Skip to main content


Druva Documentation

How to implement automatic token-based deployment of inSync clients for inSync Cloud and On-premise


inSync allows an IT Administrator to automate the Account Creation, Deployment and Authentication of inSync clients on all enterprise devices.

This article explains the concept and describes the steps an IT administrator needs to follow when automating inSync deployment.

Before You Begin

Ensure that you have installed the latest inSync server and configured the user profile and storage appropriately.

Note: Currently, the auto-installation feature supports only the Windows and Macintosh versions of inSync clients.

Note: The mass deployment of inSync clients support new client installations only and does not support upgrade of the existing inSync clients.

Go to top


The client auto-deployment feature helps you:
•    Install the inSync client package on the client computer.
•    Load the authentication key without user’s intervention.

After the successful installation and authentication on clients, users are created on the inSync server without manual intervention of the Administrator.

The mass deployment process relies on the creation of an “ini” file on the target, which contains information needed to create and assign the account to the correct inSync Server, Storage and Profile and also the target users credentials.

An enterprise can create its own scripting methods to create and save this information or use the Automatic Deployment package provided by Druva to assist in this process. The Druva package can integrate with Active Directory (AD) or a CSV file to create the required ini files. 

Go to top

inSync Automatic Deployment Package

The inSync Automatic Deployment package provides some batch files and configuration files that you can use along with an Active Directory Group Policy Object (GPO) to silently install the inSync msi on clients and authenticate them on the server. The GPO is used to automatically distribute and deploy the inSync Client installable (msi) across domain computers or users and to authenticate them automatically as well. 

At user logon, a batch process (MASSDS.bat) creates an '.ini'  file per AD logon name and stores it on the client machine. Another batch process (SI.bat) silently installs the inSync client and authenticates the users using details present in the .ini file (like username, user’s email id), and a Mass Deployment Token.
The ini file can also be created from user details present in a .csv file.

A configuration file, server.conf, holds information like the inSync server IP, the storage name, the user’s profile etc.

The method used for Active Directory Group Policy can also be used with other third-party tools such as SCCM, LANDesk, etc.

Go to top

Auto deployment process

To automate the entire client deployment process:
1.    Download the package and place the contents on a GPO share.
2.    Edit the batch and configuration files as per your environment. 
3.    Generate a Mass Deployment Token.
4.    Execute two steps using GPO:

•    Create an %username%.INI file (at logon) and store it on the client machine.
•    Deploy inSync.msi using Mass deployment token and the .ini file (at start up).
You can download the package from here: This package has some libraries and binaries which help in creating the inSync INI file and installing and authenticating the client.

Binaries location

The zipped files for automatic deployment need to be hosted on common accessible share, so that they are available to all users for execution. The path for share needs to be updated in MASSDS.bat.

Go to top

Customizing the package

Edit the following files for customizing the package to your environment:


Set the inSync Server address, default storage, and profile, and select INI creation mode (AD or CSV).


This is a batch script which is responsible for invoking the inSync INI creator exe.  Hence it is executed using User logon scripts via GPO. It uses the parameters in  the server.conf file. It creates a set of .ini files, one per user. 


This is a batch script which is executed as a machine startup script and it executes using parameters like TOKEN (mass deployment token) and INIFILE (file holding user’s details). It installs the client and authenticates it with the inSync server, using the .ini file created by MASSDS.bat.

Block diagram of inSync Client Auto-installation Process


Go to top

Editing Server.conf

The inSync INI creator package allows using two different modes to create an INI file: 
 - Using LDAP
 - Using CSV 

This option can be set in the server.conf file.

Using LDAP

In 'server.conf', set the variable “CSV = No”. The mass deployment exe will query the LDAP server to find the logged in user email ID. The server.conf will look as follows:

Sample Server.conf

STORAGE = inSyncStore
CSV = No
Administrators = IT

Note: The following parameters are not required in inSync 5.2 or above

Using CSV

In the server.conf, set the variable “CSV = Yes”. The mass deployment exe will try and parse through the users.csv file provided by the administrator. The users.csv format looks something like this:

Sample Users.csv

test2,, inSyncStore,IT,
test3,, inSyncStore,IT,
test4,, inSyncStore,IT,
test5,, inSyncStore,IT,
test6,, inSyncStore,IT,
test7,, inSyncStore,IT,
test8,, inSyncStore,IT,

Group/Profile Mapping

The server.conf also has another section known as [PROFILEMAPPINGS]. This allows IT administrators to map their exiting AD group with an inSync server user profile. For example, we can use an AD group as administrators and map it to an inSync user profile as IT.

The parameters are shown here:

Administrators = IT

Note: Please note that INI creator will use the logged user accounts member group to execute the mappings. If the user does not belong to mapped groups then the default profile will be used.

