Oracle Wallet Manager hang when import a trusted cert

i'm facing problem when import 1 of my client's cert.
it hang and not responsive when i try to import it.
the oracle wallet manager version is 10.1.0.4.2
my client's cert is 512bit self signed
Message was edited by:
kinwah.lai

Hi,
To use it, you need to convert the cert into binary format. Then it is simply dumpasn1 bincert.cer. This dumpasn1 output is obtained from your cert:
0 30 524: SEQUENCE {
4 30 438: SEQUENCE {
8 A0 3: [0] {
10 02 1: INTEGER 2
13 02 17: INTEGER
: 00 C4 CE 12 F5 0D A9 0A 4C C1 56 80 3F B0 01 7C
: 99
32 30 13: SEQUENCE {
34 06 9: OBJECT IDENTIFIER
: sha1withRSAEncryption (1 2 840 113549 1 1 5)
45 05 0: NULL
47 30 126: SEQUENCE {
49 31 11: SET {
51 30 9: SEQUENCE {
53 06 3: OBJECT IDENTIFIER countryName (2 5 4 6)
58 13 2: PrintableString 'MY'
62 31 17: SET {
64 30 15: SEQUENCE {
66 06 3: OBJECT IDENTIFIER localityName (2 5 4 7)
71 13 8: PrintableString 'Malaysia'
81 31 35: SET {
83 30 33: SEQUENCE {
85 06 3: OBJECT IDENTIFIER organizationName (2 5 4 10)
90 13 26: PrintableString 'Carrefour.net V22 Malaysia'
118 31 55: SET {
120 30 53: SEQUENCE {
122 06 3: OBJECT IDENTIFIER commonName (2 5 4 3)
127 1E 46: BMPString
: '[email protected]'
175 30 30: SEQUENCE {
177 17 13: UTCTime '070309053122Z'
192 17 13: UTCTime '090309053122Z'
207 30 126: SEQUENCE {
209 31 11: SET {
211 30 9: SEQUENCE {
213 06 3: OBJECT IDENTIFIER countryName (2 5 4 6)
218 13 2: PrintableString 'MY'
222 31 17: SET {
224 30 15: SEQUENCE {
226 06 3: OBJECT IDENTIFIER localityName (2 5 4 7)
231 13 8: PrintableString 'Malaysia'
241 31 35: SET {
243 30 33: SEQUENCE {
245 06 3: OBJECT IDENTIFIER organizationName (2 5 4 10)
250 13 26: PrintableString 'Carrefour.net V22 Malaysia'
278 31 55: SET {
280 30 53: SEQUENCE {
282 06 3: OBJECT IDENTIFIER commonName (2 5 4 3)
287 1E 46: BMPString
: '[email protected]'
335 30 92: SEQUENCE {
337 30 13: SEQUENCE {
339 06 9: OBJECT IDENTIFIER rsaEncryption (1 2 840 113549 1 1 1)
350 05 0: NULL
352 03 75: BIT STRING 0 unused bits, encapsulates {
355 30 72: SEQUENCE {
357 02 65: INTEGER
: 00 86 75 E6 DA C8 18 CB 77 44 C5 E9 48 F7 45 41
: 85 52 8E 70 E7 D1 D0 C5 7E 48 5D BC AB 9E C9 99
: CC 70 FC 18 F2 E4 12 78 38 7D CA 06 3C 18 64 E6
: FD 6B 3A CD 00 02 2B A0 67 CB F0 86 1C 13 0F 43
: D1
424 02 3: INTEGER 65537
429 A3 15: [3] {
431 30 13: SEQUENCE {
433 30 11: SEQUENCE {
435 06 3: OBJECT IDENTIFIER keyUsage (2 5 29 15)
440 04 4: OCTET STRING, encapsulates {
442 03 2: BIT STRING 0 unused bits
: '00000101'B
: Error: Spurious zero bits in bitstring.
446 30 13: SEQUENCE {
448 06 9: OBJECT IDENTIFIER
: sha1withRSAEncryption (1 2 840 113549 1 1 5)
459 05 0: NULL
461 03 65: BIT STRING 0 unused bits
: 51 13 3B 3C 7A EA 9A 97 30 FA F1 2E E5 A4 CD 77
: D6 02 6D BF 1B 4D E3 F3 5F 93 3F D7 96 0E 40 69
: 8A 29 B4 B1 B5 C0 79 B8 4C 6E 96 C6 15 26 61 F7
: 4E D5 27 9C 71 B6 5D 92 E6 3B 71 6E 76 02 E1 97
0 warnings, 1 error.
As you can see, there is an error: Error: Spurious zero bits in bitstring. For this particular instance, OWM cannot import this cert properly. Please ask your tp to provide a self signed cert that complies with the ASN1 standard.
Eng

