Install On-premise SLNX Silently

To perform a silent installation, create a batch file with the specified values required for installation.

The silent installer does not create the Core database or the Print Resilience database. To configure the database beforehand, use SQL Server Management Studio. For details, see Configure Database After Install and Configure MS SQL Server.

  1. Store the SLNX installer on a server.
  1. Create a batch file that includes the following command:

(installer storage destination path)\Setup_x64 /s /v"/qn ADDLOCAL=(features to be installed) PROPERTIES"

In "(installer storage destination path)", specify the folder path of Setup_x64.exe. The installer storage folder can be a shared folder or a local folder. Run using an account with read and write privileges on the installer storage folder.

Specify the command and options to be run according to the usage environment. For details, see the "Command and options" table.

  1. Save the batch file.
  2. Run the batch file on the server to install SLNX.

The silent installation starts.

For sample scripts, see this sample and also this sample.

Command and options

Command/option

Description

/s

Changes to silent installation mode.

/v

Passes all parameters specified in double quotations.

/qn

Specifies not to display any user interface during installation.

ADDLOCAL

Specify the features to be installed. You can specify multiple features by separating them using a comma. When no feature is specified, all features are installed. For details about the features that can be specified, see the "Features" table below.

Example:

ADDLOCAL=Coreserver,DSserver

PROPERTIES

Specify the 'public' properties to configure the system in the following format:

PROPERTY=value

When property values have spaces, the values must be quoted with the quotes escaped with a backslash (\) (e.g. PROPERTY=\"value with spaces\").

For details about the properties that can be specified, see the "Properties" table below.

Features

Feature Name

Description

Coreserver

Installs the Core Server.

DSserver

Installs the Delegation Server.

MieServer

Installs the MIE Server.

SLP

Delegation Server sub-feature that installs SLP service for Delegation Server zero configuration networking.

PrintResilience

Delegation Server sub-feature that installs Print Resilience functionality.

cardreader_inepro

Adds support for the Inepro IP Reader.

cardreader_rfideas

Adds support for the RF IDeas Ethernet 241 card reader.

Documentation

Installs product documentation in PDF.

Properties

Property Name

Affected Features

Description

INSTALLDIR

All

Specify the installation destination directory. The default path is C:\Program Files\Ricoh

\Streamline NX.

INSTALLDIR_SP

All

Specify the data storage path.

The default path is %PROGRAMDATA%

\Ricoh\Streamline NX.

INSTALLDIR_OSGI

All

Specify the location of the OSGi configuration area. If not specified, the data storage path is used.

The default path is %PROGRAMDATA%

\Ricoh\Streamline NX.

INSTALLDIR_LOG

All

Specify the log storage path. Specify the path where the service logs are stored.

The default path is %PROGRAMDATA%

\Ricoh\Streamline NX\logs.

LOGON_AS_SYSTEM

All

Specify whether users should log in using local system credentials to use the services to be installed.

If set to No, SERVICE_PASSWORD and SERVICE_USER must be specified. It is recommended to set to No.

For security reasons (allowing services access to network resources, using Windows Authentication for Core database access, etc.), it is recommended to configure the services to run under a domain user account.

The default is No.

SERVICE_USER

All

Specify the Windows user account under which the services will run. Required when LOGON_AS_SYSTEM is set to No.

SERVICE_PASSWORD

All

Specify the password for the SERVICE_USER.

ENABLE_SSL

All

Specify whether the services to be installed listens on SSL. Only TRUE is available.

SSL_CERTIFICATE_TYPE

All

Specify the type of certificate to be used.

When set to 2, SSL_WINDOWS_CA_TEMPLATE must be set as well.

1: Self-signed certificate or commercial certificate will later be configured.

2: Certificates by Windows Local Certificate Authority are used.

The default is 1.

SSL_WINDOWS_CA_TEMPLATE

All

Specify the name of the Windows Certificate Authority Template to be used for enrolling with the CA to obtain a certificate. Required when SSL_CERTIFICATE_TYPE is set to 2.

ENABLE_SSL_TRUST_CERT

All

Specify whether all certificates are trusted when connecting to a service. Do not set to use the keystore to establish trust.

Only TRUST is available.

CORE_DATABASE_IS_WINDOWS_AUTHENTICATION

Core Server

Specify whether Windows authentication via SERVICE_USER/SERVICE_PASSWORD will

be used for the Core Server to connect to the MS SQL database. Must be set to FALSE when LOGON_AS_SYSTEM is set to Yes.

CORE_DATABASE_SQL_SERVER_AUTH_USER

Core Server

Specify the SQL Authentication account used for logging into the MS SQL server when Windows authentication is not used.

Required when CORE_DATABASE_IS_WINDOWS_AUTHE

NTICATION is set to FALSE.

