K2 blackpearl Product Documentation: Installation and Configuration Guide
Additional Notes

Unattended Installer - Additional Notes

All command line parameters are case insensitive. For example, both of these will work identically:

All command line parameters can use either “/” or “-“ to indicate a switch. For example, both of these will work identically:

If the names of files contain spaces, then the user must enclose them in quotes. For example: setup.exe /output:"My Output File.xml"

If the user does not specify a path (but rather just the filename), it is assumed that the file will be created in the same directory as 'setup.exe' - this applies to all parameters that accept a filename. Alternatively, any ‘filename’ parameter will also function if the user has specified a path. 

The Setup Manager will verify that the path is valid and immediately raise an error (to the console) if it is incorrect.

K2 Pass Through Authentication

K2 Pass-Through Authentication is only available for K2 Server when installed in a distributed configuration

K2 Pass-Through Authentication can be configured using the unattended installer however, the default behavior of the unattended installer differs from the normal installer. By default the XML file will generate with the K2 Pass-Through Panel set to Kerberos, but this setting differs from the Installer which is set to Windows. This setting has been enabled as a precaution to ensure that for existing environments where Kerberos has been configured, these environments are not affected negatively by the introduction of K2 Pass-Through Authentication.

To correct this, the XML file must be regenerated with the following :

 

 


K2 blackpearl Product Documentation: Installation and Configuration Guide 4.6.10