Similar Messages

  • Oracle Wallet Manager an dPCK#12

    HI,
    Is the Oracle Wallet Manager able to import a user certificate with the format pck#12?
    If so, from wich version of the Oracle Manager and how do I do this.
    Thanks
    Arny van der Deijl
    Oracle Netherlands

    Hi Arny:
    Yes, we can use wallet manager to import PKCS#12 certificates.
    This is certified with 9i release 1 and later.
    There are several places where you can get details about importing user certificates with wallet manager.
    First look at the Oracle Advanced Security Admin Guide chapters 15, 16, and 17 but chapter 16 has the most information
    about wallet manager.
    Heres a link to the guide:
    http://otn.oracle.com/docs/products/oracle9i/doc_library/901_doc/network.901/a90150/toc.htm
    Also, the OID admin guide has good information about wallet manager as it relates to OID. Appendix D of the OID admin
    guide is a good place to start.
    Here is a link to the OID Admin Guide:
    http://otn.oracle.com/docs/products/ias/doc_library/90200doc_otn/manage.902/a95192/toc.htm
    Hope this helps,
    Jay

  • Problem import trusted certificate with oracle wallet manager

    hi people
    db version 10.2.0.4
    owm version 10.2.0.4
    os version windows server 2003
    the first thing i've tried
    is to import a certificate which was created with selfssl (contained in the mircosoft iss resource kit)
    but its not working
    i get the following failure "Some trusted certificates could not be installed"
    i've checked the metalink and found this
    [WALLET MANAGER FAILS TO IMPORT MS IIS GENERATED CERT|https://metalink2.oracle.com/metalink/plsql/f?p=130:15:3132180381448029652::::p15_database_id,p15_docid,p15_show_header,p15_show_help,p15_black_frame,p15_font:BUG,6815320,1,1,1,helvetica]
    i've tried it with an openssl generated certificate
    no problems with importing this as trusted certificate
    so my question
    exists a general problem with certificates which were created with iis services?

    Hi, I am having the same issue with the certificate. Can anyone tell me how to fix this?
    Thank You!
    Kathie

  • Some trusted certificate could not be installed , oracle wallet manager

    Hi there,
    I am using Oracle Wallet Manager 10.2.0.1
    Oracle DB 10.2
    when I try to import a certificate I have exported from the browser, I have such error,
    that certificate is not something globally known, but it is for local communication,
    as I understood that when I specify to import trusted certificate, that does not matter , does it?
    please that I have successfully imported another "known" certificate exported with the same way,
    what can the reason of such an error,
    thanks in advance
    rgrds

    The problem was in the certificate itself.
    Regards.

  • Unable to import the user certificate into the Oracle Wallet Manager

    Hi,
    I am configuring the External Authentication plugin using the password filters.
    i am using the version 10.1.0.5.0 version of Oracle Wallet manager
    inorder to do that i am enabling the SSL mode.
    to enable the SSL mode i followed the some steps in OWM and OCA admin and user console.
    when i approved a certificate as admin and importing to the Oracle Wallet Manager, i got an error that
    User Certificate Installation failed.
    Possible errors:
    - Input was not a valid certificate
    - No matching certificate request found
    - CA certificate needed for certificate chain not found.
    Please install it first
    can anyone help me how to resolve this problem.

    hi,
    thanks for your reply pramod
    I tried to import the two certificate files(rootca.crt and server.crt). but i am got the same error.
    what may be the problem.

