Comparison of Protection Key Attributes
This section compares Software (SL), Cloud (CL), and Hardware (HL) licensing methods, and describes the key attributes of each protection key type. It helps you choose the most suitable key based on your security, platform, and operational requirements.
Comparing Software (SL), Cloud (CL), and Hardware (HL) Licensing Methods
Sentinel LDK supports various licensing methods to suit your specific needs and requirements. Each method has its unique advantages for developers and end users. This section focuses on cloud licensing (CL) for its flexibility and ease of use.
The following table illustrates the various licensing methods that Sentinel LDK offers.
| Aspect | Software Licensing (SL) | Cloud Licensing (CL) | Hardware Licensing (HL) |
|---|---|---|---|
| Deployment | Installed on the hard drive of the customer’s computer or server. | Hosted on Thales cloud servers or Vendor-hosted server. | Physical USB keys (dongles), connected to the customer’s computer or server. |
| Requires shipping to the customer | No | No | Yes |
| Requires the user’s computer to have internet connection | Optional (license fulfillment is simpler if connected) |
Yes1 |
No |
| Action required from the customer / user | Install a license file. | Install an identity string or using user name and password. | Connect the Sentinel HL key to the machine. |
| Use the license on any machine | Possible through rehosting, where the user copies files to and from the source and recipient machines to transfer the license. | Completely transparent. The user just needs to launch the application on any machine where the identity was previously installed or the user just needs to launch the application on any machine and enter the user name and password. | Possible. Requires the key to be disconnected from one machine and connected to another. |
| For licenses with concurrency, users can detach a single license to their computer for continued offline use (commuter license) | Yes | Yes | No |
| Suitability for VM and Docker environments | Medium for servers/cloud. Low for local machines. | High for all connected scenarios. | Low for servers/cloud. High for local machines. |
|
1Offline Detach can be used for air-gapped clients. 1A license can be detached to a server on the LAN that has internet connectivity, and the client without internet access can log in to that server to use the license. |
|||
Protection Key Attributes
The various types of Sentinel protection keys that are available provide different levels of security and flexibility, as described in the table that follows.
NOTE The table above relates to the operating system on the machine to which the protection key is attached. However, for protection keys that support concurrency, the protected application can be located on a different machine. In this case, the protected application can be executing under any operating system listed in the table even when that operating system does not support the protection key.
For example: A protected application running on an Android machine can be licensed by an SL AdminMode protection key on a Linux Intel machine.
For information on V‑Clock (the virtual clock available on most Sentinel protection keys), see How Sentinel LDK Protects Time-based Licenses With V-Clock.
For full technical specifications of the available Sentinel HL keys, refer to the Sentinel HL Data Sheet.
For additional information, see Situations That Require Sentinel LDK Run-time Environment.
