user manual
Chapter 29: iastool command-line utility 373
Executing iastool command-line tools from a script file
Piping a file to the iastool utility
The following example shows how to ping a hub named east1 by piping the file
mylogin.txt (located in the default Borland Deployment Platform installation
directory) to the iastool utility:
iastool -ping -hub east1 < c:\BES\mylogin.txt
where the file mylogin.txt contains three lines that correspond to what you
would enter for the realm, username, and password:
2
username
password
Note The contents of the file are exactly what you would enter on the command-
line. The first entry in the file is the realm option - not the realm name, but the
number you would choose from the list presented to you if you run the ping tool
without the realm option. The second line is the username and the third line is the
password. This file can then be secured in such a way that it is readable by the
iastool utility, but not by unauthorized users.
Passing a file to the iastool utility
The following command shows how to ping a hub named east1 by passing a
file to the iastool utility using the -file option:
iastool -ping -hub east1 -file c:\BES\mylogin.txt
where mylogin.txt has the following format:
Default Login
Smart Agent port number
username
password
false
ServerRealm
The -file option requires that you supply a fully qualified file name (the file
name plus a relative or absolute path). When passing a file to the iastool
utility, only the third, fourth, and sixth lines are used, which are the username,
password, and realm name, respectively. The other lines must be present, but the
information they contain is ignored by the iastool utility. For example:
Default Login
12448
myusername
mypassword
false
ServerRealm