  • Problem in importing a SHA256 X509 certificate in Oracle Wallet Manager 10g

    Dear All,
    As a certification authority, we stops issuing SHA1 X509 certificates and now we deliver only SHA256 Certificates. Some of our customers encounter problems when importing these new certificates in Oracle Wallet Manager 10g.
    Is there any Oracle Security Updates able to solve this problem?
    Thank you in advance
    Nizar BN
    Tunisia

    Hi, I am having the same issue with the certificate. Can anyone tell me how to fix this?
    Thank You!
    Kathie

  • Oracle wallet manager and how can I import a .cer f

    Hi where can I download oracle wallet manager and how can I import a .cer file to a wallet file .p12 that OAS uses in Apache configuration.

    Hi where can I download oracle wallet manager and how can I import a .cer file to a wallet file .p12 that OAS uses in Apache configuration.

  • Oracle Wallet Manager

    Hi I have a server.key , a server.cer and server-ca.crt. I need to import these using oracle wallet manager. How do I do that?

    hi,
    The installation consists of three main parts:
    a) Importing the Primary Root CA
    b) Import the Intermediate Certificate and Cross Certificate
    c) Installing your SSL123 certificate
    a) Importing the Primary Root CA
    1. Get a copy of the root certificate
    2. Launch Oracle Wallet Manager.
    3. Click Operations and select Import Trust Certificates from the menu
    4. When the Import Trusted Certificate window appears, click Paste the Certificate and click OK.
    5. When the message "Please provide a base64 format certificate and paste it below" appears, paste the entire contents of Primary Root CA text into the box and click OK.
    6. A message should appear that the import was successful and you will see the Root Certificate at the bottom of the Trusted Certificates tree.
    b) Importing the Intermediate and Cross certificates
    1. Launch the Oracle Wallet Manager.
    2. Click Operations > Import Trust Certificates from the menu.
    3. When the Import Trusted Certificate window appears, click Paste the Certificate and click OK.
    4. When the message "Please provide a base64 format certificate and paste it below" appears, paste the entire contents of the Intermediate Certificate text into the box and click OK.
    5. A message should appear that the import was successful and you will see the Intermediate Certificate at the bottom of the Trusted Certificates tree.
    6. Repeat the same steps for the Cross certificate
    c) Importing your SSL123 certificate
    1. Click Operations > Import User Certificate from the menu bar.
    2. The Import Certificate dialog appears.
    3. Select the Paste the Certificate radio button, and click OK.
    4. The Import Certificate dialog appears.
    5. Paste the entire contents of your SSL123 Certificate file and click OK.
    6. A message should show that the certificate was imported successfully.
    7. When you return to the main window, wallet status should show "Ready."
    Hope this will help you,
    Regards
    Fabian

  • Oracle Wallet manager error

    Hi all,
    Inorder to test SSL, i created a certificate request in OWM.Then i got a trial certificate from verisign for this request.What should i do now ? I tried to import that certificate in Oracle Wallet manager but getting this error.
    "Trusted Certificate Installation Failed.
    Input was not a valid certificate".
    Please guide me
    Srini

