracle Fusion Middleware Concepts
2.2
What Is an Oracle WebLogic Server Domain?
2.2.1
What Is the Administration Server?
2.2.2
Understanding Managed Servers and Managed Server Clusters
2.2.3
What Is Node Manager?
2.3
What Is an Oracle Instance?
2.4
What Is a Middleware Home?
2.5
What Is a WebLogic Server Home?
2.6
What Is an Oracle Home and the Oracle Common Home?
Part II Basic Administration
3
Getting Started Managing Oracle Fusion Middleware
3.1
Setting Up Environment Variables
3.2
Overview of Oracle Fusion Middleware Administration Tools
3.3
Getting Started Using Oracle Enterprise Manager Fusion Middleware Control
3.3.1
Displaying Fusion Middleware Control
3.3.2
Using Fusion Middleware Control Help
3.3.3
Navigating Within Fusion Middleware Control
3.3.4
Understanding Users and Roles for Fusion Middleware Control
3.3.5
Viewing and Managing the Farm
3.3.6
Viewing and Managing Components
3.3.7
Viewing the Status of Applications
3.4
Getting Started Using Oracle WebLogic Server Administration Console
3.4.1
Displaying the Oracle WebLogic Server Administration Console
3.4.2
Locking the WebLogic Server Configuration
3.5
Getting Started Using Command-Line Tools
3.5.1
Getting Started Using the Oracle WebLogic Scripting Tool (WLST)
3.5.1.1
Using Custom WLST Commands
3.5.1.2
Using WLST Commands for System Components
3.5.2
Getting Started Using Oracle Process Manager and Notification Server
3.6
Getting Started Using the Fusion Middleware Control MBean Browsers
3.6.1
Using the System MBean Browser
3.6.2
Using the MBeans for a Selected Application
3.7
Managing Components
3.8
Changing the Administrative User Password
3.8.1
Changing the Administrative User Password Using the Command Line
3.8.2
Changing the Administrative User Password Using the Administration Console
3.9
Basic Tasks for Configuring and Managing Oracle Fusion Middleware
4
Starting and Stopping Oracle Fusion Middleware
4.1
Overview of Starting and Stopping Procedures
4.2
Starting and Stopping Oracle WebLogic Server Instances
4.2.1
Starting and Stopping Administration Servers
4.2.2
Starting and Stopping Managed Servers Using WLST
4.2.3
Starting and Stopping Managed Servers Using Fusion Middleware Control
4.2.4
Configuring Node Manager to Start Managed Servers
4.3
Starting and Stopping Components
4.3.1
Starting and Stopping Components Using the Command Line
4.3.2
Starting and Stopping Components Using Fusion Middleware Control
4.4
Starting and Stopping Fusion Middleware Control
4.5
Starting and Stopping Oracle Management Agent
4.6
Starting and Stopping Applications
4.6.1
Starting and Stopping Java EE Applications Using WLST
4.6.2
Starting and Stopping Applications Using Fusion Middleware Control
4.7
Starting and Stopping Your Oracle Fusion Middleware Environment
4.7.1
Starting an Oracle Fusion Middleware Environment
4.7.2
Stopping an Oracle Fusion Middleware Environment
4.8
Starting and Stopping: Special Topics
4.8.1
Starting and Stopping in High Availability Environments
4.8.2
Forcing a ShutDown of Oracle Database
5
Managing Ports
5.1
About Managing Ports
5.2
Viewing Port Numbers
5.2.1
Viewing Port Numbers Using the Command Line
5.2.2
Viewing Port Numbers Using Fusion Middleware Control
5.3
Changing the Port Numbers Used by Oracle Fusion Middleware
5.3.1
Changing the Oracle WebLogic Server Listen Ports
5.3.1.1
Changing the Oracle WebLogic Server Listen Ports Using Fusion Middleware Control
5.3.1.2
Changing the Oracle WebLogic Server Listen Ports Using WLST
5.3.2
Changing the Oracle HTTP Server Listen Ports
5.3.2.1
Enabling Oracle HTTP Server to Run as Root for Ports Set to Less Than 1024 (UNIX Only)
5.3.2.2
Changing the Oracle HTTP Server Non-SSL Listen Port
5.3.2.3
Changing the Oracle HTTP Server SSL Listen Port
5.3.3
Changing Oracle Web Cache Ports
5.3.4
Changing OPMN Ports (ONS Local, Request, and Remote)
5.3.5
Changing Oracle Portal Ports
5.3.5.1
Changing the Oracle Portal Midtier Port
5.3.5.2
Changing the Oracle Web Cache Invalidation Port for Oracle Portal
5.3.5.3
Changing Oracle Portal Oracle Internet Directory Port
5.3.5.4
Changing PPE Loopback Port
5.3.5.5
Changing Oracle Portal SQL*Net Listener Port
5.3.5.6
Restarting WLS_PORTAL Managed Server
5.3.6
Changing the Oracle Database Net Listener Port
5.3.6.1
Changing the KEY Value for an IPC Listener
Part III Secure Sockets Layer
6
SSL Configuration in Oracle Fusion Middleware
6.1
How SSL Works
6.1.1
What SSL Provides
6.1.2
About Private and Public Key Cryptography
6.1.3
Keystores and Wallets
6.1.4
How SSL Sessions Are Conducted
6.2
About SSL in Oracle Fusion Middleware
6.2.1
SSL in the Oracle Fusion Middleware Architecture
6.2.2
Keystores and Oracle Wallets
6.2.3
Authentication Modes
6.2.4
Tools for SSL Configuration
6.3
Configuring SSL for Configuration Tools
6.3.1
Oracle Enterprise Manager Fusion Middleware Control
6.3.2
