Skip to main content

Centralized admin rollout options

Installing the Task Mining Client software from the command line (from version 2.3.0)

Note

You must have admin rights to install the Task Mining Client software from the command line. A system proxy is used by default. If a different setting is required, you must configure this for each machine individually.

Connecting the Task Mining Client to the team/project during centralized installation

During installation, an admin can instruct the Task Mining Client software to connect to a team and project, allowing end users to start capturing data.

msiexec.exe /qb /[i|x] CelonisTaskMining.Installer-<version>.msi [ACTIVATIONLINKURLPROPERTY=<activation_link_url>] [CHROMEEXTENSIONPROPERTY={0|1}] [EDGEEXTENSIONPROPERTY={0|1}] [CUSTOMEXTENSIONPROPERTY={0|1}] [CUSTOMEXTENSIONIDS=<custom_extension_id>] [CHROMEUPDATEURL=<update_url>] [EDGEUPDATEURL=<update_url>] [SECUREGATEWAYSERVERPROPERTY=<secure_gateway_server_url>] [CLIENTCERTIFICATESUBJECTPROPERTY=<client_certificate_subject>] [SPNPROPERTY=<service_principal_name_identifier>] [TIMEOUTPROPERTY=<connection_timeout>] [EXTENSIONWEBSOCKETPORTPROPERTY=<extension_websocket_port>]

Centralized admin rollout option parameters

Important

We recommend organizations host their own app (extension) store where end users actively consent before extensions are enabled. This will help prevent third-party software installing and enabling malicious extensions without end-user consent. For more information, see Self-hosting Chrome extensions.

Parameter

Description

Possible values

Default value at installation

From version

/qb

Specifies there is a basic UI during the installation process.

--

--

--

/i

Specifies normal installation.

--

--

--

/x

Uninstalls the package.

--

--

--

ACTIVATIONLINKURLPROPERTY

Assigns the activation link URL. View the activation link URL from Users & Invite >  Invite Users.

Deprecated from 2.10.

URL with this format:

https://<team>.<realm>.celonis.cloud.celonis.cloud/task-mining/ui/join?code<uuid>

--

2.3.0

CHROMEEXTENSIONPROPERTY

Enables or disables installation of the Google Chrome extension.

0 (disabled)

1 (enabled)

1

2.3.0

CHROMEUPDATEURL

Changes the update URL location for installing and updating the Chrome extension to an alternative repository.

For more information on using CHROMEUPDATEURL, see Set up with command prompt.

--

Chrome Web Store

2.4.0

CLIENTCERTIFICATESUBJECTPROPERTY

Assigns the client certificate subject name. The certificate must be installed in the Windows certificate store under Current User/Personal store.

--

<empty>

2.3.0

CUSTOMEXTENSIONIDS

Assigns the custom Chrome extension ID value (separate multiple values with commas).

For information on using CUSTOMEXTENSIONIDS, see Set up with command prompt.

--

<empty>

2.7.8

CUSTOMEXTENSIONPROPERTY

Specifies whether a custom Chrome extension ID is used. This is required for self-hosted rollouts of the Task Mining Chrome extension.

--

--

2.7.8

EDGEEXTENSIONPROPERTY

Enables or disables installation of the Microsoft Edge extension.

0 (disabled)

1 (enabled)

1

2.3.0

EDGEUPDATEURL

Changes the update URL location for installing and updating the Edge extension to an alternative repository.

--

Chrome Web Store

2.4.0

EXTENSIONWEBSOCKETPORTPROPERTY

Specifies a custom web socket port for the Chrome extension.

--

8080

2.12.0

SECUREGATEWAYSERVERPROPERTY

Assigns the secure gateway URLs if the Task Mining Client software is used in a secure environment.

Multiple URLs must be separated by a semicolon (;).

--

<empty>

2.3.0

SPNPROPERTY

Assigns the Service Principal Name (SPN) of the gateway service to enable authentication with the on-premise Task Mining Gateway. Multiple SPNs should be separated by semicolon (;). Secure gateway URLs and their corresponding SPN should be defined in the same order.

Important

Use of the Task Mining Gateway is currently limited to specific customers who use a hybrid environment. For more information, see Download Task Mining Gateway.

--

<empty>

2.5.0

TIMEOUTPROPERTY

Defines the timeout in seconds for HTTP connections to the Task Mining Gateway.

