How to Enable HTTPS on Oracle EBS R12.2 — Step by Step
Before Okta SSO can work, your EBS environment needs HTTPS. This guide covers Oracle Wallet creation, OHS configuration, and going live on port 443 — with exact commands for your environment.
Why HTTPS First?
Okta is a cloud-based Identity Provider (IdP) that communicates over SAML 2.0. Every SAML assertion it sends contains sensitive authentication tokens. Without HTTPS, those tokens travel in plain text — and Okta simply refuses to integrate with HTTP endpoints. No SSL = no SSO. Full stop.
In this post, we configure HTTPS on Oracle HTTP Server (OHS) for EBS R12.2.13 running on RHEL 8, using an Oracle Wallet with a self-signed certificate on port 443.
Environment Reference
| Component | Value |
|---|---|
| Application server | pc.app.com |
| Database server | pc.db.com : 1533 |
| Current EBS URL | http://pc.app.com:8012 |
| Target HTTPS URL | https://pc.app.com:443 |
| OS | RHEL 8 |
| OHS version | OHS 12.2.x (EBS R12.2.13) |
| Certificate type | Self-signed (lab/dev) |
Log in to pc.app.com as your EBS OS user (typically applmgr) and run:
Typical wallet location:
EBS R12.2 OHS uses the Oracle Wallet — not openssl. The tool is orapki.
source $INST_TOP/ora/10.1.3/Apache/Apache/bin/envvar.sh
The -auto_login flag creates cwallet.sso — allows OHS to start without a password prompt on server restarts.
Verify the certificate was added:
Set these key directives inside ssl.conf:
$(date +%Y%m%d) suffix keeps backups organised by date.
This is the step most DBAs miss. The context file drives all generated EBS configuration. Skip this and your EBS URLs will still point to HTTP even after OHS is serving HTTPS.
HTTP/1.1 200 OK — HTTPS is live!
Final Verification Checklist
| Check | Command | Expected |
|---|---|---|
| Wallet created | ls ssl.wlt/default/ | ✓ cwallet.sso + ewallet.p12 |
| Certificate added | orapki wallet display | ✓ CN=pc.app.com |
| OHS running | adapcctl.sh status | ✓ Running |
| Port 443 open | curl -k https://pc.app.com | ✓ HTTP 200 OK |
| AutoConfig done | adautocfg.sh | ✓ Completed |
| Context file updated | grep 443 $CONTEXT_FILE | ✓ Shows port 443 |
What's Next?
With HTTPS confirmed on https://pc.app.com, your environment is ready to receive Okta SAML assertions securely. In Part 2 of this series, we deploy the Oracle EBS Asserter on WebLogic — the middleware that translates Okta's SAML token into an EBS session.
Hit any issues? Drop a comment with the error message and I'll help troubleshoot.