Oracle WebLogic Server Administration Console
6.3.3
WLST Command-Line Tool
6.4
Configuring SSL for the Web Tier
6.4.1
Configuring Load Balancers
6.4.2
Enabling SSL for Oracle Web Cache Endpoints
6.4.2.1
Enable Inbound SSL for Oracle Web Cache Using Fusion Middleware Control
6.4.2.2
Enable Inbound SSL for Oracle Web Cache Using WLST
6.4.2.3
Enable Outbound SSL for Oracle Web Cache Using Fusion Middleware Control
6.4.2.4
Specify the Wallet for Outbound SSL from Oracle Web Cache Using WLST
6.4.3
Enabling SSL for Oracle HTTP Server Virtual Hosts
6.4.3.1
Enable SSL for Inbound Requests to Oracle HTTP Server Virtual Hosts Using Fusion Middleware Control
6.4.3.2
Enable SSL for Inbound Requests to Oracle HTTP Server Virtual Hosts Using WLST
6.4.3.3
Enable SSL for Outbound Requests from Oracle HTTP Server
6.5
Configuring SSL for the Middle Tier
6.5.1
Configuring SSL for Oracle WebLogic Server
6.5.1.1
Inbound SSL to Oracle WebLogic Server
6.5.1.2
Outbound SSL from Oracle WebLogic Server
6.5.1.2.1
Outbound SSL from Oracle Platform Security Services to LDAP
6.5.1.2.2
Outbound SSL from LDAP Authenticator to LDAP
6.5.1.2.3
Outbound SSL to Database
6.5.2
Configuring SSL for Oracle SOA Suite
6.5.3
Configuring SSL for Oracle WebCenter
6.5.4
Configuring SSL for Oracle Identity and Access Management
6.5.4.1
Configuring SSL for Oracle Directory Integration Platform
6.5.4.2
Configuring SSL for Oracle Identity Federation
6.5.4.3
Configuring SSL for Oracle Directory Services Manager
6.5.5
SSL-Enable Oracle Reports, Forms, Discoverer, and Portal
6.5.5.1
SSL for Oracle Reports
6.5.5.2
SSL for Oracle Forms
6.5.5.3
SSL for Oracle Discoverer
6.5.5.4
SSL for Oracle Portal
6.5.6
Client-Side SSL for Applications
6.6
Configuring SSL for the Data Tier
6.6.1
Enabling SSL on Oracle Internet Directory Listeners
6.6.1.1
Enable Inbound SSL on an Oracle Internet Directory Listener Using Fusion Middleware Control
6.6.1.2
Enabling Inbound SSL on an Oracle Internet Directory Listener Using WLST
6.6.1.3
Enabling Outbound SSL from Oracle Internet Directory to Oracle Database
6.6.2
Enabling SSL on Oracle Virtual Directory Listeners
6.6.2.1
Enable SSL for Oracle Virtual Directory Using Fusion Middleware Control
6.6.2.2
Enabling SSL on an Oracle Virtual Directory Listener Using WLST
6.6.3
Configuring SSL for the Database
6.6.3.1
SSL-Enable Oracle Database
6.6.3.2
SSL-Enable a Data Source
6.7
Advanced SSL Scenarios
6.7.1
Hardware Security Modules and Accelerators
6.7.2
CRL Integration with SSL
6.7.2.1
Configuring CRL Validation for a Component
6.7.2.2
Manage CRLs on the File System
6.7.2.3
Test a Component Configured for CRL Validation
6.8
Best Practices for SSL
6.8.1
Best Practices for Administrators
6.8.2
Best Practices for Application Developers
6.9
WLST Reference for SSL
6.9.1
addCertificateRequest
6.9.1.1
Description
6.9.1.2
Syntax
6.9.1.3
Example
6.9.2
addSelfSignedCertificate
6.9.2.1
Description
6.9.2.2
Syntax
6.9.2.3
Example
6.9.3
changeKeyStorePassword
6.9.3.1
Description
6.9.3.2
Syntax
6.9.3.3
Example
6.9.4
changeWalletPassword
6.9.4.1
Description
6.9.4.2
Syntax
6.9.4.3
Example
6.9.5
configureSSL
6.9.5.1
Description
6.9.5.2
Syntax
6.9.5.3
Examples
6.9.6
createKeyStore
6.9.6.1
Description
6.9.6.2
Syntax
6.9.6.3
Example
6.9.7
createWallet
6.9.7.1
Description
6.9.7.2
Syntax
6.9.7.3
Examples
6.9.8
deleteKeyStore
6.9.8.1
Description
6.9.8.2
Syntax
6.9.8.3
Example
6.9.9
deleteWallet
6.9.9.1
Description
6.9.9.2
Syntax
6.9.9.3
Example
6.9.10
exportKeyStore
6.9.10.1
Description
6.9.10.2
Syntax
6.9.10.3
Example
6.9.11
exportKeyStoreObject
6.9.11.1
Description
6.9.11.2
Syntax
6.9.11.3
Examples
6.9.12
exportWallet
6.9.12.1
Description
6.9.12.2
Syntax
6.9.12.3
Examples
6.9.13
exportWalletObject
6.9.13.1
Description
6.9.13.2
Syntax
6.9.13.3
Examples
6.9.14
generateKey
6.9.14.1
Description
6.9.14.2
Syntax
6.9.14.3
Examples
6.9.15
getKeyStoreObject
6.9.15.1
Description
6.9.15.2
Syntax
6.9.15.3
Examples
6.9.16
getSSL
6.9.16.1
Description
6.9.16.2
Syntax
6.9.16.3
Example
6.9.17
getWalletObject
6.9.17.1
Description
6.9.17.2
Syntax
6.9.17.3
Examples
6.9.18
importKeyStore
6.9.18.1
Description
6.9.18.2
Syntax
6.9.18.3
Example
6.9.19
importKeyStoreObject
6.9.19.1
Description
6.9.19.2
Syntax
6.9.19.3
Examples
6.9.20
importWallet
6.9.20.1
Description
6.9.20.2
Syntax
6.9.20.3
Examples
6.9.21
importWalletObject
6.9.21.1
Description
6.9.21.2
Syntax
6.9.21.3
Examples
6.9.22
listKeyStoreObjects
6.9.22.1
Description
6.9.22.2
Syntax
6.9.22.3
Examples
6.9.23
listKeyStores
6.9.23.1
Description
6.9.23.2
Syntax
6.9.23.3
Example
6.9.24
listWalletObjects
6.9.24.1
Description
6.9.24.2
Syntax
6.9.24.3
Examples
6.9.25
listWallets
6.9.25.1
Description
6.9.25.2
Syntax
6.9.25.3
Example
6.9.26
removeKeyStoreObject
6.9.26.1
Description
6.9.26.2
Syntax
6.9.26.3
Examples
6.9.27
removeWalletObject
6.9.27.1
Description
6.9.27.2
