The Sun Java System Connector Setup Wizard is designed to be straightforward for end users to run by themselves. The Setup Wizard can be placed on a file server, so it need not be individually installed on end-user workstations. However, the physical installation of the Java System Connector software on user desktops requires access privileges that often are disallowed to many or most end users. If any of your end users do not have installation privileges for their own desktops, you may choose either of the following strategies:
Visit each user's workstation and use your own administrator privileges to physically install the software to the user's desktop.
Use a configuration management tool, such as Microsoft's SMS, to “push” the software to multiple users' desktops (explained below in Automated “Push” via SMS or Other Configuration Management Tools).
After the software has been physically copied to a user's desktop, the user can run the Setup Wizard to configure the software and convert existing Personal Folders (.pst) files.
End users who run the conversion program will provide their own credentials for the Sun Java System servers. This method therefore permits conversion of password-protected .pst files (see Password-Protected Personal Stores in Outlook below), and lets users specify which of their personal stores should be converted for use with the new Sun Java System Connector software. (Users can read unconverted email messages, but cannot reply to them because unconverted addresses are unfamiliar to the new server. Users who have some personal stores that are very old, so that the need for a future reply is highly unlikely, may therefore opt to leave such files unconverted. The conversions can run in the background, freeing the user's computer for other work, but the process is likely to slow the performance of other applications.)
The significant downsides of interactive user installation are:
Increased demand for support from your organization's help desk, which may be considerable depending on your users' technical skills and the complexity of your “before” and “after” network configurations.
Time and effort you, as an administrator, would have to devote to visiting multiple user workstations to physically copy the software to the users' desktops (for users who are not authorized to perform that task for themselves).