AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Rather than hosting SL protection keys in the customer's network, the SL licenses are hosted on the vendor's server in cloud and end users consume licenses from anywhere-online or offline or both.Ĭustomer's environment depending upon standalone or network licensing. You can also implement an alternative model for distributing licenses for protected applications to customers using cloud licensing ( CL). Sentinel SL keys provide the same functionality as Sentinel HL keys, without requiring physical distribution. > Sentinel SL: The software-based keys that exist in the secure storage of a specific computer. Most times, it is possible to use these keys while installing no additional support software. > Sentinel HL: The hardware keys connect to the end users’ computers. Your software is distributed with Sentinel protection keys: Protected Application with Sentinel Protection Keys SDK to be installed on your (vendor's) end The table below lists the components that are used either at the vendor's site or redistributed to customers: ComponentĬontains all the programs required to implement protection and licensing such as Sentinel LDK Envelope, Sentinel Licensing API, and Sentinel LDK ToolBox. The following diagram provides a high-level view of the Sentinel LDK-based solution:
0 Comments
Read More
Leave a Reply. |