Sun Java Desktop System Configuration Manager, Release 1 - Installation Guide

Chapter5 Desktop Components - Linux

To access the configuration data from the Configuration Manager, a desktop client requires the Sun JavaTM Desktop System Configuration Agent. The Configuration Agent communicates with the remote configuration data repository and the adapters as well as integrates data into specific configuration systems. The configuration systems that are currently supported are GConf, Mozilla Preferences, and StarOffice Registry.

All of these components are shipped and installed as part of the Java Desktop System.

Data Access/User Authentication

The Configuration Agent retrieves information from the LDAP server based on the login ID of a desktop user. The User/UniqueIdAttribute setting of the organizational mapping file maps the login ID to a user entity in the LDAP server. The Configuration Agent also retrieves information about the host, such as the name or the IP address of the host. This information is mapped to a host entity in the LDAP server through the Host/UniqueIdAttribute setting of the organizational mapping file.

There are two methods to access the LDAP server, namely anonymously or with GSSAPI. For anonymous access, no action is required on the desktop. For the GSSAPI method, Kerberos credentials must be acquired on the desktop. To integrate Kerberos credential acquisition with the user login, the pam_krb5() module must be installed and configured on the Java Desktop System host. You can find example configurations for the pam() module in the /usr/share/doc/packages/pam_krb5/README.SuSE directory on the Java Desktop System CD. You can also use gdm to integrate Kerberos with the user login, for example, by using the following /etc/pam.d/gdm file:


#%PAM-1.0
auth   required    pam_unix2.so  nullok #set_secrpc
auth   optional  pam_krb5.so use_first_pass missing_keytab_ok ccache=SAFE putenv_direct
account required    pam_unix2.so 
password required    pam_unix2.so  #strict=false
session required    pam_unix2.so  # trace or none
session required    pam_devperm.so 
session optional    pam_console.so 

Configuration Agent

The Configuration Agent is part of the apoc package. When you install the corresponding RPM, the files that are required for this API are installed and registered with inetd. You can install the RPM manually or through the Java Desktop System installation.

Bootstrap Information

To access the remote configuration data, the Configuration Agent must be provided with the location of the LDAP server. You can add this location through the YaST2 configuration tool, autoYaST, or by manually editing the policymgr.properties properties file in the /opt/apoc/lib directory. In YaST2, you can add this data in the Network/Advanced section.

Figure 51 Java Desktop System Configuration Agent in YaST

Java Desktop System Configuration Agent in YaST

The following information is required to run the Configuration Agent:


Note

Associated property file keys are indicated in parentheses, where appropriate.



Note

Whenever you change the bootstrap and operational settings, the Configuration Agent must be restarted.


To restart the Configuration Agent on the Desktop, ensure that none of the related client applications are running, log in as root, and type the command /opt/apoc/bin/apocd restart.

Operational Settings

You can configure the operational settings of the Configuration Agent locally or remotely. To configure the settings locally, edit the apocd.properties file in the /opt/apoc/lib directory. To configure the settings remotely, use the Configuration Agent policy in the Configuration Manager. The following settings can be configured in the properties file:

The DaemonPort setting can only be modified locally and requires a restart of the agent for the changes to take effect. All other settings take effect at the next change detection cycle for the agent configuration. The logging level that is specified in LogLevel must be a value that is consistent with the Java Logger levels. In order of decreasing severity, these levels are: SEVERE, WARNING, INFO, CONFIG, FINE, FINER and FINEST.

Propagating Configuration Data Changes

You can use the ChangeDetectionInterval setting that is described in Operational Settings to tune the propagation of remote configuration data changes to client side applications. The value that you provide for this setting is the maximum length of time in minutes that elapses before changes that are made remotely are reflected in the client applications. Smaller values for the ChangeDetectionInterval result in increased Configuration Agent and LDAP server activity. As a result, use caution when you adjust the value of the setting. For example, in an initial deployment phase, you can set this value to one minute so that you can easily test the impact of remote configuration on client applications. After you complete the testing, return this setting to the initial value.

Configuration Agent Port Information

The Configuration Agent uses two ports:

Changing the daemon port:

To change the daemon port, you must modify the DaemonPort property in the daemon's apocd.properties file and the apocd entries in /etc/services and /etc/inetd.conf. Afterward, restart the daemon and reload inetd.

Changing the daemon admin port:

To change the daemon admin port, you must modify the DaemonAdminPort property in the daemon's apocd.properties file. Afterward, restart the daemon.

GConf Adapter

The GConf adapter is part of the apoc-adapter-gconf package. When you install the adapter from the corresponding RPM, the GConf data sources path in /etc/gconf/2/path is updated to include the Configuration Manager sources. A backup of the old path is stored in /etc/gconf/2/path.apocBackup. If the old path refers to custom data sources, you will need to update the path by merging the changes from the default path to the newly installed Manager path. The two data sources that are provided by the adapter are:

Mozilla Adapter

The Mozilla adapter is part of the mozilla-apoc-integration package. When you install the adapter from the corresponding RPM, the required files are added to an existing installation of Mozilla and are automatically registered.

StarOffice Adapter

The StarOffice adapter is included in a standard StarOffice installation and allows you to access the policy configuration data without any special modifications.