If the user believes that access to the device was blocked or an operation with the contents of the device was prohibited by mistake, the user can request temporary access to the blocked device from the administrator of the local network of the organization using the following Device Control managementcommand: kesl-control --request-temporary-device-access.
To request temporary access to a blocked device, run the following command:
kesl-control --request-temporary-device-access --device-id <device ID> --access-duration <access duration> --path <path to access request file>
where:
--device-id <device ID> specifies the ID of the blocked device to which you want to gain access.
--access-duration <access duration> specifies the time period during which you want to be able to gain access to the device (in hours). Possible values: 1 to 100.
--path <path to the access request file> specifies the path to the directory in which you want to save the access request file with the .akey extension.
This command creates an access request file, which must be sent to the administrator, for example, by email or in any other way (the administrator can describe the preferred method in the template of the blocking message).
After receiving an access key from the administrator, you need to upload the access key to gain temporary access to the device using the kesl-control --upload-temporary-device-access-key command.
To gain temporary access to a blocked device, run the following command:
kesl-control --upload-temporary-device-access-key --path <path to the file with the access key>
where:
--path <path to the file with the access key> is the path to the file containing the access key to the device (file with the .acode extension).
This command outputs information about the granted access to the device and the access duration.
Page top