How to Configure and Secure OMS with Third-Party Certificates (2024)

If you are using Oracle Enterprise Manager (OEM) to administer, monitor, and manage your database environments... clearly understand the benefits of leveraging these capabilities to centralize key tasks particularly for environments involving numerous databases. Anything that makes a Database Administrator’s life easier could be considered a significant win, allowing them to focus on more project-related work and avoid visits from outside entities complaining about issues.

Steps to Configure and Secure OMS With Third-Party Certificates

  1. Create a Directory
  2. Generate a User Certificate
  3. Export the Certificate
  4. Load Certificates into Oracle Wallet
  5. Verify with Orapki Display
  6. Combine Root and Intermediate Certificates
  7. Secure the OMS to Use the Wallet and Agent
  8. Use Trusted_Certs.txt
  9. Test the Agents and Secure the Weblogic Component
  10. Allow OMS Host and Weblogic to Communicate
  11. Verify Your Work
  12. Troubleshoot if Necessary

One of the biggest concerns for all IT professionals is security. If a tool like OEM were to experience a Denial of Service attack, suddenly the robust capability available to manage databases across the enterprise would become inoperable. If a similar attack were performed at the same time for databases, the DBA would be left scrambling by trying to log into each server and diagnose the source of system unresponsive.

Rest-assured: if management determines the impact could have been easily avoided through standard security measures, this could represent a career-altering situation. This blog attempts to provide the key steps for properly securing OEM to help maintain employment and protect your organization’s most critical databases.

After installing OEM 13c and connecting your databases and related components to the tool, the next most important task is to secure the Oracle Management Server (OMS). While this can be done with self-signed certificates, a more secure method is to use third-party certificates through an internal or external Certificate Authority (CA). One commonly used external CA is Verisign, which charges a fee associated with each certificate requested but avoids the extra labor required to setup an environment to support certificate generation.

To take full advantage of Oracle’s latest security features and fixes, it’s strongly recommended to implement the latest version of OEM available for download. For this example, we have installed OEM 13.2 which currently represents the latest release while installing the software on a RHEL 6 server. RHEL 6 is considered a very mature, stable operating system release commonly found across IT environments.

The OEM software has successfully installed and we’ll now work with the Certificate Authority (CA) to provide them with the signed certificates and receive the associated certificate chain for properly securing the OMS.

1. Create a Directory

The first step is to create a directory where the wallet will be based and set up the environment variables.

mkdir /home/oracle/certificate
cd /home/oracle/certificate
export PATH=$ORACLE_HOME/oracle_common/bin:$PATH

2. Generate a User Certificate

Next, we will create the wallet and generate a user certificate that will be signed by the CA. The CN will usually be what shows up in your /etc/hosts file.

orapki wallet create -wallet /home/oracle/certificate -auto_login -pwd testpwd1

orapki wallet add -wallet /home/oracle/certificate -dn ",OU=Test,OU=Test,OU=Test,O=U.S. Government,C=US" -keysize 2048 -sign_alg sha256 -pwd testpwd1

3. Export the Certificate

Now, export the certificate request that will be sent to the CA for signing.

orapki wallet export -wallet /home/oracle/certificate -dn ",OU=Test,OU=Test,OU=Test,O=U.S. Government,C=US" -request CSR.txt

4. Load Certificates into Oracle Wallet

At this point, you send the CSR off to your CA for signing. When you receive the files back you should have a signed server certificate as well as the signing certificates that form the chain. In our case, we have a root and an intermediate certificate. Place these on a location on the server and then load them into the Oracle wallet. Any certificate that is a signing authority will use the flag -trusted_cert while the signed server certificate will always be the -user_cert.

orapki wallet add -wallet /home/oracle/certificate -trusted_cert -cert /home/oracle/certificate/root.cer -pwd testpwd1
orapki wallet add -wallet /home/oracle/certificate -trusted_cert -cert /home/oracle/certificate/intermediate.cer -pwd testpwd1
orapki wallet add -wallet /home/oracle/certificate -user_cert -cert /home/oracle/certificate/OMS.crt -pwd testpwd1

5. Verify with Orapki Display

With all the certificates loaded, you can run an orapki display command to verify. You will see the request for certificate (blue) that we first made and then the three certificates (server cert – red, trusted certificates – orange) we loaded into the wallet. I’ve highlighted the different types of certificates so that you can see them more clearly.

orapki wallet display -wallet ./
Oracle PKI Tool : Version
Copyright (c) 2004, 2014, Oracle and/or its affiliates. All rights reserved.