Syntax
6.9.27.3
Examples
6.9.28
Properties Files for SSL
6.9.28.1
Structure of Properties Files
6.9.28.2
Examples of Properties Files
7
Managing Keystores, Wallets, and Certificates
7.1
Key and Certificate Storage in Oracle Fusion Middleware
7.1.1
Types of Keystores
7.1.1.1
JKS Keystore and Truststore
7.1.1.2
Oracle Wallet
7.1.2
Keystore Management Tools
7.2
Command-Line Interface for Keystores and Wallets
7.3
JKS Keystore Management
7.3.1
About Keystores and Certificates
7.3.1.1
Sharing Keystores Across Instances
7.3.1.2
Keystore Naming Conventions
7.3.2
Managing the Keystore Life Cycle
7.3.3
Common Keystore Operations
7.3.3.1
Creating a Keystore Using Fusion Middleware Control
7.3.3.2
Creating a Keystore Using WLST
7.3.3.3
Exporting a Keystore Using Fusion Middleware Control
7.3.3.4
Exporting a Keystore Using WLST
7.3.3.5
Deleting a Keystore Using Fusion Middleware Control
7.3.3.6
Deleting a Keystore Using WLST
7.3.3.7
Importing a Keystore Using Fusion Middleware Control
7.3.3.8
Importing a Keystore Using WLST
7.3.3.9
Changing the Keystore Password Using Fusion Middleware Control
7.3.3.10
Changing the Keystore Password Using WLST
7.3.4
Managing the Certificate Life Cycle
7.3.5
Common Certificate Operations
7.3.5.1
Generating a New Key for the Keystore Using Fusion Middleware Control
7.3.5.2
Generating a New Key for the Keystore Using WLST
7.3.5.3
Generating a Certificate Signing Request Using Fusion Middleware Control
7.3.5.4
Generating a Certificate Signing Request Using WLST
7.3.5.5
Importing a Certificate or Trusted Certificate into a Keystore Using Fusion Middleware Control
7.3.5.6
Importing a Certificate or Trusted Certificate into a Keystore Using WLST
7.3.5.7
Exporting a Certificate or Trusted Certificate from the Keystore Using Fusion Middleware Control
7.3.5.8
Exporting a Certificate or Trusted Certificate from the Keystore Using WLST
7.3.5.9
Deleting a Certificate or Trusted Certificate from the Keystore Using Fusion Middleware Control
7.3.5.10
Deleting a Certificate or Trusted Certificate from the Keystore Using WLST
7.3.5.11
Converting a Self-Signed Certificate to a Third-Party Certificate Using Fusion Middleware Control
7.3.5.12
Converting a Self-Signed Certificate to a Third-Party Certificate Using WLST
7.3.6
Keystore and Certificate Maintenance
7.3.6.1
Location of Keystores
7.3.6.2
Replacing Expiring Certificates
7.3.6.3
Effect of Host Name Change on Keystores
7.4
Wallet Management
7.4.1
About Wallets and Certificates
7.4.1.1
Password-Protected and Autologin Wallets
7.4.1.2
Self-Signed and Third-Party Wallets
7.4.1.3
Sharing Wallets Across Instances
7.4.1.4
Wallet Naming Conventions
7.4.2
Accessing the Wallet Management Page in Fusion Middleware Control
7.4.3
Managing the Wallet Life Cycle
7.4.4
Common Wallet Operations
7.4.4.1
Creating a Wallet Using Fusion Middleware Control
7.4.4.2
Creating a Wallet Using WLST
7.4.4.3
Creating a Self-Signed Wallet Using Fusion Middleware Control
7.4.4.4
Creating a Self-Signed Wallet Using WLST
7.4.4.5
Changing a Self-Signed Wallet to a Third-Party Wallet Using Fusion Middleware Control
7.4.4.6
Changing a Self-Signed Wallet to a Third-Party Wallet Using WLST
7.4.4.7
Exporting a Wallet Using Fusion Middleware Control
7.4.4.8
Exporting a Wallet Using WLST
7.4.4.9
Importing a Wallet Using Fusion Middleware Control
7.4.4.10
Importing a Wallet Using WLST
7.4.4.11
Deleting a Wallet Using Fusion Middleware Control
7.4.4.12
Deleting a Wallet Using WLST
7.4.5
Managing the Certificate Life Cycle
7.4.6
Accessing the Certificate Management Page for Wallets in Fusion Middleware Control
7.4.7
Common Certificate Operations
7.4.7.1
Adding a Certificate Request Using Fusion Middleware Control
7.4.7.2
Adding a Certificate Request Using WLST
7.4.7.3
Exporting a Certificate, Certificate Request, or a Trusted Certificate Using Fusion Middleware Control
7.4.7.4
Exporting a Certificate, Certificate Request, or a Trusted Certificate Using WLST
7.4.7.5
Importing a Certificate or a Trusted Certificate Using Fusion Middleware Control
7.4.7.6
Importing a Certificate or a Trusted Certificate Using WLST
7.4.7.7
Deleting a Certificate Request, a Certificate, or a Trusted Certificate Using Fusion Middleware Control
7.4.7.8
Deleting a Certificate Request, a Certificate, or a Trusted Certificate Using WLST
7.4.7.9
Converting a Self-Signed Certificate into a Third-Party Certificate Using Fusion Middleware Control
7.4.7.10
Converting a Self-Signed Certificate into a Third-Party Certificate Using WLST
7.4.8
Wallet and Certificate Maintenance
7.4.8.1
Location of Wallets
7.4.8.2
Effect of Host Name Change on a Wallet
7.4.8.3
Changing a Self-Signed Wallet to a Third-Party Wallet
7.4.8.4
Replacing an Expiring Certificate in a Wallet
Part IV Deploying Applications
8
Understanding the Deployment Process
8.1
What Is a Deployer?