Important

Use of the Task Mining Gateway is currently limited to specific customers who use a hybrid environment. For more information, see Download Task Mining Gateway.

Any positive integer value.

180

2.5.0

WORKINGDIRECTORY

Changes the default location of the working directory. The Task Mining Client software requires read and write permissions for this directory.

%LOCALAPPDATA%\Celonis\TaskMiningClient

Centralized admin rollout option examples

Install type

Example command

With a secure gateway configuration.

For more information, see Configuring the Task Mining Client software to run over a secure gateway.

msiexec.exe /qb /i CelonisTaskMining.Installer.msi SECUREGATEWAYSERVERPROPERTY="myserver.com" CLIENTCERTIFICATESUBJECTPROPERTY="certificate subject"

With a Task Mining Gateway configuration.

For more information, see Configuring the Task Mining Client software to run over the Task Mining Gateway.

Important

Use of the Task Mining Gateway is currently limited to specific customers who use a hybrid environment. For more information, see Download Task Mining Gateway.

msiexec.exe /qb /i CelonisTaskMining.Installer.msi SECUREGATEWAYSERVERPROPERTY="myserver.com" CLIENTCERTIFICATESUBJECTPROPERTY="certificate subject" SPNPROPERTY="service principal name"

With an activation link on installation.

msiexec.exe /qb /i CelonisTaskMining.Installer.msi ACTIVATIONLINKURLPROPERTY="https://team.domain.celonis.cloud/task-mining/join?code=1234-5678-9012-1234"

Without extensions.

msiexec.exe /qb /i CelonisTaskMining.Installer.msi CHROMEEXTENSIONPROPERTY=0 EDGEEXTENSIONPROPERTY=0

With a custom extension ID.

msiexec.exe /qb /i CelonisTaskMining.Installer.msi CUSTOMEXTENSIONIDS="abcdefghijklmnopqrstuvwxyz"

With a Chrome extension from a different store.

msiexec.exe /qb /i CelonisTaskMining.Installer.msi CHROMEUPDATEURL="http://myserver.com/extension_store"

Uninstall.

msiexec.exe /qb /x CelonisTaskMining.Installer.msi

Note

You can also configure the secure gateway service settings from the MSI installer when installing the Task Mining Client software. Both methods require admin rights. For more information, see Installing the Desktop Application software.

  1. Create a registry key for the path Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Celonis\TaskMining.

  2. Create a registry string value under the previous path with the name secure_gateway_server.

  3. Assign the URL of the secure gateway server to the secure_gateway_server, for example:

    mysecuregatewayserver.com/company

    Note

    You can configure multiple secure gateways by appending additional gateways using a semicolon delimiter, for example secure_gateway_server=server1.com;server2.commysecuregatewayserver.com/company.

  4. Create a registry string value under the same path with the name client_certificate_subject.

  5. Install the client certificate that will be used to authenticate the secure gateway server under Current User/Personal store.

  6. Assign the Subject of the client certificate to the client_certificate_subject, for example My Certificate.

    The configuration is complete.

    Tip

    Roll back the configuration (if necessary) by removing the registry values created in steps 2 and 4.

Important

Use of the Task Mining Gateway is currently limited to specific customers who use a hybrid environment. For more information, see Download Task Mining Gateway.

  1. Create a registry key for the path Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Celonis\TaskMining.

  2. Create a registry string value under the previous path with the name secure_gateway_server.

  3. Assign the URL of the secure gateway server to the secure_gateway_server, for example:

    mysecuregatewayserver.com/company

    Note

    You can configure multiple secure gateways by appending additional gateways using a semicolon delimiter, for example secure_gateway_server=server1.com;server2.commysecuregatewayserver.com/company.

  4. Create a registry string value under the same path with the name client_certificate_subject.

  5. Install the client certificate that will be used to authenticate the secure gateway server under Current User/Personal store.

  6. Assign the Subject of the client certificate to the client_certificate_subject, for example My Certificate.

  7. Create a registry string value under the same path with the name service_principal_name.

  8. Assign the unique identifier of the secure gateway service instance to the service_principal_name.

    The configuration is complete.

    Tip

    Roll back the configuration (if necessary) by removing the registry values created in steps 2, 4 and 7.