/build/static/layout/Breadcrumb_cap_w.png

APP-V Update OSD file dynamically

Hi,

Is it possible to run a script to get a license server from an ini file (on a network share) or database then populate an environment variable or registry key in the bubble, I assume by updating the osd file?

0 Comments   [ + ] Show comments

Answers (3)

Posted by: ekniranjan 14 years ago
Purple Belt
0
Hi SuccessSystems,
Do you mean by scripting OSD, i mean including any VBS in OSD.
I mean i am not so expert with APP-V but, trying to catch you assumption.
Posted by: SuccessSystems 14 years ago
Senior Yellow Belt
0
I know you can add scripts to run at different times of the virtualization process and that the scripts can be set to effect changes either in the bubble or on the machine. What I want to do is get information from outsite the bubble then populate a reg key or environment varible in the bubble with that information.
Posted by: manivv 14 years ago
Yellow Belt
0
You can write a script (for example VBS) and place it on a network share which is open to all users. Then you can open the OSD create a pre-launch script which will point to the VB script you created. So essentially, every-time the OSD is launched, it will run the script.This VB script can be modified and it will dynamic based on your requirements.
Please remember to choose TRUE for Protect, this is what enables the script to run inside the bubble.
Rating comments in this legacy AppDeploy message board thread won't reorder them,
so that the conversation will remain readable.

Don't be a Stranger!

Sign up today to participate, stay informed, earn points and establish a reputation for yourself!

Sign up! or login

Share

 
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