8.2
General Procedures for Moving from Application Design to Production Deployment
8.2.1
Designing and Developing an Application
8.2.2
Deploying an Application to Managed Servers
8.2.3
Automating the Migration of an Application to Other Environments
8.3
Diagnosing Typical Problems
9
Deploying Applications
9.1
Overview of Deploying Applications
9.1.1
Understanding Deployment, Redeployment, and Undeployment
9.1.2
What Types of Applications Can You Deploy?
9.2
Understanding Data Sources
9.3
Deploying, Undeploying, and Redeploying Java EE Applications
9.3.1
Deploying Java EE Applications
9.3.1.1
Deploying Java EE Applications Using Fusion Middleware Control
9.3.1.2
Deploying Java EE Applications Using WLST
9.3.2
Undeploying Java EE Applications
9.3.2.1
Undeploying Java EE Applications Using Fusion Middleware Control
9.3.2.2
Undeploying Java EE Applications Using WLST
9.3.3
Redeploying Java EE Applications
9.3.3.1
Redeploying Java EE Applications Using Fusion Middleware Control
9.3.3.2
Redeploying Java EE Applications Using WLST
9.4
Deploying, Undeploying, and Redeploying Oracle ADF Applications
9.4.1
Deploying Oracle ADF Applications
9.4.1.1
Deploying ADF Applications Using Fusion Middleware Control
9.4.1.2
Deploying ADF Applications Using WLST or the Administration Console
9.4.2
Undeploying Oracle ADF Applications
9.4.3
Redeploying Oracle ADF Applications
9.5
Deploying, Undeploying, and Redeploying SOA Composite Applications
9.5.1
Deploying SOA Composite Applications
9.5.2
Undeploying SOA Composite Applications
9.5.3
Redeploying SOA Composite Applications
9.6
Deploying, Undeploying, and Redeploying WebCenter Applications
9.6.1
Deploying WebCenter Applications
9.6.2
Undeploying WebCenter Applications
9.6.3
Redeploying WebCenter Applications
9.7
Changing MDS Configuration Attributes for Deployed Applications
9.7.1
Changing the MDS Configuration Attributes Using Fusion Middleware Control
9.7.2
Changing the MDS Configuration Using WLST
Part V Monitoring Oracle Fusion Middleware
10
Monitoring Oracle Fusion Middleware
10.1
Monitoring the Status of Oracle Fusion Middleware
10.1.1
Viewing General Information
10.1.2
Monitoring an Oracle WebLogic Server Domain
10.1.3
Monitoring an Oracle WebLogic Server Administration or Managed Server
10.1.4
Monitoring a Cluster
10.1.5
Monitoring a Component
10.1.6
Monitoring Java EE Applications
10.1.7
Monitoring ADF Applications
10.1.8
Monitoring SOA Composite Applications
10.1.9
Monitoring Oracle WebCenter Applications
10.2
Viewing the Performance of Oracle Fusion Middleware
10.3
Viewing the Routing Topology
11
Managing Log Files and Diagnostic Data
11.1
Overview of Oracle Fusion Middleware Logging
11.2
Understanding ODL Messages and ODL Log Files
11.3
Searching and Viewing Log Files
11.3.1
Searching Log Files
11.3.1.1
Searching Log Files Using Fusion Middleware Control
11.3.1.1.1
Searching Log Files: Basic Searches
11.3.1.1.2
Searching Log Files: Advanced Searches
11.3.1.2
Searching Log Files Using WLST
11.3.2
Viewing Log Files and Their Messages
11.3.2.1
Viewing Log Files and Their Messages Using Fusion Middleware Control
11.3.2.2
Viewing Log Files and Their Messages Using WLST
11.3.3
Downloading Log Files
11.3.3.1
Downloading Log Files Using Fusion Middleware Control
11.3.3.2
Downloading Log Files Using WLST
11.4
Configuring Settings for Log Files
11.4.1
Changing Log File Locations
11.4.1.1
Changing Log File Locations Using Fusion Middleware Control
11.4.1.2
Changing Log File Locations Using WLST
11.4.2
Configuring Log File Rotation
11.4.2.1
Specifying Log File Rotation Using Fusion Middleware Control
11.4.2.2
Specifying Log File Rotation Using WLST
11.4.3
Setting the Level of Information Written to Log Files
11.4.3.1
Configuring Message Levels Using Fusion Middleware Control
11.4.3.2
Configuring Message Levels Using WLST
11.4.4
Specifying the Log File Format
11.4.4.1
Specifying the Log File Format Using Fusion Middleware Control
11.4.4.2
Specifying the Log File Format Using WLST
11.4.5
Specifying the Log File Locale
11.4.5.1
Specifying the Log File Encoding Using WLST
11.4.5.2
Specifying the Log File Encoding in logging.xml
11.5
Correlating Messages Across Log Files and Components
12
Diagnosing Problems
12.1
Understanding the Diagnostic Framework
12.1.1
