Home Discussions Questions & Answers SSLHandshakeException During ECC Application Import (TLS EBS)

SSLHandshakeException During ECC Application Import (TLS EBS)

Avatar photoCustomer November 16, 2020 at 10:38 am

Our EBS instance is TLS enabled (HTTPS), and when we run `patchEccFiles.pl` to import the command center applications, it fails repeatedly with a `javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure`. What causes this and how do we fix it?

Viewing 6 reply threads
  • Author
    Replies
    • Support November 18, 2020 at 2:36 am  

      The `SSLHandshakeException` typically indicates a certificate trust issue, specifically when the EBS instance is TLS enabled and the application importer script cannot validate the SSL connection. It is critical to ensure that when EBS is TLS enabled, all configuration steps regarding outbound connections are properly completed, not just the inbound configuration. You need to carefully review section 5.3, ‘Configure Loopback and Outbound Connections,’ in Oracle Support Document 1367293.1, ‘Enabling TLS in Oracle E-Business Suite Release 12.2’, because this section is frequently overlooked when inbound TLS is configured.

    • Avatar photoCustomer November 18, 2020 at 2:43 pm  

      We are using a self-signed certificate for EBS TLS, and someone suggested that might be related to the proxy error we see when trying to access the ECC URL directly through HTTPS. Is there a specific process for handling self-signed certificates during ECC import?

    • Support November 20, 2020 at 6:31 am  

      While I don’t have a specific document dedicated solely to self-signed certificates in the context of ECC import here, if you are running EBS with a self-signed certificate, you must ensure that the EBS certificate is correctly imported into the relevant JDK keystores used by the EBS application tier. Skipping the loopback and outbound configuration (Doc ID 1367293.1, section 5.3) often leads to issues during the import stage, as the EBS application tier needs to trust its own hostname and certificate when communicating externally, or in this case, sending the application files to ECC. You might also find helpful information in the blog post about configuring TLS for ECC.

    • Avatar photoCustomer November 21, 2020 at 9:18 am  

      What does the ECC WEB ENTRY URL displayed by `patchEccFiles.pl` actually point to? My output shows the EBS middle-tier host name and port, but shouldn’t it be pointing to the ECC server itself?

    • Support November 22, 2020 at 1:21 pm  

      The ECC WEB ENTRY URL shown during the execution of `patchEccFiles.pl` is expected to point back to the EBS instance, typically showing the EBS middle-tier hostname and port (e.g., `http://demo.enginatics.com:80/ecc`). This is because the EBS application server is initiating the import process and communicating the target URL. The import process uses the EBS instance as the gateway to deploy the zipped application files (like `ap_ecc.zip`) which the EBS server retrieves and sends to the ECC application. Once the files are successfully imported, the resulting summary report should show ‘Success’ for all applications attempted, such as AP, AR, FA, and OKL.

    • Avatar photoCustomer November 23, 2020 at 12:08 pm  

      The log output shows a ‘Proxy Error’ when accessing the EBS HTTPS URL. Could this be related to the OHS configuration?

    • Support November 25, 2020 at 11:15 am  

      Yes, a ‘Proxy Error’ encountered when accessing the EBS HTTPS URL (e.g., `https://EBSserver.abc.com:443/ecc`) suggests a problem in how the OHS (Oracle HTTP Server) is configured to handle the request redirection or proxying to the ECC managed server. After running AutoConfig on EBS, you should verify that the OHS configuration file (`ecc.conf`) contains a proper `RewriteRule` directing the `/ecc` path on EBS to the ECC managed server URL, which ensures seamless integration. If AutoConfig ran correctly, but the proxy error persists, you should check the OHS log files and confirm the directory structure for the TLS certificate keystores, which is typically found under `[s_ohs_instance_loc]/config/OHS/[s_ohs_component]/keystores/default`.

Viewing 6 reply threads
  • You must be logged in to reply to this post.

Login with: