ISL AlwaysOn Action

 

General Information

On 24th of October the following was released:

Actions

  • Execute 1.0.0 for Windows (release_date=2014-10-23,revision=36879,platform=win32)

All updates have release date set to 2014-10-23. Your ESS will need to be same or higher to be able to update your server. This release is available to all countries except Japan.

Upgrading to new version

Hosted service users please check Upgrading Hosted Service.

Server license users please check Upgrading Server License.

Improvements

New features

ISL AlwaysOn - Action - Create execute action that is able to execute user actions on remote computer  [ISLALWAYSON-481] More

Description

ISL AlwaysOn has new action available called Execute which enables you to execute executables on remote computer. This action can only be executed on remote computers that have Windows operating system.

Help on the commands can be found by executing execute action without parameters.

Example for executing fciv.exe through web interface (fciv.exe utility computes and verifies cryptographic hash values of files.):

Pre-requirements:

1. Create a folder named trusted inside ISL AlwaysOn install directory

- 32-bit Windows : C:\Program Files\ISL Online\ISL AlwaysOn

- 64-bit Windows : C:\Program Files (x86)\ISL Online\ISL AlwaysOn

Example procedure:

1. Place fciv.exe inside trusted directory of ISL AlwaysOn (C:\Program Files\ISL Online\ISL AlwaysOn\trusted)

2. Login to your account

3. Select Remote access

4. Click more on computer that you want to execute a remote execute

5. Click execute

6. Enter computer password

7. For argument enter: fciv.exe  --arg_e %current_dir%\..\..\trusted\fciv.exe (In this example hash value will be calculated for fciv.exe file )

You can use the following variables for location:

- %current_dir% points to - C:\Program Files\ISL Online\ISL AlwaysOn\actions\execute_1_0_0

- %windir_system_native% points to windows system32 folder - depending on OS architecture

- %ProgramFiles_native% points to program files folder - depending on OS architecture

8. Click Execute

9. In the next step you will see the result of the action taken.

Example for executing fciv.exe using WebAPI2:

Pre-requirements:

1. Create a folder named trusted inside ISL AlwaysOn install directory

- 32-bit Windows : C:\Program Files\ISL Online\ISL AlwaysOn

- 64-bit Windows : C:\Program Files (x86)\ISL Online\ISL AlwaysOn

Example procedure:

1. Place fciv.exe inside trusted directory of ISL AlwaysOn (C:\Program Files\ISL Online\ISL AlwaysOn\trusted)

2. Firstly you will need to login through webapi2 using:

function:  utils/login/1

parameters: {"user":"_ENTER_USERNAME_","pwd":"_ENTER_USER_PASSWORD_"

in this step you will obtain sid

3. Search for the computer you would like to execute on

function: islalwayson/computer/search/1

parameters: {"simple_search":"true","search":"_ENTER_COMPUTER_NAME"}

in this step you will obtain co_id of computer

4. Execute the command

function: islalwayson/actions/start/1

parameters: {"co_id":"_CO_ID_STEP_3_", "name":"execute","arguments":["fciv.exe","--arg_e","%current_dir%\\..\\..\\trusted\\fciv.exe"]}

in this step you will obtain action_id

5. Check the status of the execution

function: islalwayson/actions/info/1

parameters: {"action_id":"_ACTION_ID_STEP_4_", "info":"computers","events":"true"}

in this step you will receive authenticate chmd5 number

6. Authenticate

function: islalwayson/actions/authenticate/1

parameters: {"co_id":"_CO_ID_STEP_3_", "chmd5":"_CHMD5_STEP_5_", "action_id":"_ACTION_ID_STEP4","plain_password":"_YOUR_COMPUTER_ACCESS_PASSWORD"}

in this step you will receive ok response, which means you were correctly authenticated

7. Check the info of the execution again

function: islalwayson/actions/info/1

parameters: {"action_id":"_ACTION_ID_STEP_4_", "info":"computers","events":"true"}

In this step you will receive fid and file

8. Get the result which is stored in file with file id fid

function: islalwayson/file/download/1

parameters: {"fid":"_FID_STEP_7", "type" : "file", "file":"_FILE_STEP_7"}

In this step you will receive download link of the file which you download to check the result of the remote execute action.

Was this article helpful?