Wednesday 4 April 2018

Location of Weblogic.jar and jrf.jar in Weblogic server.

Weblogic.jar:
C:\Oracle\Middleware\wlserver_10.3\server\lib\weblogic.jar

jrf.jar
C:\Oracle\Middleware\oracle_common\modules\oracle.jrf_11.1.1\jrf.jar

Friday 30 March 2018

Enable MTOM in SOAPUI

MTOM/XOP : Message Transmission Optimization Mechanism/XML-binary Optimized Packaging (MTOM/XOP) 

If you have a requirement where the web service has to send and receive large number of documents (images, word documents, pdf etc) to an enterprise system over internet, then using MTOM will save you the bandwidth. You gain efficient network transmission  by using MTOM.

Enabling MTOM in SOAP UI
1. Set Enable MTOM to true in Request Properties
2. Attach a file and link the file in the SOAP payload by using the cid: notation
3. Invoke the payload and confirm upload.

Get attachment from SOAP UI response
1.Observe the attachment within the Response payload via XOP include reference
2. Retrieve the attachment by clicking the highlighted button.
References:
https://blogs.oracle.com/vijaya/web-service-mtom
http://www.mkyong.com/webservices/jax-ws/jax-ws-attachment-with-mtom/
https://www.ibm.com/developerworks/library/ws-devaxis2part3/


Friday 15 December 2017

Maintaining public private keys & uploading public key during cloud service creation.

How to load the same public key downloaded during creation of JCS or DBCS cloud services.

Download the zip file (public + private keys)

Extract zip file.

Edit public key name as publicKey and give extension as .pub
Edit private key name as private-key and gicve extension as .ppk





Upload the public key while creating the JCS or DBCS instance.


Thursday 20 April 2017

Role-based security for Oracle JCS-SaaS Extensions.

Protect your users, protect your applications. Role-based security means that predefined roles and users determine who can access, deploy, and administer tasks in Oracle JCS - SaaS Extension and the applications deployed on it.

•As an administrator, you can access web-based Oracle JCS - SaaS Extension Control to manage and monitor a service instance. You can use the SDK to manage and monitor service instances.

• As a developer, you can use either embedded tooling in supported IDEs to directly interact with a service instance or the Oracle JCS - SaaS Extension SDK and Java Cloud Service - SaaS Extension Control to interact with service instances. Oracle JCS - SaaS Extension ships with enterprise-grade security, with isolated, dedicated virtual machines running your applications or extensions. There’s no environment sharing between tenants. The fully integrated Identity Management solution provides Single Sign-On (SSO) access between your extension and your SaaS applications, including self-service user management and access control. After you enable federation in the data center where your SaaS application is running, you can enable SSO without additional developer intervention. 

Oracle SalesCloud Data Syncronization with Custom Application

Configure Data Scheduler Using Oracle Database Cloud Service-based
Cloud Scheduler Package

The CLOUD-SCHEDULER package (present in Oracle DBCS) is a wrapper that exactly mirrors the standard DBMS_SCHEDULER package in an Oracle database. The scheduled job is a REST web service that performs data synchronization. The APEX_WEB_SERVICE package contains
functions to invoke and parse responses from web services.


A stored procedure that invokes the secured REST web service is as follows.

create or replace procedure "RESTWS_REQUEST"
is
l_clob clob;
l_buffer varchar2(32767);
begin
l_clob := apex_web_service.make_rest_request(
p_url =>
'https://java-trialxxxx.java.us1.oraclecloudapps.com/ScheduledRESTWebServiceEndpoi
nt/jersey/myRESTWebService',
p_http_method => 'GET',
p_username => 'AdminAccountGoesHere',
p_password => 'AdminaccountpasswdGoesHere'
);
l_buffer := dbms_lob.substr(l_clob, 32000, 1 );
dbms_output.put_line(l_buffer);
end;

Once the stored procedure is compiled and executed successfully, it can be scheduled
or run ad hoc using CLOUD_SCHEDULER.

A sample SQL code to invoke a CLOUD_SCHEDULER package that schedules the
above stored procedure with a defined frequency is as follows:
BEGIN
CLOUD_SCHEDULER.CREATE_JOB (
job_name => 'RESTSchedule1',
job_type => 'STORED_PROCEDURE',
job_action => 'RESTWS_REQUEST',
start_date => sysdate,
repeat_interval => 'FREQ=MINUTELY;INTERVAL=5',
end_date => sysdate+2,
enabled => TRUE,
comments => 'Test scheduler every 5 mins');
END;

Note: job_action corresponds to the name of the store procedure in
the sample above.

1) You can use the standard USER_SCHEDULER_% views to determine the status
and number of jobs you submitted:
 Select * from user_scheduler_jobs;

2) To view results or log of each instance of an executed job:
Select * from USER_SCHEDULER_JOB_LOG;

3) Once a job is created or scheduled, CLOUD_SCHEDULER allows you to run that job immediately on an ad hoc request using
CLOUD_SCHEDULER.RUN_JOB (RESTWS_REQUEST).

4) You can disable the job in the scheduler by using cloud scheduler's DISABLE procedure using
CLOUD_SCHEDULER.disable (RESTWS_REQUEST).

Unable to get file lock, will retry ... issue with Integrated Weblogic server.

Environment : Using Integrated Weblogic Server.

Issue : <BEA-141281> <unable to get file lock, will retry ...
Solution : Delete DefaultServer.lok file present at below location

C:\Users\Admin\AppData\Roaming\JDeveloper\system11.1.1.9.40.66.73\DefaultDomain\servers\DefaultServer\tmp\DefaultServer.lok

Thursday 28 July 2016

How to import SSL certificate in Jdeveloper KeyStore

In order to consume Secured SOAP services (https) we need to import Certificates in Jdeveloper KeyStore.

1) Get the certificate from WSDL by opening it in any preferred browser .



2) Click on "Export" & save the certificate as .crt file.


3) Now move the saved certificate to the jdeveloper keystore(cacerts) using the command below.

keytool -keystore C:\Oracle\Middleware\jdk160_29\jre\lib\security\cacerts -importcert -alias erp_verizon_cacert1 -file C:\Users\Vikas\Desktop\VeriSignClass3PublicPrimaryCertificationAuthority-G5.crt

keytool -keystore C:\Oracle\Middleware\jdk160_29\jre\lib\security\cacerts -importcert -alias erp_symantec_cacert1 -file C:\Users\Vikas\Desktop\SymantecClass3SecureServerCA-G4.crt

keytool -keystore C:\Oracle\Middleware\jdk160_29\jre\lib\security\cacerts -importcert -alias erp_ehiw_test_root1 -file C:\Users\Vikas\Desktop\rootca.crt

4) Cacerts location is being referred in ADF client web proxy project as TrustStore.
 private final String trustStore = "C:\\Oracle\\Middleware\\jdk160_29\\jre\\lib\\security\\cacerts";