-D is a prefix indicating that the command belongs to the group of commands to manage Device Control.
kesl-control --get-device-list
This command outputs the list of devices installed on a host or connected to it, or exports a list of connected devices to a JSON file.
Command syntax
kesl-control [-D] --get-device-list [--all] [--json] [--export <file>]
Arguments and keys
--all lists all connected devices.
--json lists connected devices in JSON format.
--export <file> – export the list of connected devices to a file, formatted as a list of trusted devices. You need to specify the full path to the JSON file.
kesl-control --trusted-devices
The command lets you view the list of trusted devices, add and remove devices from the list, and import the list of trusted devices from a file.
Command syntax
kesl-control [-D] --trusted-devices [--list] [--add <ID>] [--delete <ID>] [--merge|--add|--replace --file <file>]
Arguments and keys
--list – display the list of trusted devices.
--add <identifier> – add a device to the list of trusted devices by device ID or device ID mask.
--delete <identifier> – delete a device from the list of trusted devices by device ID or device ID mask.
--merge merges the lists of trusted devices. If the current list and the imported list contain entries for a device with the same ID, the existing entries are updated. For devices that are not in the current list, entries are added.
--add adds the current list of trusted devices when importing. Only entries for devices not previously on the list of devices are added to the list.
--replace replaces the current list of trusted devices. The existing list of trusted devices is replaced with the imported list.
--file <file> – import a list of trusted devices from the specified file. You need to specify the full path to the JSON file.
kesl-control --request-temporary-device-access
This command lets you create an access request file to request temporary access to a blocked device.
Command syntax
kesl-control [-D] --request-temporary-device-access --device-id <device ID> --access-duration <access duration> --path <path to access request file>
Arguments and keys
--device-id <device ID> specifies the ID of the blocked device to which you want to gain access.
--access-duration <access duration> specifies the time period during which you want to be able to gain access to the device (in hours). Possible values: 1 to 100.
--path <path to the access request file> specifies the path to the directory in which you want to save the access request file with the .akey extension.
kesl-control --upload-temporary-device-access-key
This command allows you to upload an access key to gain temporary access to a blocked device.
Command syntax
kesl-control [-D] --upload-temporary-device-access-key --path <path to the file with the access key>
Arguments and keys
--path <path to the file with the access key> is the path to the file containing the access key to the device (file with the .acode extension).