    belw is the note
    PURPOSE
    To list the steps needed to configure Oracle HTTP Server (OHS) to use the Secure
    Sockets Layer (SSL) when installed with Oracle9i Application Server (9iAS)
    Release 2 (9.0.2). The below instructions show, step by step, instructions for
    obtaining a trial certificate from a Certificate Authority, such as Verisign or
    Thawte. Please refer to the Oracle 9iAS Documentation for further details.
    SCOPE AND APPLICATION
    Oracle9i Application Server (9iAS) Release 2 (9.0.2 and above)
    Configuring SSL with Oracle HTTP Server in 9iAS Release 2
    There are two major steps needed to configure SSL in 9iAS:
    I. Create an Oracle Wallet which contains an SSL Certificate
    II. Configure httpd.conf directives to enable SSL with OHS
    NOTE:
    Only standard server certificates are supported. These are sometimes referred
    to as "40-bit Certificates", but will allow 128-bit encryption provided the
    browser supports 128-bit encryption. 9iAS Release 2 does not support Global
    Server Certificates, called "128-bit Certificates", that allow 56-bit export
    browsers to step up to 128-bit.
    STEP I: Configuring Oracle Wallet Manager (OWM)
    1. Start Oracle Wallet Manager from the 9iAS $ORACLE_HOME.
    Note: If you wish to use AutoLogin features you must start OWM as the user
    who owns the httpd parent process.
    To start Oracle Wallet Manager:
    On Windows: select Start > Programs > Oracle - ORACLE_HOME >
    Integrated Management Tools > Wallet Manager
    On UNIX: enter owm at the command line.
    2. Create an Oracle Wallet which contains an SSL Certificate:
    - Select Wallet -> New
    - Enter a password for the wallet e.g Welcome1
    - Create a Certificate Request.
    - Enter the details for the request. For example:
         Common Name:          <hostname.domainname>
    Organizational Unit:      Support
    Organization:      Oracle
         Location:          Reading
         State:               Berkshire
         Country:          United Kingdom
         Key Size:          1024bits
    * Common Name has to match the hostname.domainname that the webserver is
    known as. This is the Servername parameter in the httpd.conf file, and
    is the hostname.domainname that users will enter in the browser URL.
    - Click OK.
    - Click 'Certificate:[Requested]' and select from the Menu 'Operations' and
    'Export Certificate Request'
    - Save to a file e.g server.csr
    - Open the file in a text editor and copy the contents of the certificate
    signing request, to be pasted in a Certificate Authority (Verisign) form.
    An example is shown below:
    -----BEGIN NEW CERTIFICATE REQUEST-----
    MIIBtzCCASACAQAwdzELMAkGA1UEBhMCR0IxEjAQBgNVBAgTCWJlcmtzaGlyZTEQMA4GA1UEBxMH
    cmVhZGluZzEPMA0GA1UEChQGb3JhY2xlMRAwDgYDVQQLFAdzdXBwb3J0MR8wHQYDVQQDFBZ1a2Ro
    MTkzNC51ay5vcmFjbGUuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCYkFMb9x4ehsG3
    yQ2ub319GxPW+/TC3NSIYRLzEa49EziqBUr08R3Ssn9+6nolVjj1eb3rzwCfjiOSzsp1lSa/B9Vo
    63pwP6xLbCgF8J86YfcZvavgLzY0Yc1fPfRxpZkb/jjt+F1zkaI6Lilm5YU3bRNYMb36TAWxUYL1
    m6wZOwIDAQABoAAwDQYJKoZIhvcNAQEEBQADgYEACKXTmPHaSe3Lx3onnKJk/qI8SzpKyQC/B29v
    JGg1+7Lb7gl052Y9WKxbKHzOQOYr8yYxMXNBCUwW6kBAFoxTWSpIxIQOpJXcsu1RlHKaLfAnw053
    LiwpRB6do7MBrVgMRiv3AyTkJkgRzSxABWAgNpBPbhH+L6PZj5tSjOPErKA=
    -----END NEW CERTIFICATE REQUEST-----
    3. Request a Certificate from a Certificate Authority:
    - Load a web browser and go a Certificate Authority website of your choice.
    The examples below are from www.thawte.com:
    - Click on 'request your free trial'.
    - Fill in the necessary name and address details etc. and 'Submit'.
    - Paste in the certificate request into the box under the
    'Certificate Signing Request' Section.
    - Select "Test X509v3 SSL Cert" and hit "Generate Test Certificate"
    - Once submitted the Trial Certificate will appear on screen similar to below:
    -----BEGIN CERTIFICATE-----
    MIICnDCCAgWgAwIBAgIDD9m+MA0GCSqGSIb3DQEBBAUAMIGHMQswCQYDVQQGEwJa
    QTEiMCAGA1UECBMZRk9SIFRFU1RJTkcgUFVSUE9TRVMgT05MWTEdMBsGA1UEChMU
    VGhhd3RlIENlcnRpZmljYXRpb24xFzAVBgNVBAsTDlRFU1QgVEVTVCBURVNUMRww
    GgYDVQQDExNUaGF3dGUgVGVzdCBDQSBSb290MB4XDTAxMTAyNDE0MDIxOVoXDTAx
    MTExNDE0MDIxOVowdzELMAkGA1UEBhMCR0IxEjAQBgNVBAgTCUJlcmtzaGlyZTEQ
    MA4GA1UEBxMHUmVhZGluZzEPMA0GA1UEChQGT3JhY2xlMRAwDgYDVQQLFAdTdXBw
    b3J0MR8wHQYDVQQDFBZ1a3AxNTkxOC51ay5vcmFjbGUuY29tMIGfMA0GCSqGSIb3
    DQEBAQUAA4GNADCBiQKBgQDiQbg8KHjQ8hazvFe+OFhQa6ka+i5oShUty1MhlH+/
    /xXP+j82h4VlyPG6IGKeQdXLhnKXgLuxTZ8/VDtLZyucmpIB95o2A3Betjp7UdIm
    C572rKrQTA+1mCt/KLWcNE+fQuCmhloaERh3jsWTng0TKsDpJeAJdW2F4tCy/E/E
    MwIDAQABoyUwIzATBgNVHSUEDDAKBggrBgEFBQcDATAMBgNVHRMBAf8EAjAAMA0G