About Incidents and Problems
12.1.1.1
Incident Flood Control
12.1.2
Diagnostic Framework Components
12.1.2.1
Automatic Diagnostic Repository
12.1.2.2
Diagnostic Dumps
12.1.2.3
Management MBeans
12.1.2.4
WLST Commands for Diagnostic Framework
12.1.2.5
ADCRI Command-Line Utility
12.2
How the Diagnostic Framework Works
12.3
Configuring the Diagnostic Framework
12.3.1
Configuring Diagnostic Framework Settings
12.3.2
Configuring WLDF Watch and Notification for the Diagnostic Framework
12.4
Investigating, Reporting, and Solving a Problem
12.4.1
Roadmap—Investigating, Reporting, and Resolving a Problem
12.4.2
Viewing Problems and Incidents
12.4.2.1
Viewing Problems
12.4.2.2
Viewing Incidents
12.4.3
Working with Diagnostic Dumps
12.4.3.1
Listing Diagnostic Dumps
12.4.3.2
Viewing a Description of a Diagnostic Dump
12.4.3.3
Executing Dumps
12.4.4
Managing Incidents
12.4.4.1
Creating an Incident Manually
12.4.4.2
Packaging an Incident
12.4.4.3
Purging Incidents
Part VI Advanced Administration
13
Managing the Metadata Repository
13.1
Understanding a Metadata Repository
13.2
Creating a Database-Based Metadata Repository
13.3
Managing the MDS Repository
13.3.1
Understanding the MDS Repository
13.3.1.1
Understanding MDS Operations
13.3.2
Registering and Deregistering a Database-Based Metadata Repository
13.3.2.1
Registering a Database-Based MDS Repository
13.3.2.2
Deregistering a Database-Based MDS Repository
13.3.3
Registering and Deregistering a File-Based Metadata Repository
13.3.3.1
Creating and Registering a File-Based Metadata Repository
13.3.3.2
Deregistering a File-Based Repository
13.3.4
Viewing Information about an MDS Repository
13.3.5
Listing Repositories and Partitions
13.3.6
Configuring an Application to Use a Different MDS Repository or Partition
13.3.6.1
Cloning a Partition
13.3.6.2
Creating a New Partition and Reassociating the Application to It
13.3.6.3
Changing the System Data Source
13.3.7
Moving Metadata from a Test System to a Production System
13.3.8
Moving from a File-Based Repository to a Database-Based Repository
13.3.9
Deleting a Metadata Partition from a Repository
13.3.9.1
Deleting a Metadata Partition Using WLST
13.3.9.2
Deleting a Metadata Partition Using Fusion Middleware Control
13.3.10
Purging Metadata Version History
13.3.11
Managing Metadata Labels in the MDS Repository
13.3.11.1
Creating Metadata Labels
13.3.11.2
Deleting Metadata Labels
13.3.11.3
Listing Metadata Labels
13.3.11.4
Promoting Metadata Labels
13.4
Managing Metadata Repository Schemas
13.4.1
Changing Metadata Repository Schema Passwords
13.4.2
Changing the Character Set of the Metadata Repository
14
Changing Network Configurations
14.1
Changing the Network Configuration
14.1.1
Changing the Network Configuration of a Managed Server
14.1.2
Changing the Network Configuration of Web Tier Components
14.2
Changing the Network Configuration of a Database
14.3
Moving Between On-Network and Off-Network
14.3.1
Moving from Off-Network to On-Network (Static IP Address)
14.3.2
Moving from Off-Network to On-Network (DHCP)
14.3.3
Moving from On-Network to Off-Network (Static IP Address)
14.4
Changing Between a Static IP Address and DHCP
14.4.1
Changing from a Static IP Address to DHCP
14.4.2
Changing from DHCP to a Static IP Address
14.5
Using IPV6
14.5.1
Supported Topologies for IPv6 Network Protocols
14.5.2
Configuring Oracle HTTP Server for IPv6
14.5.3
Disabling IPv6 Support for Oracle Web Cache
14.5.4
Configuring Oracle Single Sign-On to Use Oracle HTTP Server with IPv6
14.5.5
Configuring Oracle Access Manager Support for IPv6
14.5.5.1
Simple Authentication with IPv6
14.5.5.2
Configuring IPv6 with an Authenticating WebGate and Challenge Redirect
14.5.5.3
Considerations
14.5.5.4
Prerequisites
14.5.5.5
Configuring IPv6 with Simple Authentication
14.5.5.6
Configuring IPv6 with an Authenticating WebGate and Challenge Redirect
14.5.5.7
Configuring IPv6: Separate Proxy for Authentication and Resource WebGates
Part VII Advanced Administration: Backup and Recovery
15
Introducing Backup and Recovery
15.1
Understanding Oracle Fusion Middleware Backup and Recovery
15.1.1
Impact of Administration Server Failure
15.1.2
Managed Server Independence (MSI) Mode
15.1.3
Configuration Changes in Managed Servers
15.2
