Contents
- What Is the Oracle LMS Collection Tool?
- How the Tool Analyses Middleware
- WebLogic: What LMS Collects and What Oracle Looks For
- SOA Suite and Oracle Service Bus
- Middleware Edition Compliance Traps
- Processor Counting for Middleware
- What to Do Before Running LMS Scripts
- Managing the Audit Process
- Building a Long-Term Middleware Compliance Position
What Is the Oracle LMS Collection Tool?
Oracle's License Management Services (LMS) Collection Tool is a suite of scripts — primarily shell scripts for Unix/Linux environments and batch scripts for Windows — that Oracle provides to customers during licence compliance audits. The tool is Oracle's primary mechanism for gathering evidence of Oracle software deployments, configurations, and feature usage across a customer's estate. Once run on your servers, it produces output files that Oracle's LMS analysts use to identify licence requirements, calculate compliance positions, and, where shortfalls exist, build the financial basis for an audit claim.
The collection tool is not a single script. It is a modular package containing separate scripts for different Oracle product families: database scripts, Fusion Middleware scripts, Java scripts, and others. For middleware-specific audits, Oracle will provide or direct customers to the Fusion Middleware module, which contains subscripts targeting specific products including WebLogic Server, SOA Suite, Oracle Service Bus, Business Process Management, Identity Governance, and others. Each product subscript collects the data most relevant to its licence structure and compliance risk profile.
Oracle included a data masking function in the LMS Collection Tool that uses SHA-256 hashing to mask sensitive information such as IP addresses and usernames in the output files. This is intended to reduce customer objections to running the scripts in production environments. However, the masking does not affect the substantive licensing data collected: product versions, edition configurations, deployed components, cluster topology, and processor counts all remain fully visible in the output.
Critical advisory: Never run Oracle LMS scripts on your production middleware estate before completing an internal licence position review. The scripts are comprehensive and will reveal every compliance gap that exists. Running them without prior review removes your ability to remediate proactively before Oracle sees the data.
How the Tool Analyses Middleware
The Fusion Middleware Module
The Fusion Middleware (FMW) module of the LMS Collection Tool is designed to gather comprehensive data about Oracle middleware deployments — mirroring the database module's depth of coverage for database licensing. The middleware module contains product-specific subscripts that must be run with administrative privileges on each server where Oracle middleware is installed.
Typically, the middleware module works as follows: a master script is executed on the target server, which in turn calls product-specific subscripts for installed Oracle middleware components. The master script identifies which Oracle middleware products are present on the server and executes the relevant subscripts automatically. Output files are generated in a designated directory and are then collected and returned to Oracle for analysis.
The tool is designed to be run across all servers where Oracle middleware is installed — not just selected servers. Oracle's audit request will typically specify that scripts must be run on "all servers where Oracle software is installed," and LMS analysts are experienced at identifying when output represents only a subset of an estate. Partial script runs that exclude servers where compliance gaps exist rarely produce a better outcome: Oracle will typically request a complete re-run if it suspects incomplete coverage.
What the Middleware Module Captures
Across middleware products, the LMS Collection Tool captures a consistent set of data categories that together allow Oracle's LMS analysts to reconstruct the full licence requirement for each product:
- Product identity: Product name, version, patch level, and installation path — confirming which Oracle products are present and at what version
- Edition and feature configuration: Which edition of the product is installed and which features are enabled — this is the primary source of edition mismatch compliance findings
- Deployment topology: Server names, domain configuration, cluster membership, and managed server lists — revealing the architecture Oracle uses to calculate the licence scope
- Hardware inventory: Physical CPU count, socket count, and core count per host — the basis for processor licence calculations
- Deployed applications and services: What has been deployed on top of the middleware infrastructure — used to identify licensed products that may be installed within another product's domain
WebLogic: What LMS Collects and What Oracle Looks For
WebLogic Domain and Cluster Detection
For Oracle WebLogic Server — the most widely deployed Oracle middleware product — the LMS scripts examine the WebLogic domain configuration files and runtime environment. The scripts identify every domain, admin server, and managed server in the WebLogic installation, and critically, they identify whether managed servers are organised into clusters.
A typical LMS script output for a WebLogic deployment might reveal output along the following lines:
Domain: retail-prod-domain
Admin Server: AdminServer [RUNNING]
Managed Servers: ms1 [RUNNING], ms2 [RUNNING], ms3 [RUNNING]
Cluster: retail-cluster [ms1, ms2, ms3]
Edition: Standard Edition
This output contains the most critical data point in the entire WebLogic audit: the cluster configuration. The presence of a cluster combined with a Standard Edition designation is Oracle's primary finding in the majority of WebLogic compliance engagements. Standard Edition WebLogic does not support clustering. Any clustered WebLogic environment is, by Oracle's licensing rules, an Enterprise Edition deployment — regardless of what edition label appears in the installation.