    CSqGSIb3DQEBBAUAA4GBACffzyC3qvAlvNWc6mBPMjFu6XWUGZBuNawFCz8qGw5/
    ce3rWFNI4zOjc1OncoJg7FjDJgAWqiJFHgdV4gwQm/8lTJX6wD1FhMtrJDXf29ei
    1DAe8kBOBWiFMio8Qjp24TdxoI6/53/32ydl91CPtTKAix3SaC2bBS5lG73AbKRr
    -----END CERTIFICATE-----
    - Copy the certificate to a file called server.crt
    - Get the Trusted CA Root certificate by accessing:
    https://www.thawte.com/roots/index.html
    - Copy the certificate that appears on the screen to a file called
    servertest.crt
    - Ftp or move the files to a directory on your server
    - In Wallet Manager select Operations -> Import User Certificate.
    - It will then ask you if you want to Paste the certificate or load
    from a file. Choose 'Select a file that contains a certificate'.
    - Select the file server.crt and hit OK.
    - At this point, the Wallet Manager may complain that the Trusted CA Root
    Certificate does not exist in the wallet. It will ask if you want to
    import it now. Select Yes. See Below
    - Select 'Select a file that contains a certificate' and select the
    servertest.crt file.
    - If this completes successfully you should see Certificate:[Ready] and the
    Thawte Test CA Root will appear in the list of trusted certificates.
    - If you desire Oracle HTTP Server to AutoLogin to the Wallet, then select
    AutoLogin. (Wallet Manager must have been started as the owner of the
    httpd parent process for this to work).
    - From the menu, File -> Save
    Save the Wallet in a directory where the 9iAS user has permission to access
    * If you generated your test certificate via www.verisign.com there is an additional
    step required if OWM is not accepting the Trusted CA Root Certificate. The step is
    as follows:
    In OWM, at the point of message "User certificate import has failed because the
    CA certificate does not exist". You are expected to import the CA certificate.
    For Verisign, that would be the 'Test CA Root' for the Trial version. Verisign's
    email has instructions on how to download the Test CA Root. One problem with the
    Test CA Root is that it is saved as DER encoding, but OWM expects BASE64 encoding.
    Please do following, using Internet Explorer 5.X as example.
    1. Following Verisign instructions and install Test CA Root
    certification into IE.
    2. Export 'Test CA Root' from IE in BASE64 format
    Tools -> Internet Options -> Contents -> Certificates
    -> Trusted Root Certificate Authorities
    Select CA issued by Versign with following Description in 'Issued to' column
    "For Versign authorized testing only ....."
    Export -> Next -> select Base-64 encoded X.509(.cer)
    The file saved must me accessible to OWM
    3. When prompted to load 'CA certificate ', provide the Base64 encoded file.
    Then, continue where you left off when OWM did not accept your Trusted CA
    Root Certificate.
    STEP II: Configuring Oracle HTTP Server (OHS)
    Please review the default directives in the httpd.conf file that relate to SSL by
    opening the file in a text editor and search on "SSL". If you have not already
    done so, please make a back up of this file. Do NOT hand edit this file without reading
    the precautions in the 9iAS Documentation. You should use the Enterprise Manager (EM)
    Website to modify this file. For SSL to work, the SSL 'listen' port must match the
    "VirtualHost _default_" directive within the file. All other SSL parameters are
    set to the default, and you can modify at a later time, depending on your needs.
    ## SSL Support
    Listen 80
    Listen 443
    #443 is the SSL port number.
    ##Further down in file:
    <VirtualHost default:443>
    For the purposes of a basic SSL configuration, you should only need to
    change the following directives:
    SSLWallet
    SSLWalletPassword
    - Change the SSLWallet directive to the path where you saved your wallet, i.e:
    SSLWallet file:/tmp/wallets
    - If you get an error, ADMN-906025 with exception 806212, when starting OHS
    after modifying httpd.conf, it is because you need to supply this password.
    You may also see errors such as the following:
    Error Failed to restart HTTP Server.
    Timeout has been reached. Timeout has been reached.
    If you did not select AutoLogin, then you need to change the SSLWalletPassword
    to your clear text Wallet password by adding the following into your httpd.conf
    SSLWalletPassword <yourPassword>
    - If you wish to encrypt the SSLWalletPassword refer to the following:
    [NOTE:184677.1]
    How to Use IASOBF to Encrpyt a Wallet Password Within 9iAS Release 2
    - Save the configuration, and restart Oracle HTTP Server
    - Test a URL to Oracle HTTP Server in SSL mode:
    https://<hostname.domainname>:<port>

