Unattended Installations

The unattended installation uses an XML file to install the K2 product suite. After the generation of the XML file with the configuration values, there is minimal intervention required during the setup process.

There are a number of benefits to using the unattended installation approach:

The known limitations of this installer are:

To perform an unattended installation, you need the following:

High Level Steps

  1. Generate the unattended installer XML file.
  2. Perform the unattended installation using the generated system key and XML file.