The WebLogic Edition Hierarchy
Oracle WebLogic Server is sold in four editions, each with a distinct feature set and compliance profile:
WebLogic Basic is a limited version bundled with specific Oracle products — Oracle Internet Application Server, Forms and Reports, and Oracle Business Intelligence. It provides an embedded application server for those products only. WebLogic Basic is not a general-purpose application server licence and cannot be used to deploy custom applications independently.
WebLogic Standard Edition provides core Java EE application server capabilities for small to medium deployments. It does not support clustering, active-active high availability, or active GridLink connections to Oracle RAC. Standard Edition is appropriate only for single-managed-server deployments where high availability is provided by other means outside the WebLogic cluster layer.
WebLogic Enterprise Edition adds clustering, active-active high availability, WebLogic Active GridLink for Oracle RAC, and several additional management capabilities. Enterprise Edition is the minimum required for any deployment using WebLogic clustering — which includes the majority of production enterprise deployments where availability requirements are taken seriously.
WebLogic Suite is the most comprehensive and expensive edition, including all Enterprise Edition features plus additional Oracle Coherence in-memory grid capabilities and other components. Suite licensing is most common in deployments where Oracle Coherence is deployed as an integrated component.
Concerned about your WebLogic middleware compliance position?
Redress Compliance provides independent Oracle middleware licence reviews and audit defence support.What WebLogic LMS Output Reveals to Oracle
Oracle's LMS analysts reviewing WebLogic script output follow a consistent analytical process. They first confirm the product version and identify the edition configuration. They then map the domain topology — how many admin servers, how many managed servers, and critically, whether those managed servers form clusters. They cross-reference the edition with the features in use: if clustering is present with Standard Edition, an Enterprise Edition shortfall is identified for every processor across every host in the cluster.
Analysts also examine the deployed applications. A domain containing a service named soa-infra indicates that Oracle SOA Suite is deployed on top of WebLogic. The presence of OracleServiceBus, bam, or oim deployments indicates Oracle Service Bus, BAM, or Oracle Identity Manager respectively — all separately licensed products. Every such deployment discovered in the WebLogic output generates an additional line item in Oracle's compliance analysis.
SOA Suite and Oracle Service Bus
SOA Suite LMS Data Collection
Oracle SOA Suite is a separately licensed product deployed on top of WebLogic Server. The LMS middleware scripts examine the SOA Suite configuration by querying the running SOA infrastructure, identifying deployed composite applications, service components, and business processes. The scripts determine whether SOA Suite is installed and configured, the version deployed, and the scope of the SOA infrastructure across the WebLogic domain.
Oracle SOA Suite is processor-licensed on the same basis as WebLogic Server: every physical CPU core on every server where SOA Suite is installed and running must be licensed. In clustered environments — which represent the majority of production SOA Suite deployments — this means all processors across all cluster nodes must be counted, including any nodes running a passive standby role for high-availability purposes.
Oracle Service Bus and BPM
Oracle Service Bus (OSB) and Oracle Business Process Management Suite are frequently co-deployed with SOA Suite in enterprise integration architectures. Both are separately licensed Oracle middleware products. LMS scripts identify OSB and BPM deployments through the presence of specific application artifacts in the WebLogic domain: the OracleServiceBus deployment indicates OSB; the BPM engine components indicate Oracle BPM Suite.
A common compliance finding in middleware audits involves organisations that deployed SOA Suite on a multi-product WebLogic domain where OSB or BPM were also installed as part of a default installation, without recognising that each component is a separately licensed product requiring its own processor licence count. The LMS output makes these co-deployments immediately visible to Oracle's analysts.
Oracle Identity Governance and Other Middleware Products
Oracle's middleware portfolio extends beyond integration products to include Oracle Identity Governance (OIG), Oracle Access Management (OAM), Oracle Unified Directory, Oracle HTTP Server, and others. Each of these products has its own licence metric and is detected by specific subscripts within the LMS middleware module. Organisations that deployed these products as part of a broader Oracle middleware platform — often as part of a historical ULA deployment — may not have fully accounted for their licence requirements on a per-product, per-processor basis outside the ULA context.
Middleware Edition Compliance Traps
The Standard Edition Clustering Trap
The most common and costly Oracle WebLogic compliance finding involves Standard Edition clustering. This trap occurs in two scenarios. In the first, an organisation deliberately deployed WebLogic Standard Edition on a clustered architecture to reduce licence costs, not realising — or not prioritising — that clustering requires Enterprise Edition. In the second, more common scenario, a clustered WebLogic environment was deployed years earlier when the organisation held a ULA that covered WebLogic Enterprise Edition. When the ULA expired and the organisation certified its entitlements, it certified Standard Edition because the procurement or IT team did not recognise that the clustered deployment required Enterprise Edition. Both scenarios produce the same audit finding: Enterprise Edition shortfalls across every processor in the cluster.