Requested Certificates:
Subject:,OU=Test,OU=Test,OU=Test,O=U.S. Government,C=US
User Certificates:
Subject:,OU=Test,OU=Test,OU=Test,O=U.S. Government,C=US
Trusted Certificates:
Subject: CN=Entrust Certification Authority - L1R,OU=(c) 2014 Entrust\, Inc. - for authorized use only,OU=See,O=Entrust\, Inc.,C=US
Subject: CN=Entrust Root Certification Authority - G3,OU=(c) 2012 Entrust\, Inc. - for authorized use only,OU=See,O=Entrust\, Inc.,C=US

6. Combine Root and Intermediate Certificates

One final step in the wallet directory is to combine the Root and Intermediate certificates into a text file named trusted_certs.txt, after following the steps below just check the file real quick to verify that there are no spaces.

cp L1Rchain.txt trusted_certs.txt
cat L1Rroot.txt >> trusted_certs.txt

The final product should look similar to the below.

cat trusted_certs.txt

The wallet setup is complete. The rest of this post will be focused on securing OMS and the various components that OMS uses. You will need the SYSMAN and agent registration password close by as they will be used throughout this process.

7. Secure the OMS to Use the Wallet and Agent

We will first secure the OMS to use the wallet we just created, then restart the OMS to make sure that everything comes up correctly. As you will see throughout, a restart of OMS is needed after just about every step in this process.

cd /home/oracle/product/mw/bin
emctl secure console -wallet /home/oracle/certificate
emctl stop oms -all
emctl start oms

This is then to use secure the agent.

cd $AGENT_HOME/bin
./emctl secure agent <registration password>

8. Use Trusted_Certs.txt

We will now use the trusted_certs.txt file, which we created earlier, and secure the agents and the OMS using this file. You will also need to run this same process for the agent on any remote agents you have deployed. This will be followed up by a restart of OMS.

cd $AGENT_HOME/bin
./emctl secure add_trust_cert -trust_certs_loc /home/oracle/certificate/trusted_certs.txt

cd $OMS_HOME/bin
./emctl secure oms -wallet /home/oracle/certificate -trust_certs_loc /home/oracle/certificate/trusted_certs.txt

./emctl stop oms -all
./emctl start oms

9. Test the Agents and Secure the Weblogic Component

Once OMS is back up, I usually will then test all of the agents by running a status and then upload command to make sure that all of the pieces are communicating like they should.

cd $AGENT_HOME/bin
./emctl status agent
./emctl upload

Now, we will secure the Weblogic component.

./emctl secure wls -wallet /home/oracle/certificate
./emctl stop oms -all
./emctl start oms

10. Allow OMS Host and Weblogic to Communicate

The last step in this process is to secure the agent that is on the OMS host so that it can communicate with the Weblogic component. We will upload the root certificate and the intermediate certificate to the agent. It’s a good idea to run an upload agent command after this step to verify.

cd $AGENT_HOME/bin
./emctl stop agent
./emctl secure add_trust_cert_to_jks -trust_certs_loc /home/oracle/certificate/root.cer -alias rootcacert -password welcome
./emctl secure add_trust_cert_to_jks -trust_certs_loc /home/oracle/certificate/intermediate.cer -alias intercacert -password welcome
./emctl start agent
./emctl upload agent

11. Verify Your Work

Now that we have completed this step, you can verify everything by running a emctl status oms -details command. The consoles should be locked and the HTTPS ports should now be in use. I’ve highlighted these differences in the screenshot below.

/opt/oracle/product/mw/bin/emctl status oms -details
Oracle Enterprise Manager Cloud Control 13c Release 2
Copyright (c) 1996, 2016 Oracle Corporation. All rights reserved.
Enter Enterprise Manager Root (SYSMAN) Password :
Console Server Host :
HTTP Console Port : 7788
HTTPS Console Port : 7802
HTTP Upload Port : 4889
HTTPS Upload Port : 4903
EM Instance Home : /opt/oracle/product/gc_inst132/em/EMGC_OMS1
OMS Log Directory Location : /opt/oracle/product/gc_inst132/em/EMGC_OMS1/sysman/log
OMS is not configured with SLB or virtual hostname
Agent Upload is locked.
OMS Console is locked.
Active CA ID: 1
Console URL:
Upload URL:

WLS Domain Information
Domain Name : GCDomain
Admin Server Host :
Admin Server HTTPS Port: 7102
Admin Server is RUNNING

Oracle Management Server Information
Managed Server Instance Name: EMGC_OMS1
Oracle Management Server Instance Host:
WebTier is Up
Oracle Management Server is Up
JVMD Engine is Up

BI Publisher Server Information
BI Publisher Managed Server Name: BIP
BI Publisher Server is Up

BI Publisher HTTP Managed Server Port : 9701
BI Publisher HTTPS Managed Server Port : 9803
BI Publisher HTTP OHS Port : 9788
BI Publisher HTTPS OHS Port : 9851
BI Publisher is locked.
BI Publisher Server named 'BIP' running at URL:
BI Publisher Server Logs: /opt/oracle/product/gc_inst132/user_projects/domains/GCDomain/servers/BIP/logs/

BI Publisher Log : /opt/oracle/product/gc_inst132/user_projects/domains/GCDomain/servers/BIP/logs/bipublisher/bipublisher.log

12. Troubleshoot if Necessary

If you run into any errors, it is good to start with the emctl.log which should point you to the cause of the issue. I also used Oracle MOS notes 1367988.1 and 1368940.1 when configuring everything.


