Core Components

 

Chocolatey

Chocolatey is a CLI package manager for Windows. Chocolatey packages are NuGet packages with added metadata. NuGet packages is just a compressed/zip file with PowerShell scripts and other files in it.

About packages

Chocolatey packages contain PowerShell scripts that manage the desired software. It's a very flexible and powerful solution, since the scripts can deal with all kinds of checking and tweaking. A package can contain the actual software, but most community packages only contain scripts to download the software online on the fly (no worries, the file hash must match the predefined hash in the script).

Also take a look at repository.

 

Web portal

The web portal helps you manage:

Global settings

On the start page, there's a "Global settings"-link up in the right section of the page. On that page, you can change the global settings for your server.

Note that if no user has claimed the "Global admin"-role, any user can. This is the first thing to do after setting up your own server, and if you didn't have this feature before you updated to new Deployify server version, this feature will now be added and the same principle applies.

Available settings:

Main
  • *emailEnabled - Enables the email service. This setting must be activated to be able to use 2FA and reset password.
  • *resetPasswordEnabled - Enables the reset password functionality.
  • *twoFactorAuthEnabled - Enables the 2-factor authentication functionality. If enabled, users can enable 2FA in their user settings.
  • !*publicSignupEnabled - Enables the Public sign up functionality. If enabled, the option to sign up is not available, and users with the "Global admin"-role can add user accounts (link will appear on the start page).
  • *removeOldUninstallCommands - Enables the optimization that removes old uninstalled packages with status "uninstall" and "done" that are more than a year old. Highly recommended to check this option.
  • *removeOldUninstalledApplications - Enables the optimization that removes uninstalled applications that are more than a year old from the database. Highly recommended to check this option.
  • webUnsealEnabled - Enables the Web Vault unseal functionality. If enabled, the server won't unseal the password database on start-up.

* = recommended to enable this is setting
!* = recommended to disable this is setting

E-mail

E-mail settings to be able to use the email service.

License

Here you can add your license from the License portal.

Users and roles

A list of users and their roles. Here you can add the "Global admin"-role to other users.

 

Domains

Each domain has its own space. A domain contains all information, like computers, groups, etc. Domains are isolated from each other. This is to be able to separate for example one company from another, or however you want to separate these. Computers in a domain can communicate with each other (locally) to share packages etc.

Every domain also has a separate computer Installer (MSI) that contains a secret key (pairing key). That key is changed every time a new computer installer is being generated in the web portal, so that a lost computer Installer doesn't work for future installations.

Groups

Groups contains a selection of computers, and packages for these computers.

For example, you can:
Name a group “My Office”, add all computers in your office to that group, and add multiple applications to it like 7zip, Adobe Reader etc.

Or, add a group named “Office 2016” and add all computers you want to have Office 2016, and then only add the app Microsoft Office 2016 to that group.

The nice thing with this is that when you later add a computer to one of your groups, that computer will automatically get all the apps that you have added to that group.

Consider group packages as policies. An installed group package will tell your computers to install that package according to your schedule (if any), but the actual deployment status of that package is in your computer view or in the group stats. 
 
For example, if a group package says “Command: Install”, it means that the policy for that package and selected version is to install that package on the computers in that group, when possible.

group_1.PNG
Group packages - both packages with the command "uninstall"
 
group_2.PNG
Group package details

 

Group package schedule

The schedule will be active between the start date and end date. It will run if the time range and week days are matching the current time of the computer. 

Here's an example of keeping an application up to date (every day between 00:01 and 23:59, until year 10 jun. 2022).

install_group_package.PNG

 

Application and license inventory

The website provides a complete list of all installed applications, and applications ever existed since installation of the Deployment client. This is handy if you are reinstalling a computer but lost the license key, or just want to keep track of what is installed on the computers.

There are two views, one for a single computer and one for all computers. In the view for a single computer, you can right click on the application (license field) and edit the license. In the view of all computers (link is in the domain view menu), a collective view appears that makes it easy to see all computers that have that program.

single_applications_1.PNG
Computer applications

 

domain_applications_1.PNG
Domain applications

 

domain_applications_details.PNG
Domain applications - application details

 

Deployment client

Installation

Download the MSI package in the domain view.

"Why do I get so many warnings in Windows when installing the Deployment Client (MSI) agent?"

