Thursday, May 26, 2016

Oracle® SOA 12c Enterprise Scheduler Health Check

Access the Java health check servlet in a web browser.

Access to the health check page is available only to users with administrator privileges.

To verify the Oracle Enterprise Scheduler installation:

  • In a web browser, enter the following URL: 



  • Log in to the diagnostic servlet using an Oracle WebLogic Server administrator user name and password. 

  •  Click the Check Health button to verify the installation

  • You should see the following screen

Friday, April 29, 2016

Oracle® SOA 12c 12.2.1 Quick Start

Starting in 12(12.1.3), we can no longer download SOA extensions. We need to use a Quick Start distribution to obtain a version of JDeveloper pre-configured for either SOA Suite or Business Process Management Suite. This thread discusses the installation of Oracle SOA Suite Quick Start.

  • Navigate to URL to download the zip files for SOA Suite Quick Start. Download both the files.

  • Extract the contents of both the files
  • Ensure that contents of both the zip files are in the same folder

  • JDK 1.8 is a minimum requirement for running the software. Please download and install JDK 1.8 or above. Set the JAVA_HOME environment variable.

  • Navigate to the unzipped folder for Disk 1 of 1 and give the command
java -jar fmw_12.

  • This will launch the SOA installer

  • Click Next 

  • Click Next

  • Click Next

  • Click Next

  • Click Install

Please verify JDeveloper

Tuesday, April 19, 2016

Oracle® Fusion Middleware Weblogic 10.3.6: JPA client error

In a recent IoT project, MindTelligent team ran into an issue with connecting the JPA (Session Facade Client) with Session Beans when deployed on Weblogic 10.3.6 JDK 1.7 and client running on JDeveloper

Following exception is thrown org.eclipse.persistence.exceptions.ValidationException; local class incompatible: stream classdesc serialVersionUID = 8323218586942907354, local class serialVersionUID = 7573113798854854020 org.eclipse.persistence.exceptions.ValidationException; local class incompatible: stream classdesc serialVersionUID = 8323218586942907354, local class serialVersionUID = 7573113798854854020
at weblogic.rjvm.ClassTableEntry.readExternal(

The version of the Class org.eclipse.persistence.exceptions.ValidationException is different in JDeveloper and Weblogic instance on which the EJB 3.0 are running.


FTP the  org.eclipse.persistence_1.2.0.0_2-3.jar from the Weblogic Instance where the deployed beans are running and include it in the CLASSPATH of the client as shown below. This should resolve the issue

Monday, March 14, 2016

Registering the Jersey JAX-RS RI Shared Libraries With Your WebLogic Server Instances

Shared Java EE libraries are registered with one or more WebLogic Server instances by deploying them to the target servers and indicating that the deployments are to be shared. Shared Java EE libraries must be targeted to the same WebLogic Server instances you want to deploy applications that reference the libraries.

If you wish to use Jersey JAX-RS RI Version, the following shows an example of how to deploy the shared libraries that provide support for the basic Jersey JAX-RS RI functionality and JAX-RS API.

  • Change to the WLS_HOME/server/bin and run the command
  • Change to the WLS_HOME/server/lib directory

           cd C:\WLS1036\Oracle\Middleware\wlserver_10.3\server\lib

  •  Give the command

java weblogic.Deployer -verbose -noexit -source C:\WLS1036\Oracle\Middleware\wlserver_10.3\common\deployable-libraries\jersey-bundle- -targets AdminServer -adminurl t3://localhost:7001 -user weblogic -password *** -deploy -library

  • Give the command
 java weblogic.Deployer -verbose -noexit -source C:\WLS1036\Oracle\Middleware\wlserver_10.3\common\deployable-libraries\jsr311-api-1.1.1.war -targets AdminServer -adminurl t3://localhost:7001 -user weblogic -password Satnaam111 -deploy -library

