Installation parameters on GNU/Linux

When installing the Backup Manager on GNU/Linux devices, the command used to install and is made up of the initial command to run configure-fp.sh, and several required and optional parameters to set credentials and access.

For the full instructions, please see Alternative installation on GNU/Linux

Please find below the parameters to use during the Backup Manager installation on GNU/Linux systems.

Required parameters

If you do not supply these parameters in the command used to run the installer, you will be prompted to supply these one at a time until all are complete before the installation will run:

Parameter Definition
--user The name of your backup device (issued by your service provider)
--password Your installation key for the backup device (issued by your service provider)
--encryption-method (legacy)

This setting lets you customize the data encryption method. From the 17.5 release onwards, AES-256 has become the common encryption method for all installations.

All previous installations retain their original encryption method selections.

--encryption-key

Set an Encryption Key/Security Code that will be used to encrypt your data. It can be any word or sentence of your choice. Using this, you can encrypt your files with a strong encryption algorithm, thus keeping your private data protected from unauthorized access.

You must keep a note of the Encryption Key/Security Code yourself as this is NOT stored anywhere within our system and will be required to carry out several key tasks, such as recovering data, moving an backup to a different device, etc.

--use-proxy

This setting prompts the Backup Manager to connect to the Internet through a proxy server.

Supported values:

  • 1 - use a proxy connection
  • 0 - do not use a proxy connection (Default)

Optional parameters

These parameters are optional extras which can be used within the command to provide additional configuration to your system:

Parameter Definition
--proxy-type The type of the proxy server: HTTP, SOCKS4, or SOCKS5
--proxy-address The host name or IP address of the proxy server
--proxy-port The port you access the proxy server through
--use-proxy-authorization Defines if the proxy server requires authorization by username: true or false.
--proxy-username Your username for proxy access
--proxy-password Your password for proxy access
-h, --help Gives access to help resources. This is an internal parameter of the RUN package (does not require -- after the command name). Sample usage: ./bm-linux-i686.run -h or ./bm-linux-i686.run --help