Wednesday, December 24, 2008
Big Tables in Campus Solutions
Wednesday, December 3, 2008
Configuring SSL
SSL certificate configuration
The following steps describe how to generate private keys, import certificates into a keystore and how to configure SSL via the WebLogic admin server console.
1. Access the WebLogic domain files.
Open a DOS window and CD to the Webserve directory under your ps_home. (e.g. CD C:\pshome\webserv\
2. Create a new private key and certificate request for your server.
1. To create a new private key and certificate signing request, run pskeymanager.cmd -create
2. Follow the prompts and specify the information that you normally would when creating a certificate.
Keystore password: The default keystore password will be "password". It is adviced to be changed and made a note of.
DV - DevendraVaidya
Alias: MyPS (This is what is export over the internet) https://myps.dv.com:
Common name: myps.dv.com (domain)
OU: DVIT
Organization: Devendra Vaidya Ltd
City: Mumbai
State: Maharashtra
Country: India
Take the defaults on the rest of the fields
3. Submit your certificate request to a Certificate Authority (RapidSSL / Verisign/Thwate) to obtain your certificate (a.k.a public key).
Once the certificate it received, paste it into a .txt file. (dv.txt)
4. Obtain the root certificate of the CA which processed your request.
Download the root CA certificate from for eg GeoTrust/ Thwate which ever you go with.
The root that is used to issue Versign/Thwate/ certificates(one you choose) is the root labeled "Equifax Secure Certificate Authority (Base-64 encoded X.509)" (Root 1). Once the certificate it received, paste it into a .txt file. (cert1.txt)
5. Create a combined certificate.
The certificate received from Versign/Thwate/ (one you choose) must also contain a copy of the root certificate. Paste the text of cert1.txt into dv.txt after the existing text with no blank lines between the two certs. Save the file (dv_combined.txt).
6. Place the certificates on the webserver.
Place the files (cert1.txt and dv_combined.txt) into the Weblogic domain directory. (C:\pshome\webserv\dv)
7. Import your Certificate Authority's certificate into your keystore.
To import your Certificate Authority's public certificate, which you received from your CA, into your keystore, execute "pskeymanager.cmd -import". When prompted for an alias, specify "equifax". This name is simply an alias for this certificate. When prompted for the certificate file to import, specify the cert1.txt certificate file.
8. Import your certificate into your keystore.
To import your public certificate, which you received from your CA, into your keystore, execute "pskeymanager.cmd -import". When prompted for an alias specify the same alias you did when you created your private key and cert request in step 2 (e.g. your machine name MyPs). When prompted for the certificate file to import, specify your combined certificate (dv_combined.txt).
9. Restart WebLogic Server
Restart the PIA server either via C:\pshome\webserv\dv\bin\stopPIA.cmd and startPIA.cmd or, if installed as an NT service, " NET START dv
10. Logon to the WebLogic Server Administrative Console.
Access the WebLogic Server console at http://
11. Access Keystores & SSL configuration from the WebLogic Admin console.
In the graphical domain structure hierarchy on the left navigate the following;
- Click on Servers and select PIA
- Click on "keystores" tab
- Click on "Lock & Edit" button in the left panel.
- Select 'Custom Identity And Custom Trust' from the keystores dropdown field
12. Update keystore properties.
Update the following fields and then press the 'save' button.
Click on "Activate changes" button to activate the changes
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Note regarding passwords: The default keystore and private key password is 'password'. This should NEVER be used in a production environment. A private key's password and a keystore's password can be changed via pskeymanager's -changepassword option.
13. Update private key properties.
Click on "SSL" tab
Update the following fields for your private key and then press the 'Save' button.
|
|
|
|
|
|
|
|
|
|
|
|
14. Save your keystore changes.
You MUST click the "Activate changes" button to activate the changes that you have made.
15. Restart WebLogic Server and make sure the SSL port is listening on the configured port.
(See step 9.)
This information will be displayed when running the startPIA.cmd or you can run netstat –a.
16. Configure the other web server(s).
To install this cert on other web servers, just copy the
Word of Thanks to Dan Ashburn- We worked together in setting this up successfully.
Tuesday, December 2, 2008
Stundent Admin - tables that can/cannot be purged!
The following table, which is NOT all inclusive, outlines some of the tables which should never be purged without serious analysis and testing. This table was compiled as a result of a direct request regarding these specific tables, and you should not take this to mean that these are the only tables that need to remain intact.
ITEM_SF
ITEM_LINE_SF
ITEM_XREF
ITEM_DUE_SF
ACCOUNT_SF
TUIT_CALC_TBL
FEE_CLASS_PRICE
BI_BILLING_LINE
STDNT_CAR_TERM
STDNT_ENRL (except through the delivered process)
STDNT_SESSION
The following tables may be purged through delivered processes:
STDNT_ENRL - (Manage Student Records, Manage Academic Records, Process, Drop Purge) will purge all of the classes in a drop status from PS_STDNT_ENRL. The process is documented in Peoplebooks.
PS_SA_REPORT_RSLT
The following tables can be purged as indicated:
PS_STDNT_CARTRM_PD after Consolidated Statistics has been run
BI_EMPLID_TEMP - After any billing run
BI_ACCT_TEMP - After any billing run
BI_ACCT_ITM_TMP - After any billing run
CREDIT_HISTORY of all but the most current effective dated rows for each student
ITEM_SF_GL_HIST - if the following table is purged
SF_ACCTG_LN - after journals are processed and data no longer needed for historical purposes
COMM_SCTN _DATA in conjunction with the following table
COMM_SCTN_HDR. (see res 200732040)
PS_SF_ACCTG_LN_OLD after upgrade has been completed