AEM has gone through the process of securing the OMS for a number of customers. We view the steps outlined in the blog as a mandatory configuration change required for implementing OEM to improve the overall security posture of an organization. We have identified a number of other security practices designed to prevent Denial of Service and other such attacks from occurring.

Happy to talk more. We can help your organization implement these best practices to avoid the financial operational, and overall impact associated with security breaches—and keep all security-minded DBAs gainfully employed for years to come!

Meet Greg Garrison

How to Configure and Secure OMS with Third-Party Certificates (2024)


How to configure and secure OMS with third party certificates? ›

  1. Create a Directory. ...
  2. Generate a User Certificate. ...
  3. Export the Certificate. ...
  4. Load Certificates into Oracle Wallet. ...
  5. Verify with Orapki Display. ...
  6. Combine Root and Intermediate Certificates. ...
  7. Secure the OMS to Use the Wallet and Agent. ...
  8. Use Trusted_Certs.txt.

How do I start an OMS server? ›

Starting and stopping OMS
  1. To automatically start the OMS and the underlying application server processes, you will have to execute the following command: emctl start oms.
  2. You will see the following message: ...
  3. To check the status of the OMS, you will have to use the following command: ...
  4. To stop the OMS, you will use:

How to install third-party SSL certificate? ›

The process of purchasing and installing a third-party certificate consists of these steps:
  1. Generate a private key.
  2. Use the private key plus some identifying information to generate a Certificate Signing Request (CSR).
  3. Send the Certificate Signing Request to the certificate authority.

How to install third-party SSL certificate on AWS? ›

Follow these 7 steps to installing an SSL certificate on Amazon Web Services (Aws).
  1. Step 1: Upload Certificate Files on IAM.
  2. Step 2: Covert Certificate Files into .PEM Format.
  3. Step 3: Upload Certificate Using AWS CLI via Command.
  4. Step 4: SSL Certificate Uploaded Successfully.
  5. Step 5: Confirm the Certificate Details.

What is OMS and how does it work? ›

An order management system (OMS) is an electronic system developed to execute securities orders in an efficient and cost-effective manner. Brokers and dealers use an OMS when filling orders for various types of securities and can track the progress of each order throughout the system.

What are OMS platforms? ›

An OMS is a computer software system that automates tracking the number of sales, orders, inventory, and fulfillment.

How do I check my OMS server status? ›

To check the status of OMS, we can login to em server. To get more details about port and URL, then we can use -details in status command.

How do I make my certificate authority trusted? ›

Add Trust with a Certificate Authority (CA)
  1. Create a Certificate Authority.
  2. Generate new key and certificate request.
  3. Self-sign the request to generate a CA certificate.
  4. Create a server certificate and use the CA to sign it.
  5. Allow clients to trust the root CA.

How to install a server certificate signed by a trusted third-party certificate authority? ›

To import and install a new Web Server certificate, you must follow these steps:
  1. Create a Certificate Signing Request (CSR) for a new Web Server certificate.
  2. Have the CSR signed by a trusted Certificate Authority.
  3. Import the CA certificates required for the chain of trust for your signed certificate to your Firebox.

How to configure the client OS to trust the self-signed certificate? ›

To configure a client to trust a self-signed certificate, import the self-signed server certificate to a trust store on the client. A trust store is a key store that contains trusted certificates. Certificates that are in the local trust store are accepted as valid.

How do I make my security certificate trusted? ›

To make the self-signed certificate for CyberTrace Web trusted when using Google Chrome: Open the or https://localhost address in Google Chrome. A warning is displayed in the address bar that the connection to the site is not secure. Click the Not secure message.

Top Articles
Latest Posts
Article information

Author: Terence Hammes MD

Last Updated:

Views: 5652

Rating: 4.9 / 5 (69 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Terence Hammes MD

Birthday: 1992-04-11

Address: Suite 408 9446 Mercy Mews, West Roxie, CT 04904

Phone: +50312511349175

Job: Product Consulting Liaison

Hobby: Jogging, Motor sports, Nordic skating, Jigsaw puzzles, Bird watching, Nordic skating, Sculpting

Introduction: My name is Terence Hammes MD, I am a inexpensive, energetic, jolly, faithful, cheerful, proud, rich person who loves writing and wants to share my knowledge and understanding with you.