Passive Node Counting
Oracle requires that all nodes in a WebLogic cluster be licensed — including passive standby nodes that are powered on but not actively serving requests. This requirement is frequently misunderstood by organisations that believe passive nodes do not require licences. The LMS scripts identify all managed servers in a domain regardless of their runtime state, and Oracle's licence obligation attaches to nodes that are installed and capable of running, not only those actively processing traffic at the moment of the audit.
Option and Pack Compliance
Several Oracle WebLogic Suite components require specific higher-tier licence entitlements even when they are not deliberately deployed. A WebLogic domain that has Oracle Coherence data grid functionality enabled — even if Coherence was installed as part of a standard WebLogic Suite installation and is not actively used — is generating a Coherence licence requirement that must be satisfied. The LMS scripts identify Coherence configuration artifacts and treat them as evidence of Coherence deployment, regardless of active usage patterns.
Processor Counting for Oracle Middleware
The Core Factor Rule
Oracle middleware products are licensed on a processor basis using the same core factor table that applies to Oracle Database. Each physical CPU socket is assessed a core factor based on the processor architecture: Intel x86 processors attract a core factor of 0.5 per physical core, while SPARC and other processor types use different factors. The LMS scripts collect the raw hardware data — socket count, cores per socket, total core count — and Oracle's analysts apply the core factor to produce the licence requirement.
For an Intel x86 server with two physical sockets and 16 cores per socket, the LMS output would show 32 physical cores, and Oracle would apply a 0.5 factor to arrive at a requirement of 16 processor licences per Oracle product installed on that server. For a three-node WebLogic Enterprise Edition cluster on such servers, the Enterprise Edition requirement would be 48 processor licences — considerably more than most organisations anticipate when they consider only their active processing capacity.
Virtual Environments and VMware
Oracle does not recognise VMware as a hard partition for middleware licensing purposes, consistent with its position on database licensing. This means that for Oracle WebLogic and other middleware products deployed in VMware environments, the licence obligation covers every physical CPU core in the VMware cluster where the Oracle middleware can potentially run — not just the cores allocated to the virtual machines where it is currently running.
The LMS scripts collect hardware data from the physical host when run in a virtualised environment. In a VMware deployment, this will show the full physical core count of the host. Oracle's analysts then apply the licence calculation to the physical core count, regardless of the VM size. Organisations that planned their WebLogic licence requirements based on vCPU allocations rather than physical host core counts typically discover a material licence shortfall when the physical hardware data is collected.
Oracle Approved Partitioning
Oracle recognises a small number of hard partitioning technologies that allow licence calculations to be limited to the resources actually allocated to Oracle software. These include Oracle VM Server for SPARC (Logical Domains), Oracle VM Server for x86 with "CPU pinning" for hard partitioning, IBM LPAR (when properly configured), and Oracle Solaris Zones (in hard partition configuration). For organisations running Oracle middleware on Oracle VM, legitimate hard partitioning may allow the licence calculation to be limited to allocated OCPUs rather than physical host CPUs — but the configuration must be precisely established and provable from the LMS script output.
What to Do Before Running LMS Scripts
Conduct an Internal Middleware Discovery
Before any Oracle LMS script is run on your middleware estate — whether in response to an Oracle audit request or as a proactive self-audit — a complete internal middleware discovery should be conducted. This discovery should cover every server in your data centre, cloud environment, and development infrastructure that runs Oracle middleware. The goal is to identify every Oracle middleware installation, its edition, its configuration, and the hardware it runs on, before Oracle's scripts collect the same data.
The internal discovery should document: product name and version, edition, whether clustering is configured, the cluster topology and node count, the hardware specification (CPU sockets and cores per socket), and whether any additional Oracle middleware products are co-deployed in the same domain. This documentation forms the basis for the compliance review that must precede any data sharing with Oracle.
Review the Licence Entitlement Position
Once the middleware estate is fully documented, the entitlement position must be assessed: what Oracle middleware licences does the organisation hold, at what edition, and what processor count? This review requires access to current Oracle licence agreements, order documents, and any ULA or PULA certification records that established the perpetual entitlement baseline. The compliance position — the difference between the entitlement held and the deployment discovered — should be assessed before Oracle's scripts are run, so that the organisation can respond to the audit from a position of knowledge.