Oracle Fusion Middleware Directory Structure
15.3
Overview of the Backup Strategies
15.3.1
Types of Backups
15.3.2
Recommended Backup Strategy
15.4
Overview of Recovery Strategies
15.4.1
Types of Recovery
15.4.2
Recommended Recovery Strategies
15.5
Backup and Recovery Recommendations for Oracle Fusion Middleware Components
15.5.1
Backup and Recovery Recommendations for Oracle SOA Suite
15.5.1.1
Backup and Recovery Recommendations for Oracle BPEL Process Manager
15.5.1.2
Backup and Recovery Recommendations for Oracle Business Activity Monitoring
15.5.1.3
Backup and Recovery Recommendations for Oracle B2B
15.5.1.4
Backup and Recovery Recommendations for Oracle Business Rules
15.5.1.5
Backup and Recovery Recommendations for Oracle WebLogic Server JMS
15.5.2
Backup and Recovery Recommendations for Oracle WebCenter
15.5.2.1
Backup and Recovery Recommendations for Oracle WebCenter
15.5.2.2
Backup and Recovery Recommendations for Oracle WebCenter Portlets
15.5.2.3
Backup and Recovery Recommendations for Oracle WebCenter Discussions Server
15.5.2.4
Backup and Recovery Recommendations for Oracle WebCenter Wiki and Blog Server
15.5.2.5
Backup and Recovery Recommendations for Oracle Content Server
15.5.3
Backup and Recovery Recommendations for Oracle Identity Management
15.5.3.1
Backup and Recovery Recommendations for Oracle Internet Directory
15.5.3.2
Backup and Recovery Recommendations for Oracle Virtual Directory
15.5.3.3
Backup and Recovery Recommendations for Oracle Directory Integration Platform
15.5.3.4
Backup and Recovery Recommendations for Oracle Directory Services Manager
15.5.3.5
Backup and Recovery Recommendations for Oracle Identity Federation
15.5.4
Backup and Recovery Recommendations for Oracle JRF Installations
15.5.4.1
Backup and Recovery Recommendations for Oracle Web Services Manager
15.5.4.2
Backup and Recovery Recommendations for Oracle Platform Security Services
15.5.5
Backup and Recovery Recommendations for Web Tier Installations
15.5.5.1
Backup and Recovery Recommendations for Oracle HTTP Server
15.5.5.2
Backup and Recovery Recommendations for Oracle Web Cache
15.5.6
Backup and Recovery Recommendations for Oracle Portal, Oracle Forms Services, and Oracle Reports Installations
15.5.6.1
Backup and Recovery Recommendations for Oracle Portal
15.5.6.2
Backup and Recovery Recommendations for Oracle Forms Services
15.5.6.3
Backup and Recovery Recommendations for Oracle Reports
15.5.6.4
Backup and Recovery Recommendations for Oracle Business Intelligence Discoverer
15.6
Assumptions and Restrictions
16
Backing Up Your Environment
16.1
Overview of Backing Up Your Environment
16.2
Limitations and Restrictions for Backing Up Data
16.3
Performing a Backup
16.3.1
Performing a Full Offline Backup
16.3.2
Performing an Online Backup of Run-Time Artifacts
16.4
Creating a Record of Your Oracle Fusion Middleware Configuration
17
Recovering Your Environment
17.1
Overview of Recovering Your Environment
17.2
Recovering After Data Loss, Corruption, Media Failure, or Application Malfunction
17.2.1
Recovering a Middleware Home
17.2.2
Recovering an Oracle WebLogic Server Domain
17.2.3
Recovering an Oracle Instance Home
17.2.3.1
Recovering After Oracle Instance Home Deleted from File System
17.2.3.2
Recovering After Oracle Instance Home Deregistered
17.2.4
Recovering the Administration Server Configuration
17.2.5
Recovering a Managed Server
17.2.5.1
Recovering a Managed Server When It Cannot Be Started
17.2.5.2
Recovering a Managed Server When It Does Not Function Correctly
17.2.5.3
Recovering an Oracle SOA Suite Managed Server That Has a Separate Directory
17.2.6
Recovering Components
17.2.6.1
Recovering After a Component's Files Are Deleted or Corrupted
17.2.6.2
Recovering a Component That Is Not Functioning Properly After Configuration Change
17.2.6.3
Recovering Components After Cluster Configuration Change
17.2.7
Recovering a Cluster
17.2.7.1
Recovering a Cluster After Deletion or Cluster-Level Configuration Changes
17.2.7.2
Recovering a Cluster After Membership Is Mistakenly Modified
17.2.8
Recovering Applications
17.2.8.1
Recovering Application Artifacts
17.2.8.2
Recovering a Redeployed Application That Is No Longer Functional
17.2.8.3
Recovering an Undeployed Application
17.2.8.4