It's because the MSI file isn't signed. The MSI isn't signed because the MSI installer is generated by the server to be able to include unique pairing keys.

The installation process would be complicated if the keys wasn't included in the installation package, and ironically very insecure if they where the same for all installations but signed. So what would you choose? Unsigned, simple and safe installation package, or signed but complicated and unsafe installation process?

We don't track, we don't spy, and we value security and integrity very high. 

Installation package will:

  1. Copy files to %programfiles%\JAHA IT\Deployment client\.
  2. Install Deployment client as a service.
    1. Create a user named "deployment client". The user is for running deploymentclient.exe as a service.
    2. Generate a strong, random password, for the service user.
    3. Add service user to local administrators group.
  3. Start the service.


Initiation

  • Install/upgrade Chocolatey.
  • Pair client with server.
  • Open ports in firewall (local network socket - 44444, local NuGet server - 44445, multicast - 44446).
  • Check settings etc.

Pair computer with server

The installation package (MSI) contains a pairing key that is generated when you are downloading it from the Web portal.  The pairing key is bound to the specific domain with a chosen expire date. After the MSI is installed on the computer, the service will start and pair the client with the server.

Pairing means that the computer gets a new unique key from the server with the help of the pairing key. The new key is bound to that specific computer (while the pairing key is not). The pairing key will be deleted after the pairing is completed.

Computer  authentication

Now that the computer has the computer-bound key, the first step to connect the computer to the socket is to get a temporary authentication key. To do this, the computer first generates a time-limited token with hashed computer information that is used for asking the server for the temporary authentication key. When this is done and the temporary key is received, the connection socket connection can be made. The temporary key is invalidated the moment it is used.

This is a complicated authentication procedure that makes it hard to replicate for bad intentions. Not only for the process itself, but because of the information, timings and other information involved.

Main functions

 

Managing Chocolatey

Makes sure that Chocolatey is installed.

Synchronizing existing software

Synchronizing existing computer software with packages that exists in your package feed(s). E.g. if 7-zip is installed on a computer and exists in any of your feeds, then it will show on the website as installed. This means that you gain control of your software so that you can manage it immediately.

Keeping track of schedules

Keeping track of schedules, so that commands are being executed in the desired time window.

Managing local network sources

This is a key feature that free up internet bandwidth.

Let's say you want to deploy an application with a size of 1 GB on 10 computers. If all computers would download the package from the repository at the same time, the internet bandwidth could be used up. The computer agent solves this by letting one computer install the package first, and then tell the other computers to install the package from that computer when the installation is complete.

As long as the package exist on one computer in the local network, then that computer will be the source for other computers in the same network.

This feature is secured with multiple protocols, and will only use computers in the same Deployify domain, with authentication and encryption.

This is how to install a package on multiple computers simultaneously (group package).

group_install.gif

There's two computers in the group, and the first computer first installs the package from the repository, and then the other computer install the package from the first computer.

 

Repository protection mechanism

Note that this feature only applies for the repos included in Deployify.

If you're managing applications for multiple organizations, you may not want the organization to be able to access your repo. The URL to your feed can be logged or sniffed when Chocolatey is installing packages, but with this feature that's not a problem.

The API key to the repository is not shared with connected computers. Instead, the computer generates a token, based on information that only the Deployment Client and the repo server have. The token is then baked into the URL that is passed to Chocolatey as a repository "source". The token is signed, never the same, only valid a short time period and only is only permitted to download from the repository.

 

Package feed
 

What's a package feed/repo?

It's simply a web service that contains information about packages, where to download them, and the packages themselves. Sometimes it's called a repository, repo, feed or just a source. 

Deployify provide you with a private and secure package feed automatically when you sign up, but you can add as many as you want. It's very easy to add software to a repository.

The computers get all the information it needs about the existing repositories to be able to connect in a secure way, and without leaking important information. See the chapter above for more details.

There's also a community feed that contains 5200+ packages that is automatically added to your portal.

 

Package creation

 

It's easy to create a new package. Choose a file, fill the form, and then upload. The engine detects fields from the uploaded file, if not, you will be notified of what fields are missing and get a chance to correct them.

The most important fields are id, version and silent install argument (default is /S).

 

create_package.gif

 

Package update

Easier than creating a package. All fields but the version field is be pre-filled, based on the package are updating.

 

update_package.gif

 


Simplified Topology

Deployify.svg