Remediate Where Possible Before the Audit Starts
Where the internal review identifies genuine compliance gaps — clustered deployments on Standard Edition licences, co-deployed products that are not licensed, or processor counts that exceed entitlements — organisations should consider proactive remediation before engaging with Oracle. Options include: decommissioning unused middleware deployments that create a licence obligation, restructuring cluster topology to eliminate clustering where Standard Edition coverage is intended, or initiating a proactive purchase to close identified gaps before Oracle's audit findings formalise the position.
Engagement outcome: A German automotive supplier running WebLogic Standard Edition in a clustered configuration received an Oracle LMS audit request. Redress Compliance reviewed the LMS script output before it was returned to Oracle and identified that Oracle’s claim of €1.4M in WebLogic Enterprise Edition back-fees was based on a cluster configuration created for testing only — never used in production. After documented evidence was provided, Oracle accepted a prospective Enterprise Edition licence for 3 processors at €180,000. Total saving: €1.22M.
Proactive remediation before an Oracle audit is almost always less expensive than resolving the same compliance gap through an audit settlement. Oracle's standard audit settlement process calculates backdated fees at full list price for the period of non-compliance, which can extend several years. Proactive remediation eliminates the backdated element and allows the organisation to negotiate the remedial purchase on commercial terms rather than under audit pressure.
Managing the Audit Process
Respond Strategically to the Audit Notice
When an Oracle audit notice arrives, the immediate response should be to acknowledge receipt, seek clarification of scope and timelines, and route the notice to the Oracle governance committee and external legal counsel. Do not agree to run LMS scripts before the internal review is complete. Oracle's standard request includes a 45-day notice period, and it is reasonable to use that time to prepare — organisations are entitled to run the scripts on their own schedule within the contractual notice window, and taking the full available time for internal preparation is a legitimate and advisable approach.
Scope Control
Oracle audit requests frequently specify very broad scope: "all servers where Oracle software is installed." In practice, many organisations negotiate a more targeted scope, particularly when they can demonstrate that certain environments (development, test, legacy decommissioned systems) were excluded from the production deployment that the audit is intended to address. Scope control conversations with Oracle should be conducted through legal counsel and documented in writing — verbal scope agreements are insufficient and will not be honoured if Oracle's analysts subsequently identify deployments outside the agreed scope.
Review the Script Output Before Returning It to Oracle
Once LMS scripts have been run, the output should be reviewed by the organisation's internal team and external advisors before it is returned to Oracle. The review should confirm that the output accurately represents the deployment, identify any anomalies or errors in the data collection, and assess what compliance findings the output is likely to generate. In some cases, technical inaccuracies in the script output can be corrected by providing supplementary documentation. Understanding what Oracle will see before they see it allows the organisation to prepare its response positions in advance.
Building a Long-Term Middleware Compliance Position
Maintain a Current Middleware Entitlement Register
The most effective defence against Oracle middleware compliance risk is a continuously maintained entitlement register that tracks every Oracle middleware licence held, its edition, metric, and the specific servers and environments where those licences are deployed. The register should be updated whenever new Oracle middleware is deployed, an existing deployment is decommissioned, or infrastructure changes affect the processor count associated with licensed software.
Establish Infrastructure Change Controls
Oracle middleware compliance failures most commonly originate not in deliberate decisions to under-licence, but in infrastructure changes made without awareness of their Oracle licensing implications. A WebLogic Standard Edition deployment becomes an Enterprise Edition compliance violation the moment a second managed server is added to a cluster. A VMware cluster expansion that adds additional physical hosts to a cluster where Oracle middleware runs creates an immediate licence obligation for the new CPUs. Infrastructure change controls that include an Oracle licence compliance check for any change affecting Oracle middleware environments prevent this category of accidental non-compliance.
Run Annual Internal Middleware Audits
Organisations with significant Oracle middleware deployments should conduct an internal self-audit of their middleware licence position at least annually. The self-audit should use the same data collection approach that Oracle would use — running equivalent discovery against the middleware estate and comparing the result to the entitlement register. Discrepancies identified in the self-audit can be remediated proactively rather than discovered under audit pressure.
For organisations that lack internal Oracle middleware licensing expertise, engaging an independent adviser such as Redress Compliance to conduct the self-audit provides both the technical rigour needed to identify all compliance risks and the legal privilege protection that keeps the findings from becoming discoverable in a subsequent Oracle audit engagement.
To discuss Oracle middleware licence compliance, LMS audit preparedness, or proactive self-audit support, contact Redress Compliance. Our advisors have direct experience from within Oracle's LMS organisation and have supported hundreds of Oracle middleware audit engagements globally.
Oracle Middleware Compliance Intelligence — Free Newsletter
Practical guidance on Oracle middleware licensing, LMS audit tactics, and compliance risk management from advisors with direct Oracle LMS experience.