Recovering a Composite Application
17.2.9
Recovering a Database
17.3
Recovering After Loss of Host
17.3.1
Recovering After Loss of Administration Server Host
17.3.1.1
Recovering the Administration Server to the Same Host
17.3.1.2
Recovering the Administration Server to a Different Host
17.3.2
Recovering After Loss of Managed Server Host
17.3.2.1
Recovering a Managed Server to the Same Host
17.3.2.2
Recovering a Managed Server to a Different Host
17.3.2.3
Recovering an Oracle SOA Suite Managed Server That Has a Separate Directory
17.3.3
Recovering After Loss of Component
17.3.3.1
Recovering a Java Component to the Same Host
17.3.3.2
Recovering a Java Component to a Different Host
17.3.3.3
Recovering a System Component to the Same Host
17.3.3.4
Recovering a System Component to a Different Host
17.3.3.5
Recovering Oracle SOA Suite After Loss of Host
17.3.3.6
Recovering Oracle Business Activity Monitoring to a Different Host
17.3.3.7
Recovering Oracle WebCenter to a Different Host
17.3.3.8
Recovering Web Tier Components to a Different Host
17.3.3.8.1
Recovering Oracle HTTP Server to a Different Host
17.3.3.8.2
Recovering Oracle Web Cache to a Different Host
17.3.3.9
Recovering Identity Management Components to a Different Host
17.3.3.9.1
Recovering Oracle Internet Directory to a Different Host
17.3.3.9.2
Recovering Oracle Virtual Directory to a Different Host
17.3.3.9.3
Recovering Oracle Directory Integration Platform to a Different Host
17.3.3.9.4
Recovering Oracle Directory Services Manager to a Different Host
17.3.3.9.5
Recovering Oracle Identity Federation to a Different Host
17.3.3.10
Recovering Oracle Portal, Oracle Reports, Oracle Forms Services, and Oracle Business Intelligence Discoverer to a Different Host
17.3.3.10.1
Recovering Oracle Portal to a Different Host
17.3.3.10.2
Recovering Oracle Business Intelligence Discoverer to a Different Host
17.3.3.10.3
Recovering Oracle Reports to a Different Host
17.3.3.10.4
Recovering Oracle Forms Services to a Different Host
17.3.4
Additional Actions for Recovering Entities After Loss of Host
17.3.4.1
Recovering Fusion Middleware Control to a Different Host
17.3.4.2
Changing the Host Name in the targets.xml File for Fusion Middleware Control
17.3.4.3
Recovering Oracle Management Agent When Components Are Recovered to a Different Host
17.3.4.4
Updating Oracle Inventory
17.3.4.5
Recover the Windows Registry
17.3.5
Recovering After Loss of Host for a Database
Part VIII Advanced Administration: Expanding Your Environment
18
Scaling Your Environment
18.1
Overview of Scaling Your Environment
18.2
Extending a Domain to Support Additional Components
18.3
Adding Additional Managed Servers to a Domain
18.3.1
Applying Oracle JRF Template to a Managed Server or Cluster
18.4
Creating Clusters
18.5
Cloning a Middleware Home or Component
19
Cloning Oracle Fusion Middleware
19.1
Introduction to Cloning
19.2
What You Can Clone
19.3
Understanding the Cloning Process
19.3.1
Source Preparation Phase
19.3.2
Cloning Phase
19.4
Cloning Syntax
19.5
Cloning Oracle Fusion Middleware Entities
19.5.1
Cloning a Middleware Home
19.5.2
Cloning Oracle Internet Directory
19.5.3
Cloning Oracle Virtual Directory
19.5.4
Listing the Contents of an Archive
19.6
Considerations and Limitations for Cloning
20
Moving from a Test to a Production Environment
20.1
Overview of Procedures for Moving from a Test to a Production Environment
20.2
Moving Identity Management Components to a Production Environment
20.2.1
Moving Identity Management to a New Production Environment
20.2.2
Moving Identity Management to an Existing Production Environment
20.3
Moving Oracle SOA Suite to a Production Environment
20.3.1
Moving Oracle SOA Suite to a New Production Environment
20.3.2
Moving Oracle SOA Suite to an Existing Production Environment
20.4
Moving Oracle Business Activity Monitoring to a Production Environment
20.4.1
Moving Oracle Business Activity Monitoring to a New Production Environment
20.4.2
Moving Oracle Business Activity Monitoring to an Existing Production Environment
20.5
Moving Oracle User Messaging Service to a Production Environment
20.5.1
Moving Oracle User Messaging Service to a New Production Environment.
20.5.2
Moving Oracle User Messaging Service to an Existing Production Environment.
