Upgrading Essbase On‑Prem environments within EPM 11.2.x is generally considered a routine activity. However, if SSL/TLS is already enabled, upgrades can introduce a silent and often overlooked risk—one that can leave Essbase running without SSL post‑patch unless explicit controls are in place.
This post documents a real‑world issue encountered during Essbase upgrades and shares Oracle Support–validated guidance to help teams avoid SSL regression during patching.
Why This Matters
In enterprise environments, SSL is not optional. It is a baseline security control governed by internal standards, audit requirements, and compliance frameworks. Losing SSL during an upgrade—even temporarily—can create:
- Security exposure
- Unexpected service disruptions
- Audit findings tied to change management or configuration control
- Emergency remediation work after go‑live
The challenge is that Essbase SSL is not automatically preserved during certain EPM upgrade and patching scenarios.
The Documentation Gap
During recent upgrade activities, gaps were identified in Oracle’s published SSL/TLS documentation for Essbase On‑Prem:
Specifically, the document was missing critical implementation details related to how SSL/TLS configuration behaves during patching. These gaps were escalated to Oracle Support.
Oracle has since updated the document, with corrections reflected on Page 63. While this update improves clarity, it does not fully address all operational realities encountered during upgrades—particularly around configuration preservation.
Upgrading Essbase On‑Prem environments within EPM 11.2.x is generally considered a routine activity. However, if SSL/TLS is already enabled, upgrades can introduce a silent and often overlooked risk—one that can leave Essbase running without SSL post‑patch unless explicit controls are in place.
This post documents a real‑world issue encountered during Essbase upgrades and shares Oracle Support–validated guidance to help teams avoid SSL regression during patching.
The Upgrade Scenario to Watch
The issue most commonly appears under the following conditions:
- Essbase On‑Prem upgraded as part of an EPM lifecycle event
- Upgrade path from 11.2.15 to 11.2.16 or later
- SSL/TLS already enabled prior to the upgrade
In this scenario, SSL configuration can be overwritten without warning during patching.
What Oracle Support Confirmed
Through direct engagement with Oracle Support, several important behaviors were confirmed—some of which are not yet fully documented for customers.
1. EPM Installer Can Overwrite TLS Configuration
The EPM installer applies Essbase patches as part of the upgrade process. During this step, it can overwrite TLS configuration files, including:
tls_tools.properties
There is no built‑in safeguard to preserve prior SSL settings.
2. TLS Backups Are Required—but Undocumented
Oracle Support explicitly recommends backing up all TLS‑related configuration files before applying:
- Any EPM patch set
- Any Essbase patch or upgrade
This requirement is not called out in standard Oracle documentation, making it easy for teams to miss unless they encounter the issue firsthand.
3. Key File Overwritten During Patching
Oracle Support identified that the following file is overwritten during patching:
<Middleware_Home>/Oracle/Middleware/essbase/bin/tls_tools.properties
This file contains core SSL/TLS configuration parameters. If overwritten, Essbase SSL may no longer function.
4. Patching Can Remove SSL Enablement
Oracle Support acknowledged that upgrades (for example, 11.2.15 → 11.2.23) can:
- Reset TLS configuration
- Disable Essbase SSL
- Require manual SSL reconfiguration post‑patch
In many cases, this is only discovered after services are restarted or clients fail to connect securely.
What Teams Should Do Differently
Based on Oracle Support guidance and field experience, SSL must be treated as a controlled configuration item, not an assumed default.
Before Any Upgrade or Patch
- Back up all TLS and SSL‑related configuration files
- Explicitly include
tls_tools.propertiesin backups - Capture backup evidence as part of change records
After the Upgrade
- Validate SSL/TLS immediately:
- Essbase services start cleanly
- SSL endpoints are active
- Client connections over SSL succeed
- Re‑apply SSL configuration if any overwrite is detected
- Document validation results and remediation actions
Post‑Upgrade SSL Validation Checklist (Essbase On‑Prem)
The following validation steps should be executed immediately after any Essbase or EPM upgrade or patch where SSL/TLS is enabled. Completion of this checklist should be treated as a mandatory control prior to declaring upgrade completion or production readiness.
| # | Validation Area | Validation Activity | Expected Outcome | Evidence to Capture | Owner |
|---|---|---|---|---|---|
| 1 | Essbase Service Status | Start Essbase services after upgrade | Services start successfully without SSL or TLS errors | Service startup logs, console output | Essbase Admin |
| 2 | TLS Configuration File Integrity | Verify tls_tools.properties exists and retains expected configuration | File present and configuration values unchanged or correctly restored | File checksum or diff comparison | Essbase Admin |
| 3 | SSL Port Availability | Confirm Essbase SSL ports are listening | SSL ports active and reachable | Netstat output or port scan | Infrastructure / Middleware |
| 4 | Certificate Presence | Validate SSL certificates are present and readable by Essbase | Certificates load without errors | Certificate store screenshots or logs | Security / Middleware |
| 5 | Essbase Secure Endpoint | Access Essbase using SSL (HTTPS / secure client) | Secure connection established | Browser or client connection screenshot | Application Support |
| 6 | Client Connectivity | Test Smart View / MaxL / client tools over SSL | Clients connect successfully over SSL | Connection logs or screenshots | Application Support |
| 7 | Log Review | Review Essbase and EPM logs for TLS/SSL warnings or errors | No SSL‑related errors detected | Log excerpts | Essbase Admin |
| 8 | Configuration Drift Check | Compare pre‑upgrade and post‑upgrade TLS configuration | No unintended configuration changes | Config comparison report | Technical Lead |
| 9 | Remediation (If Required) | Re‑apply SSL configuration if overwrite is detected | SSL restored and validated | Change log and validation evidence | Essbase Admin |
| 10 | Formal Sign‑Off | Confirm SSL validation is complete and accepted | Upgrade approved with SSL validated | Sign‑off email or change record | Stakeholders |
Key Reminder
Essbase SSL/TLS configuration is not guaranteed to persist through EPM patching. Treat SSL validation as a first‑class upgrade deliverable, not a post‑incident activity.


No responses yet