  • Upgrading Oracle Wallet Manager

    I am currently running Oracle Application Server 10.1.2.3 on a Windows Server 2203 R2 box. We are being forced to migrate our SHA1 SSL certificates to SHA256. However, when I attempt to import the certs into Oracle Wallet Manager 10.1.0.5, I get an error saying "Some trusted certificates could not be installed". I believe that Oracle Wallet Manager 11.2.0.1 supports SHA256 certs. Is there a way for me to upgrade JUST Oracle Wallet Manager without doing a full Application Server upgrade to Fusion Middleware 11g?

    Dear sir,
    I have the same problem with my Oracle Application Server 10.1.4.2.
    Is there a solution?
    Thank You

  • Oracle Wallet Manager - Verisign root CA

    Has anyone imported the trusted root CA certificate from Verisign into the Oracle Wallet Manager. I cannot seem to get that certificate in the format that I need. Any comments would be appreciated. I believe that OWM requires certificates in text format (IE Begin Certificate.....End Certificate) in order to import.
    Thanks,
    Matt

    Hello Matt:
    Im not quite sure where your problem with OID is. Storing X-509 certificates from CA's like Verisign into OID is usually quite easy. Are you trying to store your certificates in OID or some other repository? Can you tell me the step number in the admin guide where you are encountering trouble?
    Thanks,
    Jay
    null

