Sun Desktop Manager 1.0 Administration Guide

From Configuration Profiles to Application Settings

This section describes how the configuration data is processed to end up with user settings for a specific application running in a specific host.

Configuration Data Sources

Each user application receives configuration data from the following sources:

The application settings for a user on a host are calculated in two steps. The profile configuration tree is constructed, and then the configuration data sources are combined.

Construction of the Profile Configuration Data

The profile configuration data holds the configuration profile for a user application that runs on a specific host.

The organizational units of an organization, along with the users, are stored in the configuration repository hierarchically. The same applies to the domain components.

Configuration profiles are assigned to elements in the hierarchies. Configuration profiles that are assigned to an element are inherited by the children of that element.

The configuration data of an application depends on the user who runs the application and the host where the application runs.

The configuration settings that affect a user depend on the configuration profiles that are assigned to the elements in the path from the user element to the root of the tree. These profiles must be merged together to build the set of configuration settings for the user.

Since it is possible to define profiles based on the host where the application of the user is running, the profiles assigned to the host, or to any of the elements that are in the path from the host to the root of the tree should also be merged together with the configuration profiles that affects the user.

Figure 1–2 Configuration Process

configuration process

The following rules are used to construct the profile configuration:

Configuration Data Source Combination

The configuration data provided by the three different configuration data sources must be combined to produce a single set of settings for the user application to use at runtime.

  1. The configuration data provided by the default configuration provider is read and a configuration tree is constructed.

  2. A profile configuration data is constructed based on the user and host of the client application.

  3. The user settings are read and a configuration tree is constructed.

  4. The three trees are combined into one to get the configuration settings that the application will use. The rules followed in this process are the same that where used to construct the profile configuration data.

The resulting tree will be used by the application adapters to provide the configuration settings.