With these simple steps, you can quickly and easily decrypt database user passwords in Oracle WebLogLogic Server.

If you’re using Oracle WebLogic Server 12.1, be sure to refer to the support note “Decrypt lost passwords of Weblogic 12.1” for any differences in the decryption process.

By following these tips, you’ll have the necessary tools to locate and decrypt passwords whenever needed. And your manager will surely appreciate your improved password management skills.

Make Password Management a Breeze: Tips for DBAs to Recover Lost WebLogic Server Passwords

Password management can be a challenging task for DBAs, especially when dealing with expired passwords for database users.

Fortunately, there is a simple tip that can make your life a little easier. If you’re using Oracle WebLogic Server, you can easily recover lost passwords by searching for the AES string stored in the config.xml or jdbc xml files in your $DOMAIN_HOME directory.

Retrieve Encrypted Password Hash:

  1. To retrieve the encrypted password hash, follow these easy steps. First, search for the AES string in the config.xml or jdbc xml files located in your $DOMAIN_HOME directory. This will give you the necessary encrypted password hash for the next step.

Use this command to quickly locate the string and simplify the password recovery process:

cat $DOMAIN_HOME/config/config.xml | grep AES

2) Next, navigate to the $MW_HOME/oracle_common/common/bin directory and start the WLST shell by running the following command.


3) To decrypt a password, follow these simple commands in the WLST shell. Once you’re in the shell, use the following commands to decrypt the password:

readDomain(‘/fmw/domains/DOMAINNAME’) domain = “/fmw/domains/DOMAINNAME/” service = weblogic.security.internal.SerializedSystemIni.getEncryptionService(domain) encryption = weblogic.security.internal.encryption.ClearOrEncryptedService(service) print encryption.decrypt(“{AES256}TptnhxD0TKFerZXu/3St5dbQE7m1wKAzHNTY1puN3Dg=”)

4) To ensure the decryption process goes smoothly, customize the following commands to match the name of your domain. Replace “DOMAINNAME” with the actual name of your domain and use the correct AES password hash found in the config.xml file.

By following these simple tips, you can successfully decrypt passwords in the WLST shell and simplify your password management tasks.

Read also: Tips for Fixing Certificate Validation Errors in Node Manager | Cannot connect to Node Manager [Security:090479]

About WLST Shell

WLST stands for “WebLogic Scripting Tool”, which is a command-line scripting tool that allows Users to interact with theOracle WebLogic Server. The WLST shell is a command prompt environment where you can execute various WLST commands and scripts to manage your WebLogic Server domain.

WLST is based on the “Jython Scripting Language” – which is a Python-based scripting language – that runs on the Java Virtual Machine (JVM).

With WLST, you can automate various tasks and perform administrative tasks, such as creating and configuring servers, applications, and resources, managing security, and monitoring server performance.

Read also: Mastering Database Links in Oracle: A Comprehensive Guide to Remote Data Access

Categories: DatabasesBlog

James R. Kinley - It Admin

James R. Kindly

My Name is James R. Kindly i am the founder and primary author of Storaclix, a website dedicated to providing valuable resources and insights on Linux administration, Oracle administration, and Storage. With over 20 years of experience as a Linux and Oracle database administrator, i have accumulated extensive knowledge and expertise in managing complex IT infrastructures and databases.


Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *

Save 30% on Apple AirPods Pro

Get the coolest AirPods ever released for:  $179,99  instead $249

  • Active Noise Cancellation blocks outside noise
  • Transparency mode for hearing and interacting with the world around you
  • Spatial audio with dynamic head tracking places sound all around you