  • Oracle wallet manager disappears

    I have this root certificate (Issuer - InfoNotary.......) :
    -----BEGIN CERTIFICATE-----
    MIIFzDCCBYqgAwIBAgIIEGYkjAmMcrgwCwYHKoZIzjgEAwUAMIG7MYG4MAkGA1UE
    BgwCQkcwFQYDVQQKDA5JbmZvTm90YXJ5IFBMQzAdBgoJkiaJk/IsZAEZFg9yb290
    LWNhLXQyMDA2MDMwHwYJKoZIhvcNAQkBFhJjc3BAaW5mb25vdGFyeS5jb20wKQYD
    VQQDDCJJbmZvTm90YXJ5IENTUCBSb290IC0gVGVzdCAyMDA2IDAzMCkGA1UECwwi
    SW5mb05vdGFyeSBDU1AgUm9vdCAtIFRlc3QgMjAwNiAwMzAiGA8yMDA2MDMyMDA4
    NTc0MloYDzIwMjYwMzIwMDg1NzQyWjCBuzGBuDAJBgNVBAYMAkJHMBUGA1UECgwO
    SW5mb05vdGFyeSBQTEMwHQYKCZImiZPyLGQBGRYPcm9vdC1jYS10MjAwNjAzMB8G
    CSqGSIb3DQEJARYSY3NwQGluZm9ub3RhcnkuY29tMCkGA1UEAwwiSW5mb05vdGFy
    eSBDU1AgUm9vdCAtIFRlc3QgMjAwNiAwMzApBgNVBAsMIkluZm9Ob3RhcnkgQ1NQ
    IFJvb3QgLSBUZXN0IDIwMDYgMDMwggG3MIIBKwYHKoZIzjgEATCCAR4CgYEA/JlZ
    KRdvS7nj83xB9wulqFERWRJe9uv5Tr9if1k+BW4vAD+/NWfBueMGYrVvOOV5i3Jo
    G6QvhyIRluIRIprGvRRUBGmJZMpLmVfzGTjVMuG7c6ZBEX2pgue+r00hJVuNOYwN
    kub6oIRFyUNNIYLqBKascjZr1RcrvoyRMo7dAEsCFQDR/7tVobcOcRzXTOPvVxKi
    omFJ3QKBgAtykO++a9L255z6yymAv9qimurPAdSYjS2mffwA60f/Xr5AUVYheIWT
    HHTL176pOZ0qPhJItEvwCFtP3QXDBD50fdIDaLd2S0Z8YRvCuwqsJS2M39Dm125o
    Cntm6B9rjP1V+L+xdCQ9wEXG6OYFcQz/h2PlZeQ5xQCraInGdOY1A4GFAAKBgQDI
    PR62zK05/n2gRx6lC6QYNElCkyZqztKQX0n5rF2ALPnf6iZWMJH3lPLNIJCwB3Ia
    zNQ9+u4Z8yEFQznN/mHimtgnubwHH5CJRPhG5yXqlfOJOWNE70G0LVVG/rtnDb5x
    Ve4bS+nQE75Ohe79pMkOKbeEjV81o1cuq+KzGhWm56OCAg8wggILMA4GA1UdDwEB
    /wQEAwIBBjBDBggrBgEFBQcBAQQ3MDUwMwYIKwYBBQUHMAGGJ2h0dHA6Ly9kZXYu
    aW5mb25vdGFyeS5jb20vcmVzcG9uZGVyLmNnaTBdBggrBgEFBQcBCwRRME8wTQYI
    KwYBBQUHMAWGQWxkYXA6Ly9kZXYuaW5mb25vdGFyeS5jb20vZGM9cm9vdC1jYS10
    MjAwNjAzLGRjPWluZm9ub3RhcnksZGM9Y29tMIGjBgNVHSAEgZswgZgwaAYJKwYB
    BAGBrQABMFswMwYIKwYBBQUHAgEWJ2h0dHA6Ly9kZXYuaW5mb25vdGFyeS5jb20v
    Y3BzL3FjcHMuaHRtbDAkBggrBgEFBQcCAjAYGhZJbmZvTm90YXJ5IENTUCBSb290
    IENBMCwGCSsGAQQBga0AADAfMB0GCCsGAQUFBwIBFhFodHRwOi8vd3d3LmNyYy5i
    ZzAPBgNVHRMBAf8EBTADAQH/MH8GA1UdEQR4MHakdDByMXAwCwYDVQQRDAQxMDAw
    MAwGA1UEBwwFU29maWEwEwYDVQQUDAwrMzU5Mjk4NzU3MTcwGwYGVQQKZAEBDBEx
    MzEyNzY4Mjc6QlVMU1RBVDAhBgkqhkiG9w0BCQgMFDE2IEl2YW4gVmFzb3YgU3Ry
    ZWV0MB0GA1UdDgQWBBQ0XhZZBwUsyqPC+fbh3k3iWCf+lTALBgcqhkjOOAQDBQAD
    LwAwLAIUJA/m85TNfJy25x4V0eh4g/7LnEkCFC79NCyfrDje2YSeKRd+jKKsuuOb
    -----END CERTIFICATE-----
    If I try to import this trusted certificat, oracle wallet manager disappears.
    Can anybody advise me!

    Hi
    Have you tried verifying this certificate in any other way maybe its been copied incorrectly to the server you are installing it to.
    Assuming you are trying to do this on a server, do you have a wallet manager on your desktop to see if it is failing there as well. If you are ftping it to a server make sure you use binary as ascii will almost certainly corrupt it.
    Can you add it with command line tools, assuming this is being done with a gui tool.
    Without any other error to go by, its a bit hard to give an answer.

