Commands for managing Device Control

-D is a prefix indicating that the command belongs to the group of commands to manage Device Control.

kesl-control --get-device-list

This command outputs the list of devices installed on a host or connected to it, or exports a list of connected devices to a JSON file.

Command syntax

kesl-control [-D] --get-device-list [--all] [--json] [--export <file>]

Arguments and keys

--all lists all connected devices.

--json lists connected devices in JSON format.

--export <file> – export the list of connected devices to a file, formatted as a list of trusted devices. You need to specify the full path to the JSON file.

kesl-control --trusted-devices

The command lets you view the list of trusted devices, add and remove devices from the list, and import the list of trusted devices from a file.

Command syntax

kesl-control [-D] --trusted-devices [--list] [--add <ID>] [--delete <ID>] [--merge|--add|--replace --file <file>]

Arguments and keys

--list – display the list of trusted devices.

--add <identifier> – add a device to the list of trusted devices by device ID or device ID mask.

--delete <identifier> – delete a device from the list of trusted devices by device ID or device ID mask.

--merge merges the lists of trusted devices. If the current list and the imported list contain entries for a device with the same ID, the existing entries are updated. For devices that are not in the current list, entries are added.

--add adds the current list of trusted devices when importing. Only entries for devices not previously on the list of devices are added to the list.

--replace replaces the current list of trusted devices. The existing list of trusted devices is replaced with the imported list.

--file <file> – import a list of trusted devices from the specified file. You need to specify the full path to the JSON file.

kesl-control --request-temporary-device-access

This command lets you create an access request file to request temporary access to a blocked device.

Command syntax

kesl-control [-D] --request-temporary-device-access --device-id <device ID> --access-duration <access duration> --path <path to access request file>

Arguments and keys

--device-id <device ID> specifies the ID of the blocked device to which you want to gain access.

--access-duration <access duration> specifies the time period during which you want to be able to gain access to the device (in hours). Possible values: 1 to 100.

--path <path to the access request file> specifies the path to the directory in which you want to save the access request file with the .akey extension.

kesl-control --upload-temporary-device-access-key

This command allows you to upload an access key to gain temporary access to a blocked device.

Command syntax

kesl-control [-D] --upload-temporary-device-access-key --path <path to the file with the access key>

Arguments and keys

--path <path to the file with the access key> is the path to the file containing the access key to the device (file with the .acode extension).

Page top