Wednesday, November 18, 2015

Customizing Okta Accounts Page, Organization Logo and Appearance

Customizing Okta

The Settings menu allows you to customize the look and feel of your organization. Admins can customize elements such as headings, labels, and the appearance of the Okta My Applications or "home" page, as well as the look and feel of the activation email. The Settings menu also includes a Downloads option to the latest browser plug-ins and admin downloads.
The Settings menu is an option on the Administrator Dashboard:
User-added image

Account Page

As an admin, you can supply contact information for your org, including organization, end-user support, billing, and technical contacts. You can also give Okta Support temporary access to your account for troubleshooting purposes, and can select the type of email notifications you want to receive. The Account page hosts all of this information.

  1. Select Settings > Account.
  2. Click the corresponding Edit link to specify the following:
    • Organization Contact: Used by Okta to communicate with your organization.
    • End User Support Contact: Enter a support phone number that will display on Okta help pages.
    • Technical Contact: Receives notices when users send a help request. The email address appears on all new user registration emails.
    • Billing Information: Used by Okta for billing purposes.
    • Give Access to Okta Support: By default this is Disabled. If you want to allow Okta Support to login to your account as an administrator for troubleshooting purposes, click Edit, then change this option toEnabled. Access is only enabled for 8 hours; after which you will need to re-enable access for Okta Support again.
    • Email Notifications: Configure which email notifications are sent to you by doing the following:
    1. From your Administrator Dashboard, select Settings > Account, and then click Edit in the Email Notifications section.
    2. For each email notification that you want to receive, select the corresponding check box.
  1. Once you have made any changes to your account settings, click Save.

Appearance Page

Admins can specify the look and feel of their end users'  My Applications or "home" page. The Appearancepage allows for customizing how much or how little of Okta is shown for an org.

Display Options

The elements under Display Options have a large impact on how your end users experience their My Applications home page, as well as the admin user experience.  
  1. Select Settings > Appearance.
  1. In the Display Options section, click Edit
  1. You can specify 2 display options here:
  • Logo URL: If you choose to upload your org's logo (as explained in the following section), you can have the logo link to your company's website. Specify the URL you want to link to in this field.
Note: A logo must be uploaded before the link can become active. See Organization Logo below for instructions on how to add a company logo. 
  • Enable Okta Home Footer: Specify whether you want to the Okta footer to appear on your end users' Home pages (True/False)
  1. Click Save.

Organization Logo

One way you can customize your end users' My Applications or "home" page is to add the company logo for your org.
  1. Prepare a logo file. The file must be in .jpg, .png, or .gif format. The maximum file size is 100kB, and the maximum dimensions are 3000 x 500px.
  1. ​Select Settings > Appearance.
  1. Under Organization Logo, click Upload Logo, and then browse to find the logo file you previously created.
  1. Click Upload Logo. The image appears as a thumbnail which displays when your users sign in.

Application Theme

Choose an application theme to customize the look and feel for your end users. Click on a thumbnail to choose a theme.
  1. Select Settings > Appearance.
  1. From under Application Theme, select a thumbnail. The Change Theme button appears. This is the color scheme that will appear on your end user's My Applications home page. 
The selected theme appears with these colors when your end users sign in.

Monday, October 26, 2015

Okta Universal directory. Customize user Profile

Okta Universal directory. Customize user Profile (Okta User and App User)

UD introduces profiles, representations of user accounts. In particular, UD supports two types of profiles: theOkta User profile, and the App user profile. The two profile types are used to 1. store rich attributes in Okta, and 2. move rich attributes from Okta to 3rd-party apps.

