Decrypt passwords used in weblogic/jdbc

Version 1
Visibility: Open to anyone

    This documents provides the steps to decrypt passwords used in weblogic/jdbc. We use a script called decrypt.py to decrypt the encrypted passwords. This will help to verify the passwords during patching, upgrade or any incidents.

     

    For Example SOA Schema:

    • SOAINFRA

     

    To decrypt passwords of the weblogic/jdbc

    Command: java weblogic.WLST decrypt.py <domain_path> <pass_to_decrypt>

    Script Location: <DOMAIN_DIR>/decrypt.py

     

    For SOAINFRA:

    You can get the encrypted pass from corresponding JDBC config file. <domain>/config/jdbc/SOADataSource-jdbc.xml

    <password-encrypted>{AES}uRDDc3PbHGkJqAAmm8v9eCvWFhxJbk0d8tsf8ZnFlcM=</password-encrypted>

    [oracle@SOAHOST bin]$ java weblogic.WLST <DOMAIN_DIR>/decrypt.py <DOMAIN_DIR> {AES}uRDDc3PbHGkJqAAmm8v9eCvWFhxJbk0d8tsf8ZnFlcM=

    Initializing WebLogic Scripting Tool (WLST) ...

    Welcome to WebLogic Server Administration Scripting Shell

    Type help() for help on available commands

    Plaintext password is: Welcome1

     

    PFA decrypt.py script.