execute dbms_sqltune.accept_sql_profile(task_name =>'H43369.4496173495', task_owner => 'xxxx',replace => TRUE, force_match => TRUE);
Wednesday, September 26, 2018
Thursday, September 20, 2018
Find lost weblogic domain password for OEM 12c
To find weblogic password follow below steps
First go to below location
/opt/app/oracle/middlewarer2/oracle_common/common/bin
**********************************************************************************************
create a file name with decrypt.py
vi decrypt.py
#/bin/python
#=====================================================================
#
# $Id: decrypt.py $
#
# PURPOSE: Script to decrypt any Password or Username
# within a WebLogic Server Domain
#
# PARAMETERS: none
#
# NOTES: none
#
# AUTHOR: Dirk Nachbar, https://dirknachbar.blogspot.com
#
# MODIFIED:
#
#
#=====================================================================
# Import weblogic.security.internal and weblogic.security.internal.encryption
from weblogic.security.internal import *
from weblogic.security.internal.encryption import *
# Provide Domain Home Location
domain = raw_input("Provide Domain Home location: ")
# Get encryption service with above Domain Home Location
encryptService = SerializedSystemIni.getEncryptionService(domain)
clearOrEncryptService = ClearOrEncryptedService(encryptService)
# Provide the encrypted password or username, e.g. from boot.properties
encrypted_pwd = raw_input("Provide encrypted password or username (e.g.: {AES}jNdVLr...): ")
# Clear the encrypted value from escaping characters
cleared_pwd = encrypted_pwd.replace("\\", "")
# Personal security hint :-)
raw_input("Make sure that nobody is staying behind you :-) Press ENTER to see the password ...")
# Decrypt the encrypted password or username
print "Value in cleartext is: " + clearOrEncryptService.decrypt(cleared_pwd)
#END
**********************************************************************************************
You can get the encrypted password and username from below location
cd /opt/app/oracle/middlewarer2/gc_inst/user_projects/domains/GCDomain/servers/EMGC_ADMINSERVER/security
cat boot.properties
#Generated by Configuration Wizard on Sat Oct 20 10:20:22 PDT 2012
username={AES}tFHZTUTQ5xhgS3WQicmnSPgTfFv1xswVwndUaCeb7qk=
password={AES}QZ06i3z6EAoK82eb20n0dZr+xYAxUAk26HtgmOt4Pp0=
**********************************************************************************************
export DOMAIN_HOME=/opt/app/oracle/middlewarer2/gc_inst/user_projects/domains/GCDomain
cd /opt/app/oracle/middlewarer2/oracle_common/common/bin
Make sure decrypt.py has execute permission
./wlst.sh decrypt.py
Provide Domain Home location: /opt/app/oracle/middlewarer2/gc_inst/user_projects/domains/GCDomain
Provide encrypted password or username (e.g.: {AES}jNdVLr...): {AES}tFHZTUTQ5xhgS3WQicmnSPgTfFv1xswVwndUaCeb7qk=
Now you will get password in cleartext
First go to below location
/opt/app/oracle/middlewarer2/oracle_common/common/bin
**********************************************************************************************
create a file name with decrypt.py
vi decrypt.py
#/bin/python
#=====================================================================
#
# $Id: decrypt.py $
#
# PURPOSE: Script to decrypt any Password or Username
# within a WebLogic Server Domain
#
# PARAMETERS: none
#
# NOTES: none
#
# AUTHOR: Dirk Nachbar, https://dirknachbar.blogspot.com
#
# MODIFIED:
#
#
#=====================================================================
# Import weblogic.security.internal and weblogic.security.internal.encryption
from weblogic.security.internal import *
from weblogic.security.internal.encryption import *
# Provide Domain Home Location
domain = raw_input("Provide Domain Home location: ")
# Get encryption service with above Domain Home Location
encryptService = SerializedSystemIni.getEncryptionService(domain)
clearOrEncryptService = ClearOrEncryptedService(encryptService)
# Provide the encrypted password or username, e.g. from boot.properties
encrypted_pwd = raw_input("Provide encrypted password or username (e.g.: {AES}jNdVLr...): ")
# Clear the encrypted value from escaping characters
cleared_pwd = encrypted_pwd.replace("\\", "")
# Personal security hint :-)
raw_input("Make sure that nobody is staying behind you :-) Press ENTER to see the password ...")
# Decrypt the encrypted password or username
print "Value in cleartext is: " + clearOrEncryptService.decrypt(cleared_pwd)
#END
**********************************************************************************************
You can get the encrypted password and username from below location
cd /opt/app/oracle/middlewarer2/gc_inst/user_projects/domains/GCDomain/servers/EMGC_ADMINSERVER/security
cat boot.properties
#Generated by Configuration Wizard on Sat Oct 20 10:20:22 PDT 2012
username={AES}tFHZTUTQ5xhgS3WQicmnSPgTfFv1xswVwndUaCeb7qk=
password={AES}QZ06i3z6EAoK82eb20n0dZr+xYAxUAk26HtgmOt4Pp0=
**********************************************************************************************
export DOMAIN_HOME=/opt/app/oracle/middlewarer2/gc_inst/user_projects/domains/GCDomain
cd /opt/app/oracle/middlewarer2/oracle_common/common/bin
Make sure decrypt.py has execute permission
./wlst.sh decrypt.py
Provide Domain Home location: /opt/app/oracle/middlewarer2/gc_inst/user_projects/domains/GCDomain
Provide encrypted password or username (e.g.: {AES}jNdVLr...): {AES}tFHZTUTQ5xhgS3WQicmnSPgTfFv1xswVwndUaCeb7qk=
Now you will get password in cleartext
Subscribe to:
Posts (Atom)
Featured Post
Apply Patch 22191577 latest GI PSU to RAC and DB homes using Opatch auto or manual steps
Patch 22191577: GRID INFRASTRUCTURE PATCH SET UPDATE 11.2.0.4.160119 (JAN2016) Unzip the patch 22191577 Unzip latest Opatch Version in or...
-
NTP change on Exadata db nodes # grep ^server /etc/ntp.conf server 10.120.0.10 prefer iburst burst minpoll 4 maxpoll 4 server 10.120....
-
Some times oem shows scan listener status down even if it is up. Problem is with configuration. While creating a listener_scan target i...
-
Cleaning SYSAUX tablespace 1. Running @?/rdbms/admin/awrinfo.sql –> Detailed Info like Schema breakdown, SYSAUX occupants space usage ...