02.04.2013 Views

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 1 – Introduction<br />

Contents Glossary Index Troubleshooting<br />

12 <strong>Sentinel</strong> <strong>Hardware</strong> <strong>Keys</strong> Developer’s <strong>Guide</strong><br />

<br />

Note: If desired, your <strong>Sentinel</strong> Key vendors can program <strong>Sentinel</strong> <strong>Keys</strong> in bulk for<br />

you. See the option described on page 206.<br />

Convenient Licensing for Your <strong>Customer</strong>s<br />

<strong>Sentinel</strong> <strong>Keys</strong> are ultimately deployed on your customer's site to allow<br />

authorized access to your protected applications. The following features<br />

ensure that the licensing process is enforced without being inconvenient:<br />

Easy-to-carry, small, and durable tokens.<br />

<strong>Hardware</strong>-based licenses unaffected by application crashes/<br />

uninstallations.<br />

Self-guided license installation/updates using the Secure Update<br />

Wizard (for Windows only).<br />

Remote license installation, addition and updates (via e-mail and file).<br />

License tracking and client information using a Web browser-based<br />

monitoring tool. The same tool provides an option to system<br />

administrators for canceling licenses.<br />

Support for widely used TCP/IPv4 along with the next generation<br />

Internet protocol TCP/IPv65 , on Windows, Linux and Macintosh.<br />

XML-based configuration files for network application users and<br />

<strong>Sentinel</strong> <strong>Keys</strong> Server.<br />

Support for Different Types of Programming<br />

Environments<br />

<strong>Sentinel</strong> <strong>Hardware</strong> <strong>Keys</strong> offer different interfaces for programming that<br />

enable a quick implementation of your protection strategy.<br />

5.TCP/IPv6 communication (between the application and the hardware key) is supported<br />

only on the same subnet. Please see Question 12 of Chapter 2 to view the list of operating systems<br />

on which SHK supports IPv6.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!