Use the Profile Editor to view or modify these profiles. To access it
  1. From the Administrative Dashboard, go to the People tab.
  2. Select Profile Editor.
  3. Select Profiles.
User-added image

The Okta User Profile

The Okta user profile represents a user in Okta (an Okta account) and is comprised of two parts: base attributes and custom attributes. To view to view the Okta user profile
  1. From the Administrative Dashboard, go to the People tab.
  2. Select Profile Editor.
  3. Select Profiles.
  4. Expand the OKTA section then select User.
Okta has defined 31 default base attributes for all users in an org. These base attributes are fixed and cannot be modified or removed. If you wish to add more attributes to the user profile, you can add them as custom attributes.
User-added imageUser-added imageUser-added image

Adding Custom Attributes

Extend an Okta User profile by adding an attribute to the custom portion of the profile. Base attributes cannot be altered.
To add an attribute
  1. Select User under the OKTA profile type.
  2. Click the Add Attribute button.
  3. The following window appears.
User-added image
  1. Complete the following fields:
  • Display name: A human readable label that will appear in the UI
  • Variable name: Name of attribute that can be referenced in mappings
  • Description: Description of the attribute
  • Data typeThere are 8 admissible data types:
    • string: a chain of zero or more unicode characters (letters, digits, and/or punctuation marks)
    • number: floating-point decimal in Java's 64-bit Double format. For details see the Java Platform Specification.
    • boolean: stores true, false, or null data values
    • integer: whole numbers in 64-bit Java's Long format
    • date: stores only the calendar date and requires four bytes in ISO 8601 format
    • array of string: sequential collection of strings
    • array of number: sequential collection of numbers
    • array of integer: sequential collection of integers
  1. When completed, click the Add Attribute button or, if you wish to add more than one, click the Save and Add Another button.
  2. After adding the attribute, configure the following:
  • Attribute required: Select this checkbox if the attribute must be populated.
  • User permission: Choose options to hide the attribute or make it read-only or read-write.
  1. Click Save Attribute.


Sunday, October 25, 2015

Okta-Create a Security Token

  • Navigate to Okta console.
  • Navigate to API, to create a token

  • On Clicking the Create Token button, enter the Token Name

  • Toke is created

  • click on "OK, got it"

Friday, July 31, 2015

Oracle® Identity and Access Manager / SOA Workflows OWSM default-keystore.jks

Oracle® Identity and Access Manager / SOA Workflows  OWSM default-keystore.jks

Regenerate the default-keystore.jks following the steps descrided in the document below :  

1.In an empty working folder execute the following in order to generate a new keystore file:
keytool -genkey -alias xell -keyalg RSA -keysize 1024 -dname "CN=Customer, OU=Customer, O=Customer, L=City, ST=NY, C=US" -validity 3650 -keypass <password> -keystore default-keystore.jks -storepass <password> -storetype jks -provider

Please ensure that JDK_HOME\jre\bin is in your PATH environment variable.

2.Generate a certifcate request:
keytool -certreq -alias xell -file xell.csr -keypass <password> -keystore default-keystore.jks -storepass <password> -storetype jks -provider

3.Export the certificate:
keytool -export -alias xell -file xlserver.cert -keypass <password> -keystore default-keystore.jks -storepass <password> -storetype jks -provider

4.Trust the certificate:
keytool -import -trustcacerts -alias xeltrusted -noprompt -keystore default-keystore.jks -file xlserver.cert -storepass <password>

5.Copy all the 3 generated files (default-keystore.jks, xell.csr, xlserver.cert) in MIDDLEWARE_HOME\user_projects\domains\<OIM Domain>\config\fmwconfig

You should repeat this step for each node in a clustered environment.

6.Change the values of the CSF keys for default-keystore.jks and xell:
- Login to Enterprise Manager
  - Right-click the domain
  - Navigate to Security, and then Credential
  - Expand oim
  - Edit default-keystore.jks and xell and change the password for both keys with the values used in steps 1-4.

Note: You should NOT change the passwords for other CSF keys!

7.Restart OIM server and check if everything is working fine.

One should do the following, saving in between :

1) Go to EM --> --> Security --> Credentials
2) Expand map
3) Change paswords of the following keys
  - keystore-csf-key (user=owsm, password=keystore password)
  - enc-csf-key (user=xell, password)
  - sign-csf-key (user=xell, password)
  - recipient-alias-key (user=xell, password)