  • Oracle Wallet Manager Issue

    Hi,
    We are having a problem in importing user certificate using oracle wallet manager.
    While adding a new certificate request, we gave the domain name as abacus.ofda.gov to generate the key but we are doing this on a different machine laharguard.ofda.gov.
    Can we do this? If so how can I achieve this?
    Thanks

    Hi,
    For the error you are getting, please check below points -
    1. CA (Certificate Signer) certificate is there under trusted certificate list. If it is not, then first import the CA cert (with complete chain, if any) and then try to import the user cert.
    2. User cert should be imported in the same wallet where CSR (Certificate Signing Request) is saved.
    3. Certificate is valid in terms of it's date of expiry.
    Remember, process of getting a server cert is below -
    1. Generate a CSR and save it in a wallet.
    2. Export the CSR from the wallet and send it to CA for signing.
    3. Import the signed user cert in the same wallet after importing it's CA cert in this wallet (CA cert should be imported as Trusted Cert)
    It is recommended to generate CSR at the same server where it will be used. In case server machine changes, please get a new cert for that otherwise it may cause problems during authentication.
    Regards,
    Anuj

  • Replace a new wallet for Oracle Wallet Manager

    Hi, all,
    Here is my current situation.
    We are using Oracle Wallet Manager (version 10.1.0.5) for Oracle 10.1.3.1 on Windows Server 2003. Currently our SSL certificate in the wallet is going to expired within a month. However, we forgot the password to the current wallet. So we have to create a new wallet and import the new certificates. The certificate shows Ready state. Then we moved the old wallet file to a different directory, and copied the new wallet file, ewallet.p12, to the default wallet location, C:\product\10.1.3.1\OracleAS_1\Apache\Apache\conf\ssl.wlt\default. We also rebooted the machine to make sure Apache will pick up the new wallet file. However, when we connected from a client browser, it still shows old certificate. I checked the ssl.conf, it still have the default value as follows:
    SSLWallet file:C:\product\10.1.3.1\OracleAS_1\Apache\Apache\conf\ssl.wlt\default
    The Auto Login and Use Windows Registry options are uncheck and there is no Oracle wallet entry in the Windows registry.
    Does anyone have the similar problem? Any advice is highly appreciated.
    Thank you very much in advance.

    Roberto,
    Thanks a lot for your response. I have one more question.
    Supposed the client browser has installed the old certificate which is still valid for another month, when the client browser hit the site again, as the old certificate is still valid, is it going to download the new certificate? If not, how do I remove the old certificate from browser, IE?
    Thanks.

  • Using a SHA2 certificate with 12.1.1 (Oracle Wallet Manager 10.1.0.5)

    Hi folks,
    I'm trying to enable SSL on my 12.1.1 system, but I've got a bit of a problem.
    I've already logged a SR on this, so I already know that you cannot use SHA2 SSL certificates with Oracle Wallet Manager 10.1.0.5, which is part of the 10.1.3 tech stack. I started the SR on the EBS side, but it was passed on to the security group, and closed there. My question is, is there something that I don't know? Is there an upgrade path in 12.1.x that would include an upgrade to the OWM, or is there some sort of workaround? I'll be opening another SR tomorrow, but wanted to see if I was missing something simple.
    We have an internal certificate server (Microsoft AD), and the root certificate, which I need to import, is SHA2. I'm being told that they cannot generate a SHA1 root certificate, and would have to stand up another certificate authority. OWM 10.1.0.5 can't handle SHA2, so I'm stuck.
    Anybody been there done that?
    Thanks very much,
    -Adam vonNieda

    I'm trying to enable SSL on my 12.1.1 system, but I've got a bit of a problem. What kind of problems?
    I've already logged a SR on this, so I already know that you cannot use SHA2 SSL certificates with Oracle Wallet Manager 10.1.0.5, which is part of the 10.1.3 tech stack. I started the SR on the EBS side, but it was passed on to the security group, and closed there. My question is, is there something that I don't know? Is there an upgrade path in 12.1.x that would include an upgrade to the OWM, or is there some sort of workaround? I'll be opening another SR tomorrow, but wanted to see if I was missing something simple.
    We have an internal certificate server (Microsoft AD), and the root certificate, which I need to import, is SHA2. I'm being told that they cannot generate a SHA1 root certificate, and would have to stand up another certificate authority. OWM 10.1.0.5 can't handle SHA2, so I'm stuck. I am not sure if SHA2 is certified with EBS R12 so you might need to ask this question to Oracle Support. According to the following docs, SHA1 can be used with no issues.
    Enabling SSL in Oracle E-Business Suite Release 12 [ID 376700.1]     To BottomTo Bottom     
    SSL Primer: Enabling SSL in Oracle E-Business Suite Release 12 (Trial Certificate Example) [ID 1425103.1]
    Thanks,
    Hussein

Maybe you are looking for