Book Image

Oracle Service Bus 11g Development Cookbook

Book Image

Oracle Service Bus 11g Development Cookbook

Overview of this book

Oracle Service Bus 11g is a scalable SOA integration platform that delivers an efficient, standards-based infrastructure for high-volume, mission critical SOA environments. It is designed to connect, mediate, and manage interactions between heterogeneous services, legacy applications, packaged solutions and multiple Enterprise Service Bus (ESB) instances across an enterprise-wide service network. Oracle Service Bus is a core component in the Oracle SOA Suite as a backbone for SOA messaging. This practical cookbook shows you how to develop service and message-oriented (integration) solutions on the Oracle Service Bus 11g. Packed with over 80 task-based and immediately reusable recipes, this book starts by showing you how to create a basic OSB service and work efficiently and effectively with OSB. The book then dives into topics such as messaging with JMS transport, using EJB and JEJB transport, HTTP transport and Poller transports, communicating with the database, communicating with SOA Suite and Reliable Message Processing amongst others. The last two chapters discuss how to achieve message and transport-level security on the OSB.
Table of Contents (19 chapters)
Oracle Service Bus 11g Development Cookbook
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Preparing OSB server to work with SSL


In this recipe, we will configure the OSB to use SSL. The WebLogic server standard installation already comes with a default certificate and keystore, but in this recipe we will use the custom keystore that we created in Chapter 11, Handling Message-level Security Requirements.

Getting ready

We will need access to Eclipse OEPE, soapUI client, and the server.jks and client.jks files.

How to do it...

First, we will configure the OSB server to use the server.jks keystore we created earlier.

In WebLogic console, perform the following steps:

  1. Click on Environment in the tree on the left and select Servers | AdminServer(admin) on the detail view.

  2. Navigate to the Configuration | Keystores tab.

  3. Click Change and change the value to Custom Identity and Custom Trust for the Keystores field.

  4. Enter ./config/fmwconfig/server.jks into the Custom Identity Keystore field.

  5. Enter JKS into the Custom Identity Keystore Type field.

  6. Enter welcome into the Custom Identity Keystore Passphrase...