Chapter 3 Setting Up the Preinstalled Software 3-5
3.2 Java Enterprise System
The Sun Java™ Enterprise System (Java ES), which is preinstalled on your server, is
an integration of previously independent Sun software products into a single
software system.
The Java ES installer is located in the following directory.
/var/spool/stage/JES_05Q1/Solaris-x86/installer
Run this installer before running Java ES.
The components of this system have been tested together to ensure interoperability.
They are compatible with one another and are synchronized on a common set of
shared libraries. The components also share a common installation and upgrade
technology.
The components of Java ES and the infrastructure services they provide are
described as follows:
■ Sun Cluster software provides high availability and scalability services for the
Java ES, the applications that run on top of the Java ES infrastructure, and the
hardware environment in which both are deployed.
■ Sun ONE Application Server provides J2EE™ container services for Enterprise
JavaBeans™ (EJB) components, such as session beans, entity beans, and message-
driven beans. The container provides the infrastructure services needed for
tightly coupled distributed components to interact, making it a platform for the
development and execution of e-commerce applications and web services. The
Application Server also provides web container services.
■ Sun ONE Calendar Server provides calendar and scheduling services to end users
and groups of end users. Calendar Server includes a browser-based client that
interacts with the server.
■ Sun ONE Directory Proxy Server provides security services for Directory Server
from outside a corporate firewall. Directory Proxy Server provides enhanced
directory access control, schema compatibility, routing, and load balancing for
multiple Directory Server instances.
■ Sun ONE Directory Server provides a central repository for storing and managing
intranet and Internet information such as identity profiles (employees, customers,
suppliers, and so forth), user credentials (public key certificates, passwords, and
pin numbers), access privileges, application resource information, and network
resource information.