CORE_DATABASE_SQL_SERVER_AUTH_PWD

Core Server

Specify the SQL Authentication account password for logging into the MS SQL Server when Windows Authentication is not used. Required when CORE_DATABASE_IS_WINDOWS_AUTHE

NTICATION is set to FALSE.

CORE_DATABASE_SERVER

Core Server

Specify the name or IP address of the server where the MS SQL Server is installed.

Required when a database instance is used.

Input format: hostname\instancename

CORE_DATABASE_PORT

Core Server

Specify the port on which the database is listening.

The default is 1433.

CORE_DATABASE_NAME

Core Server

Specify the core database name. This parameter is optional.

The default is ricoh_slnx

VALIDATION_QUERY

Core Server

Specify whether the specified query is used for testing database auto-disconnect on idle.

true:select 1: The specified query is used false: No query is used.

The default is false.

EMB_SECURITY_CONNECTION_KEY

Core Server

Specify a security connection key distributed from the Core Server to the Delegation Servers used by Embedded Applications to ensure the validity of the Embedded Applications to the Delegation Servers. The key can be changed using Management Console if it is compromised.

This property is optional.

PLATY_SECURITY_CONNECTION_KEY

Core Server

Specify a security connection key distributed from the Core Server to the Delegation Servers. Each PC Client that is installed must also be installed with the same connection key. This key is exchanged between PC Client and Delegation Servers to ensure the validity of the caller. The key can be changed using Management Console if it is compromised. (PC Client must be reinstalled with the new key).

This property is optional.

SDKUM_SECURITY_CONNECTION_KEY

Core Server

Specify a security connection key used by the Core Server to validate the trust of the SDK User Management tools that connect to the Core Server. If using the PasswordNotification tool, it must be configured with the same security connection key. The key can be changed using Management Console if it is compromised. (The PasswordNotification tool must be reconfigured with the new key.)

This property is optional.

DS_SECURITY_CONNECTION_KEY

Core Server, Delegation Server

Specify a security connection key used by the Core Server and Delegation Servers to validate the trust of Delegation Servers to the Core Server. The same key must be used on the Core Server and all Delegation Servers that connect to it. The key can be changed using Management Console if it is compromised and then updated via Management Console on each Delegation Server.

This property must be set.

MIE_SECURITY_CONNECTION_KEY

Core Server, MIE Server

Specify a security connection key distributed from the Core Server to the Delegation Servers. This key is used by Delegation Servers and MIE Servers to validate the trust of MIE Servers to Delegation Servers. The key can be changed using Management Console if it is compromised, and then the MIE Server must be reinstalled with the new key.

This property must be set.

CORE_PORT

Core Server, Delegation Server

Specify the port on which the Core Server is listening for HTTP connections.

The default is 8080.

CORE_PORT_S

Core Server, Delegation Server

Specify the port on which the Core Server is listening for HTTPS connections. The Core Server will listen on this port if ENABLE_SSL is set to TRUE.

The default is 51443.

CORE_ADDRESS

Delegation Server

Specify the name or IP address of the Core Server. Required when installing a Delegation Server and the Core Server is installed on a different server.

The default is localhost.

ENABLE_CORE_SSL

Delegation Server

Specify whether the Core Server is listening on SSL. When set to TRUE, Delegation Servers will attempt to connect to the Core Server via SSL on the port identified in CORE_PORT_S. To disable SSL, do not specify this property. Without SSL, Delegation Servers will attempt to connect to the Core Server via the port identified in CORE_PORT.

Only TRUE is available.

DM_ADDRESS

MIE Server

Specify the name or IP address of the Delegation Server. Required when installing the MIE Server and the Delegation Server is installed on a different server.

DM_PORT

Delegation Server, MIE Server

Specify the port on which the Delegation Server is listening for HTTP connections.

The default is 9090.

DM_PORT_S

Delegation Server, MIE Server

Specify the port on which the Delegation Server is listening for HTTPS connections. The Delegation Server will listen on this port when ENABLE_SSL is set to TRUE.

The default is 52443.

ENABLE_DS_SSL

MIE Server

Specify whether the Delegation Server is listening on SSL. If it is set to TRUE, the MIE Server will attempt to connect to the Delegation Server via SSL on the port identified in DM_PORT_S. To disable SSL, do not specify this property. Without SSL, the MIE Server will attempt to connect to the Delegation Server via the port identified in DM_PORT.

Only TRUE is available.

MIE_PORT

MIE Server

Specify the port on which the MIE Server is listening for HTTP connections.

The default is 10100.

MIE_PORT_S

MIE Server

Specify the port on which the MIE Server is listening for HTTPS connections. The MIE Server will listen on this port if ENABLE_SSL is set to TRUE.

The default is 53443.