Editing MASSDS.bat

Once you have the file share and server.conf configured, you can edit the MASSDS.bat to reflect  their paths. A sample MASSDS.bat file is shown below:

Sample MASSDS.bat

@echo on
mkdir C:\inSyncAD
cd C:\inSyncAD
copy "\\\iMD\*.*" "C:\inSyncAD" > filecopy.log
cd C:\inSyncAD
if EXIST "c:\inSyncAD\%username%.INI" goto END

The result of running this batch file is the creation of ini files, a sample of which is in the next section.

inSyncConfig.ini File Composition

The INI file contains some information for the inSync MSI installer to read after installation. This information allows the user's account to be configured on the inSync server and for it to be authenticated. 

Here is a sample inSyncConfig.ini file.

Sample inSyncConfig.ini

ADDRESS = 'IP Address of inSync Server:6061'
STORAGE = 'Name of Target Storage'
PROFILE = 'Name of Target Profile'
ADUSERNAME = 'AD UserName of user'
USERNAME = 'Name of User for inSync Account'
MAIL = 'email address of user'
WINUSERNAME = 'Windows UserName of user'
WINUSERDOMAIN = 'Windows UserDomain of user'

The ini file should be created in the following location on the target device:
•    C:\Windows\temp

Editing SI.bat

Similarly you can now edit  SI.bat to reflect the msi name and new paths and along with the new token value from  inSync server web console. 

To get the token, on the inSync server web control panel, click  Management > Users > Import > Mass Deployment token. 

Paste the token in the SI.bat file. This token is used for security purposes when installing the msi.

Sample SI.bat

@echo on
copy "\\\iMD\*.msi" "C:\inSyncAD"
cd C:\
msiexec /qn /i C:\inSyncAD\<path to inSync.msi>
INIFILE="C:\inSyncAD\%USERNAME%.INI" /Lime C:\inSyncAD\MSIlog.txt
if exist "c:\program files (x86)" goto WIN7
goto XP
cd "C:\Program Files (x86)\Druva\inSync"
goto END
cd "C:\Program Files\Druva\inSync"
goto END

 Refer to the inSync KB article for related information: How to Silently Deploy inSync User Authentication Keys.

Go to top

GPO Setup

Now you can start executing the steps  to start the automatic deployment. In GPO create two policies:

•    User logon script to execute MASSDS.bat

•    Windows startup script to execute SI.bat

See the inSync KB article  for related information: How to Silently Deploy inSync Client using Active Directory Group Policy.

Note: For details on how to setup GPO policies please follow Microsoft KB article here:

Go to top

Sample log from inSync AD folder


2012-07-13 15:36:15,489 INFO Using LDAP Method ... 2012-07-13
15:36:15,505 INFO The logged in user is:test@SCORPIUS.DRUVA.COM
2012-07-13 15:36:15,505 INFO Connected to the LDAP Server 2012-07-1
15:36:15,505 INFO ldap searching.. 2012-07-13 15:36:15,505 INFO
{'primaryGroupID': ['513'], 'cn': ['test'], 'objectClass':
['top', 'person', 'organizationalPerson', 'user'], 'userPrincipalName':
[''], 'lastLogonTimestamp':
['129858174761464843'], 'instanceType': ['4'], 'distinguishedName':
'dSCorePropagationData': ['20120703202239.0Z', '16010101000000.0Z'],

'whenCreated': ['20120703174520.0Z'], 'uSNCreated': ['21918'], 'mail':
[''], 'sAMAccountName': ['test'],
'objectGUID': ['\xed\x99\x06\x03\x8f\x1e0L\x9f\xf5]\x13%\xd3\xfa\xd0'],
'whenChanged': ['20120709125243.0Z'], 'displayName': ['test'], 'name': ['test'], 'memberOf':
'userAccountControl': ['66048'], 'sAMAccountType': ['805306368'],
'uSNChanged': ['24971'], 'sn': ['test'], 'givenName': ['test']})]
2012-07-13 15:36:15,519 INFO Groupnames are ['Galaxy', 'PF',
2012-07-13 15:36:15,519 INFO Could not find group mapping for
2012-07-13 15:36:15,519 INFO Could not find group mapping for
2012-07-13 15:36:15,519 INFO Found group mapping for
2012-07-13 15:36:15,519 INFO Connection established with inSync server
2012-07-13 15:36:15,519 INFO Creating test.ini file
2012-07-13 15:36:15,519 INFO test.ini file created

MSI Installation log:
=== Logging started: 7/13/2012  15:39:34 ==
Action start 15:39:34: INSTALL.
Action start 15:39:34:
Action ended 15:39:48: INSTALL. Return value 1.
MSI (s) (10:50) [15:39:48:649]: Product: Druva inSync 5.0 --
Installation completed successfully.
=== Logging stopped: 7/13/2012  15:39:48 ===

Note: The logs are created in C:\inSyncAD and user's temp directory.

Go to top