20.6
Moving Oracle WebCenter to a Production Environment
20.6.1
Moving Oracle WebCenter to a New Production Environment
20.6.2
Moving Oracle WebCenter to an Existing Production Environment
20.7
Moving the Web Tier to a Production Environment
20.7.1
Moving the Web Tier to a New Production Environment
20.7.1.1
Moving Oracle HTTP Server to a New Production Environment
20.7.1.2
Moving Oracle Web Cache to a New Production Environment
20.7.2
Moving the Web Tier to an Existing Production Environment
20.8
Moving Classic Components to a Production Environment
20.8.1
Moving Classic Components to a New Production Environment
20.8.2
Moving Classic Components to an Existing Production Environment
Part IX Appendixes
A
Oracle Fusion Middleware Command-Line Tools
B
URLs for Components
C
Port Numbers
C.1
Port Numbers by Component
C.2
Port Numbers (Sorted by Number)
D
Metadata Repository Schemas
D.1
Metadata Repository Schema Descriptions
D.2
Metadata Repository Schemas, Tablespaces, and Data Files
E
Using Oracle Fusion Middleware Accessibility Options
E.1
Install and Configure Java Access Bridge (Windows Only)
E.2
Enabling Fusion Middleware Control Accessibility Mode
E.2.1
Making HTML Pages More Accessible
E.2.2
Viewing Text Descriptions of Fusion Middleware Control Charts
E.3
Fusion Middleware Control Keyboard Navigation
F
Examples of Administrative Changes
F.1
How to Use This Appendix
F.2
Examples of Administrative Changes (by Component)
G
Viewing Release Numbers and Applying Patches
G.1
Release Number Format
G.2
Viewing the Software Inventory and Release Numbers
G.2.1
Viewing Oracle Fusion Middleware Installation Release Numbers
G.2.2
Viewing Component Release Numbers
G.2.3
Viewing Oracle Internet Directory Release Numbers
G.2.4
Viewing Metadata Repository Release Numbers
G.3
Applying Patches
G.3.1
OPatch Requirements
G.3.2
Running the OPatch Utility
G.3.2.1
apply Option
G.3.2.2
lsinventory Option
G.3.2.3
query Option
G.3.2.4
rollback Option
G.3.2.5
version Option
H
Oracle Wallet Manager and orapki
H.1
New orapki Features
H.1.1
orapki Usage Examples
H.1.2
New CRL Management Features
H.1.3
New Version 3 Certificate Support
H.1.4
Trust Chain Export
H.1.5
Wallet Password Change
H.1.6
Converting Between Oracle Wallet and JKS Keystore
H.2
Using the orapki Utility for Certificate Validation and CRL Management
H.2.1
orapki Overview
H.2.1.1
orapki Syntax
H.2.1.2
Environment Setup for orapki
H.2.2
Displaying orapki Help
H.2.3
Creating Signed Certificates for Testing Purposes
H.2.4
Managing Oracle Wallets with the orapki Utility
H.2.4.1
Creating and Viewing Oracle Wallets with orapki
H.2.4.2
Adding Certificates and Certificate Requests to Oracle Wallets with orapki
H.2.4.3
Exporting Certificates and Certificate Requests from Oracle Wallets with orapki
H.2.5
Managing Certificate Revocation Lists (CRLs) with orapki Utility
H.2.5.1
About Certificate Validation with Certificate Revocation Lists
H.2.5.1.1
What CRLs Should You Use?
H.2.5.1.2
How CRL Checking Works
H.2.5.2
Certificate Revocation List Management
H.2.5.2.1
Renaming CRLs with a Hash Value for Certificate Validation
H.2.5.2.2
Uploading CRLs to Oracle Internet Directory
H.2.5.2.3
Listing CRLs Stored in Oracle Internet Directory
H.2.5.2.4
Viewing CRLs in Oracle Internet Directory
H.2.5.2.5
Deleting CRLs from Oracle Internet Directory
H.2.6
orapki Utility Commands Summary
H.2.6.1
orapki cert create
H.2.6.1.1
Purpose
H.2.6.1.2
Syntax
H.2.6.2
orapki cert display
H.2.6.2.1
Purpose
H.2.6.2.2
Syntax
H.2.6.3
orapki crl create
H.2.6.3.1
Purpose
H.2.6.3.2
Syntax
H.2.6.4
orapki crl delete
H.2.6.4.1
Purpose
H.2.6.4.2
Syntax
H.2.6.5
orapki crl display
H.2.6.5.1
Purpose
H.2.6.5.2
Syntax
H.2.6.6
orapki crl hash
H.2.6.6.1
Purpose
H.2.6.6.2
Syntax
H.2.6.7
orapki crl list
H.2.6.7.1
Purpose
H.2.6.7.2
Syntax
H.2.6.8
orapki crl revoke
H.2.6.8.1
Purpose
H.2.6.8.2
Syntax
H.2.6.9
orapki crl status
H.2.6.9.1
Purpose
H.2.6.9.2
Syntax
H.2.6.10
orapki crl upload
H.2.6.10.1
Purpose
H.2.6.10.2
Syntax
H.2.6.11
orapki crl verify
H.2.6.11.1
Purpose
H.2.6.11.2
Syntax
H.2.6.12
orapki wallet add
H.2.6.12.1
Purpose
H.2.6.12.2
Syntax
H.2.6.13
orapki wallet change_pwd
H.2.6.13.1
Purpose
H.2.6.13.2
Syntax
H.2.6.14
orapki wallet create
H.2.6.14.1
Purpose
H.2.6.14.2
Syntax
H.2.6.15
orapki wallet display
H.2.6.15.1
Purpose
H.2.6.15.2
Syntax
H.2.6.16
orapki wallet export
H.2.6.16.1
Purpose
H.2.6.16.2
Syntax
H.2.6.17
orapki wallet export_trust_chain
H.2.6.17.1
Purpose
H.2.6.17.2
Syntax
H.3
Equivalent Features for Oracle Wallet Manager
H.4
Equivalent Features for orapki
H.5
Equivalent Features for the SSL Configuration Tool
I
Troubleshooting Oracle Fusion Middleware
I.1
Diagnosing Oracle Fusion Middleware Problems
I.2
Common Problems and Solutions
I.2.1
Using a Different Version of Spring
I.2.2
ClassNotFound Errors When Starting Managed Servers
I.3
Troubleshooting Fusion Middleware Control
I.3.1
Troubleshooting the Display of Performance Metrics and Charts in Fusion Middleware Control
I.3.1.1
What Are Agent-Monitored Targets?
I.3.1.2
Setting Monitoring Credentials for All Agent-Monitored Targets in a Farm
I.3.1.3
Changing the Monitoring Credentials for a Specific Agent-Monitored Target
I.3.1.4
Verifying or Changing the Oracle Management Agent URL
I.3.2
Securing the Connection from Fusion Middleware Control to Oracle WebLogic Server Administration Console
I.4
Need More Help?
I.4.1
Using Remote Diagnostic Agent
Index
Scripting on this page enhances content navigation, but does not change the content in any way.