Changes to Workflow
This section summarizes the differences to the end users' experience when working with SL keys rather than HL keys.
NOTE Unless indicated otherwise, the steps in the workflows in this section are performed by the customer.
Initial Use
This topic compares the user experience for initial use of the protected application when working with HL licensing, SL licensing, and Cloud licensing.
In all cases, it is assumed that the protected application and the Run-time Environment (when required) are installed on the end user's machine. For network licenses, the Run-time Environment is installed on the license server machine.
HL Licensing
Time required: Less than 1 minute.
Receive delivery of the HL key from the vendor. Attach the HL key to the end user's machine or (for network licenses) to the license server machine.
SL Licensing - Online Activation
Time required: Less than 1 minute.
1.Receive the product key from the vendor by email.
2.On the end user's machine or (for network licenses) the license server machine, click the link in the email to access the Sentinel LDK-EMS Customer Portal.
3.Paste the product key from the email into the Customer Portal.
NOTE If the software is being supplied in a physical package, you can include a product key in the package. The user can type in the product key to log in to the Customer Portal.
4.On the Customer Portal web page, click Online activation.
SL Licensing - Offline Activation Using Sentinel LDK-EMS
Time required: Less than 5 minutes.
1.Receive the product key from the vendor by email.
2.On the end user's machine or (for network licenses) the license server machine, use the Admin Control Center or other tool to create a C2V file containing a fingerprint of the machine. Transfer the C2V file to a machine with Internet access.
3.On the Internet machine, use the product key to log in to the Sentinel LDK-EMS Customer Portal.
NOTE If the software is being supplied in a physical package, you can include a product key in the package. The user can type in the product key to log in to the Customer Portal.
4.Click Offline activation. Upload the C2V file.
5.Download a generated V2C file. Transfer the V2C file to the target machine.
6.On the target machine, use the Admin Control Center or other tool to apply the V2C file.
SL Licensing - Offline Activation Using Sentinel LDK License Generation API
Time required: Depends on your response time.
1.On the end user's machine or (for network licenses) the license server machine, use the Admin Control Center or other tool to create a C2V file containing a fingerprint of the machine. Transfer the C2V file to a machine with Internet access.
2.Send the C2V file to the vendor by email or other means.
The vendor uses Sentinel License Generation API to generate a V2C file containing a license to use the protected application. The following API functions are used:
a.sntl_lg_initialize
b.sntl_lg_start using license type SNTL_LG_LICENSE_TYPE_UPDATE.
c.sntl_lg_generate_license – Save the generated V2C file.
d.sntl_lg_cleanup
For an example of this procedure, see "Lesson 6: Creating and Distributing a Sentinel SL-protected Software Order" in the Sentinel LDK Software Protection and Licensing API Tutorial (Starter Kit).
The vendor returns the V2C file to the customer by email.
3.Receive the generated V2C file and transfer it to the target machine.
4.On the target machine, use the Admin Control Center or other tool to apply the V2C file.
SL Licensing - Online Activation Using Sentinel LDK-EMS and 3rd Party Software
Time required: Activation is instantaneous.
Vendors can use a combination of marketplace software and Sentinel LDK-EMS web services to handle receipt of payment and automatic activation of the protected applications.
Cloud Licensing (Connected mode)
Time required: Less than 5 minutes.
1.Each end user receives a personalized client identity string by email.
2.The end user installs their identity string on their machine (or on multiple machines if allowed) using one of the following methods:
•In Admin Control Center, go to Configuration > Access to Remote License Managers tab. Enter the identity string in Remote License Search Parameters.
• Manually add the identity string to the local License Manager configuration file.
These operations can also be performed programmatically.
Cloud Licensing (Detached mode)
Time required: Activation is instantaneous for the end users.
Using Admin Control Center, an administrator in the customer organization detaches an SL license with concurrency from the vendor's license server to one or more second-level license servers. The administrator configures the License Manager to indicate which end users can access network seats for the detached license.
Authorized end users can access network seats with no action required on their part.
Portability
This topic compares the user experience for moving the license to a different machine when working with HL licensing, SL licensing, and Cloud licensing.
In all cases, it is assumed that the protected application and the Run-time Environment (when required) are installed on the target machine.
HL Licensing
Time required: Less than 1 minute.
Disconnect the HL key from the current machine. Attach the HL key to the target machine.
SL Licensing
Time required: 2-5 minutes.
1.On the target machine, use the RUS utility or Licensing API to collect information about the machine and save it to a file.
2.On the source machine, use the RUS utility or Licensing API to read the file from step 1 and to generate the license transfer H2H file.
3.On the target machine, use the RUS utility or Licensing API to apply the license transfer H2H file from step 2.
Cloud Licensing (Connected Mode)
Time required: Less than 5 minute.
If your client identity supports multiple machines, install your identity string on the target machine as described earlier.
If you have already installed your identity string on the maximum number of machines allowed to you:
1.Ask the cloud licenses administrator to unregister one of your machines or to increase the maximum number of allowed machines for your client identity.
2.Install your identity string on the target machine.
Cloud Licensing (Detached Mode)
Time required: Activation is instantaneous for the end users.
You can use the protected application wherever you are logged in within the LAN.