Protection
In this section:
>Protecting Software – Provides an overview of Sentinel LDK software protection, including its fundamental elements, a summary of how it works, and an introduction to Sentinel LDK protection methods.
>Sentinel Licensing API Protection – Provides an overview of the Sentinel Licensing API, details the prerequisites for using the API, introduces the Sentinel LDK ToolBox application and describes the functionality of the API.
>Sentinel LDK Envelope Protection – Provides an overview of software protection using Sentinel LDK Envelope, details the prerequisites for using the application, and describes its functionality. In addition, it describes the Sentinel LDK Envelope protection parameters and how to encrypt data files.
>Protection Strategies – Outlines strategies for maximizing Sentinel LDK protection, including best practices and optimizing the use of the Sentinel Licensing API and Sentinel LDK Envelope.
>Protecting Data Files – Describes data file protection using the Sentinel LDK Data Protection utility. It includes information about the types of protection that are available.
>Protecting Applications in Docker Containers – Describes how Sentinel LDK supports protecting and licensing applications running in Linux Docker containers using SL or HL keys with various deployment options and considerations to ensure proper license management and avoid cloning issues.
>Protecting Applications in Linux LXC Containers – Describes how Sentinel LDK supports protecting and licensing applications running in Linux LXC containers using SL or HL keys with multiple deployment options, including outside, inside, or mixed installation of the Run-time Environment and keys.
>Detecting Machine Cloning with Sentinel SL Keys – Describes how Sentinel LDK detects and prevents unauthorized use of protected software on cloned physical or virtual machines.
