![]() |
![]() ![]() |
![]() |
![]() ![]() |
![]() |
![]() ![]() |
![]() |
Pre-installation considerationsFor a list of Portal patches that are obsoleted by this patch, and any patches you must install prior to installing this patch, refer to the included patch README. This patch is not a standalone installation and does not include Portal Server 6.3. Portal Server 6.3 must be installed prior to patch installation. It is important that this patch, as with any other, be tested thoroughly on a staging or pre-deployment system prior to being put in to production. Additionally, special attention should be given to JSP files you may have customised that must be modified by the patch installer in order to fix defects, and/or for the product to continue functioning normally. If the system on which the patch is to be installed is being upgraded from Java Enterprise System Portal Server 6 2004Q2 to Java Enterprise System Portal Server 6 2005Q1, the patch should be installed before running the upgrade scripts, upgradePS04Q205Q1 and upgradeSRA-04Q2-05Q1. Installation instructionsIf the Portal Server installation contains more than one node including any mixture of platform nodes, Portal proxy nodes, and gateway nodes, then this patch should be applied on the platform nodes first, followed by all remaining nodes. Running different release levels on different nodes is not supported. Each node must be upgraded to the same revision.
Additional post-install steps for non-root installsA small number of files in this patch are new since the original product release. Because there are no existing files on which the patchadd command can base the owner and group of these files, they must be added with owner and group of root and sys respectively. If the system on which this patch has been installed is running as a non-root user, it may be necessary to manually change the ownership of these files after the patch has been installed so that they match the rest of the environment. As of the current patch revision, the complete list of files added across all revisions of the patch is: /etc/opt/SUNWps/desktop/default/tld/wireless_ab.tld /etc/opt/SUNWps/desktop/default/tld/wireless_cal.tld /etc/opt/SUNWps/desktop/default/tld/wireless_socs.tld /etc/opt/SUNWps/desktop/default/tld/wireless_mail.tld NB. It may be necessary to change the ownership of these files back to root:sys prior to installing a future revision of the patch in order to avoid attribute verification errors. This is an unfortunate and unavoidable consequence of the limited support for non-root installs in the patchadd command. Patch backout support on the Linux platformIn order to provide an equivalent level of backout on the Linux platform as that available on the Solaris platform, the upgrade script uses the --repackage option to the rpm command. This creates backup rpm files of the installed Portal software at that point, including any customisations that have been made. The remove script can be used to rollback if the patch needs to be backed out. However, due to an unavoidable rpm bug, this backout functionality does not function correctly if the Portal Server was installed in a location other than the default. Under these circumstances it is necessary to restore the original rpm files before running the remove script, and then recover any overwritten customisations manually. The repackage process stores the rollback rpm files in the /var/spool/backup/118950-15 directory, which will be created if necessary. You should avoid deleting this directory, even if you are forced to remove the patch. Template modificationsEvery attempt is made by the patch installer to both preserve customized template information. However, since the contents of the files cannot be accurately predetermined, any modified template files are backed up in the same directory as their updated counterparts with the patch name postfixed to the template name. For example, when a patch is installed on the Solaris platform: Check the patch README.118950-15 file for the full list of files modified by this patch. Tips for customizing templatesBecause the Portal Server itself is so customizable, you should follow some precautions to ensure that any customizations made to the Portal Server are preserved after a product upgrade. First, set up a customized template directory if you have not already done so. While this directory could be an entire subset of the default template directory, it is advisable to only copy over those template files that you will be customizing. This particular scheme would then use the default directory as a 'base' for all templates and would help insure that customized templates are not accidentally overwritten when the default templates are modified. NOTE: Files in the default template directory should never be customized. To create a customized template directory:
As a general rule of thumb, avoid modifying templates that have only a functional purpose rather than a look and feel purpose. One example of a template that should not need modifications is the NetletProvider/display.template. This template contains only JavaScript necessary for the launching of the Netlet. The contents of the Netlet Pop-up window should instead be customized by modifying the associated .properties file. The reason for this is that there could be a functional change in the product that would overwrite a customization done specifically to that particular template file. This example also exhibits why it is important to only keep customized files in the customized template directory. Required fixes for Access Manager tuningThe perftune now uses the amtune script supplied with Access Manager. However, for this to function correctly on Solaris, an Access Manager patch is required. The patchids are 119259-01 (sparc) and 119260-01 (x86). Alternatively, the following changes can be applied manually.
Required branding correctionsA small number of updates to the Portal Server branding are missing from Java Enterprise System Portal Server 6 2005Q1. Should you wish to apply those updates manually to avoid confusion, you can do so as follows.
Re-registering the Proxylet Service in the Access Manager consoleAfter a system is upgraded from Java Enterprise System Portal Server 6 2004Q2 to Java Enterprise System Portal Server 6 2005Q1, the link to invoke the Proxylet rules will not appear until the Proxylet Service is reregistered as follows:
Changes in the behaviour of the Communication Express Calendar channelThe Launch Calendar link now opens the Communication Express page rather than directly opening the Calendar tab. The user must now manually navigate from the mail tab to the calendar tab. Additional requirements for UWC Address Book Channel proxy authenticationThe fix for Bug Id 6211569 (UWC address book channel does not work with proxy auth) also requires Universal Web Client patch 118540-12 or later. After installing this patch, you will need to perform the following steps:
# /opt/SUWNuwc/sbin/patch-config /opt/SUNWuwc/install/patch/<patchid> Uncomment the following line in <UWC-deploy-path>/WEB-INF/config/uwcauth.properties and add the uid (or list of uids) of the proxy admin: !uwcauth.admins=<list of comma seperated admins> Once both patches are installed, you will need to add additional attributes to the SUN-UWC-ADDRESS-BOOK SSOAdapter template as follows:
Template updates needed for MS Address Book AccessThe fix for Bug Id 6229250 (MS Address Book is not accessible on Portal Desktop) requires the following changes to be made to the SUN-ONE-ADDRESS-BOOK SSO Adapter template:
Configuring Portal Server to Work with a Load Balancer that Performs SSL TerminationSome links on the Portal Server Desktop are generated using the server's port/host/protocol values. If a load balancer sitting in front of the Portal Server has been configured to perform SSL termination, there will be a port/protocol mismatch between LB and Portal Server. Due to which some links created on the desktop will be broken. To resolve this problem, the following properties needs to be added to the desktopconfig.properties file located at /etc/opt/SUNWps/desktop/desktopconfig.properties on a Solaris machine and at /etc/opt/sun/portal/desktop/desktopconfig.properties on Linux.
lbHosts=<list of LB Host> To enable switching of protocol and port depending on the client, its necessary to make the authlessanonymous desktop cache free. To do that, set the refreshTime property as zero for JSPTabContainer in authlessanonymous' desktop. Configuring Portal Server in SSL Mode
Prerequisite: Install web container, AM and PS in SSL mode. Make sure /etc/opt/SUNWps/PSConfig.properties file is present once the installation is complete.
Enabling SSOAdapter Configuration Change Notification
When multiple instances of Portal are to be deployed behind a load balancer, and
it is not possible to configure the load balancer to support sticky sessions, then it
is necessary to enable the notification system for SSOAdapter Configurations.
These steps must be performed on each portal instance. |