SLP_SCOPE

Delegation Server (with SLP)

Scopes are simple strings and are used to group services. Clients cannot see services that are in different scopes.

The default is SLNX.

PRINTRESILIENCE_UNC_PATH

Delegation Server (with Print Resilience)

Specify the path to the shared print queue directory.

PRINTRESILIENCE_DATABASE_SERVER

Delegation Server (with Print Resilience)

Specify the name or IP address of the server where the MS SQL Server is installed for Print Resilience. If a database instance is used, then it should also be specified.

Format: hostname\instancename

PRINTRESILIENCE_DATABASE_PORT

Delegation Server (with Print Resilience)

Specify the port on which the Print Resilience database is listening.

The default is 1433.

PRINTRESILIENCE_DATABASE_NAME

Delegation Server (with Print Resilience)

Specify the name to be used for the Print Resilience database

The default is ricoh_printres.

PRINTRESILIENCE_DB_IS_WINDOWS_AUTHENTICATION

Delegation Server (with Print Resilience)

Specify whether Windows authentication via SERVICE_USER/SERVICE_PASSWORD will

be used for Delegation Servers to connect to the Print Resilience MS SQL database. Must be set to FALSE when LOGON_AS_SYSTEM is set to Yes.

The default is TRUE.

PRINTRESILIENCE_DB_SQL_SERVER_AUTH_USER

Delegation Server (with Print Resilience)

Specify the SQL Authentication account used for logging into the MS SQL server when Windows Authentication is not used. Must be specified when PRINTRESILIENCE_DB_IS_WINDOWS_AU THENTICATION is set to FALSE.

PRINTRESILIENCE_DB_SQL_SERVER_AUTH_PWD

Delegation Server (with Print Resilience)

Specify the SQL Authentication account password for logging into the MS SQL Server when Windows Authentication is not used. Must be specified when PRINTRESILIENCE_DB_IS_WINDOWS_AU THENTICATION is set to FALSE.

PRINTRESILIENCE_VALIDATION_QUERY

Delegation Server (with Print Resilience)

Specify whether the specified query is used for testing database auto-disconnect on idle.

true:select 1: The specified query is used false: No query is used.

The default is false.

OPERATION_MODE

All

Select the operation mode of SLNX from cloud-based or on-site (called on-premise here). When installing SLNX on VPN-less Cloud, select "Cloud" even for on-site servers.

0: On-Premises

1: Cloud

Sample script 1 - Installing only Core server

Using the following sample, a Core server that uses a self-signed SSL certificate is installed with the provided SQL Express.

(installer storage destination path)\Setup_64.exe /s /v"/qn ADDLOCAL=Coreserver LOGON_AS_SYSTEM=no SERVICE_USER=(domain)\(user name) SERVICE_PASSWORD=\"(password)\" CORE_PORT=(port on which the Core Server listens for HTTP connections) CORE_PORT_S=(port on which the Core Server listens for HTTPS connections) ENABLE_SSL=TRUE SSL_CERTIFICATE_TYPE=1 CORE_DATABASE_IS_WINDOWS_AUTHENTICATION=TRUE CORE_DATABASE_SERVER=(name or IP

address of the server

where the MS SQL Server is installed)\SQLEXPRESS CORE_DATABASE_NAME=slnx_test CORE_DATABASE_PORT=(port on which the Core database is listening)

DS_SECURITY_CONNECTION_KEY=(Delegation Server's security connection key) MIE_SECURITY_CONNECTION_KEY=(MIE Server's security connection key)"

Sample script 2 - Installing only Delegation Server with SLP Service

A Delegation Server that uses a self-signed SSL certificate is installed using the following sample.

(installer storage destination path)\Setup_64.exe /s /v"/qn ADDLOCAL=DSserver,SLP LOGON_AS_SYSTEM=no SERVICE_USER=(domain)\(user name) SERVICE_PASSWORD=\"(password)\" DM_PORT=(port on which the Delegation Server listens for HTTP connections) DM_PORT_S=(port on which the Delegation Server listens for HTTPS connections) ENABLE_SSL=TRUE SSL_CERTIFICATE_TYPE=1 DS_SECURITY_CONNECTION_KEY=(Delegation

Server's security connection key) CORE_ADDRESS=(Core server's IP address) ENABLE_CORE_SSL=TRUE CORE_PORT=(port on which the Core Server listens for HTTP connections) CORE_PORT_S=(port on which the Core Server listens for HTTPS connections) ENABLE_SSL_TRUST_CERT=TRUE"

When performing upgrade installation, only LOGON_AS_SYSTEM, SERVICE_USER and SERVICE_PASSWORD should be specified. The following is an example:

(installer storage destination path)\Setup_x64 /s /v"/qn LOGON_AS_SYSTEM=no SERVICE_USER=(domain)\(user name) SERVICE_PASSWORD=\"(password)\""