Glossary

 

Activation

Refers to the generation of a license code or file for a product or product suite*.

     
  Activation ID (AID) Refers to the unique identifier for an activation.
     

<5.5Preview>

Authentication profile Associated with webhooks to control how client applications are authenticated.

Batch Code

Also known as Namespace

In Sentinel EMS, a Sentinel LDK batch code is known as a namespace.

A batch code (or namespace) represents your company's unique vendor code. When you order Sentinel protection keys from Thales, you specify your batch code, which is both written to the keys before dispatch and printed on the outside of each Sentinel HL key. Your company can have one or more batch codes. The batch code for Sentinel protection keys with a demo vendor code is DEMOMA.

     

 

Batch Entitlement or “in batch” Refers to the generation of multiple entitlements at one go. Batch entitlements enable software vendors to create large batches of products so that the entitlement IDs can be printed right on the box and sold through various channels without knowing the end user.

 

Batch ID Refers to the unique identifier corresponding to multiple entitlements generated in a batch.
C2V file Customer-to-Vendor file. A file that is sent by the customer to the vendor prior to activating a product. The file may contain data about the customer's computer for identification purposes and/or license information. C2V files do not contain private customer information and can safely be sent by email.
     
     
Challenge Response Secrets Challenge-response mechanism is a technique used by the vendor for authenticating Sentinel RMS License Manager so that imposter license managers do not intercept and handle client communication. The challenge strings (secrets) defined are encrypted within the license code, with only the License Manager knowing how to decrypt them. The License Manager will then compute an authentication response when challenged by a client to confirm its identity. Up to seven secret text strings can be specified, each up to twelve characters long. "!" and "$" are reserved characters and cannot be used with secret text. "#" is a comment character and any text appearing after this symbol will be ignored.
     

Commuter

A Sentinel RMS license model. Useful when a user needs to travel and wants to take along the licensed application. A network license can be used as a commuter license.

Commuter licenses differ from Auto-checkout, because commuter licenses must always be manually checked out from the network before use.

     
Deployment Type

Specifies whether your licensed application will be hosted on the cloud or will be installed locally.

>Cloud: Your licensed application will be hosted on a Cloud Server and the customers will access the application from cloud.

>On-premises: Your licensed application will be installed on the customer's machine.

For more information, see the section on deployment modes in Sentinel RMS Developer Guide.

     
Enforce Clock Tampered

Software licensing may break down if the customer sets back the system time inadvertently, such as, to prevent the license expiration.

This term is provided as a check box option in the Sentinel EMS portal. Selecting or clearing this check box specifies if the software vendor wants to deny or allow the use of the licensed application in case of system clock tampering.

Enforce License Additive

An additive license code appends changes to an existing additive license.

Whereas, an exclusive license code completely replaces the old license with a new license.

  Enforce License Exclusive
     
Key Lifetime Minutes

After an application obtains a license, it also faces the task of maintaining the license. A license must be renewed by the application on a regular schedule or the license will be reclaimed (keeping it booked so that new clients do not obtain it). This is managed by sending an update call to the license server that issued the license.

So, lifetime in minutes refers to the time interval specified for the license (key) to send updates to the license server.

     
License Duration

The fixed calendar dates beyond which the licensed application cannot be used.

     
License Generators Refers to the software that generates license codes or files that are distributed by Sentinel EMS. Sentinel EMS is fully integrated with the Sentinel RMS license generator and also supports third-party license generators.
     
License Version

A license version is always associated with Sentinel RMS licenses. It maps to the SDK version in which the license was introduced. If a new feature or license property is introduced in the SDK, then the license version will be upgraded as the new feature would not be available with the earlier SDKs. For example, grace licenses were introduced in SDK v8.0.x and cannot be generated with the previous version RMS SDKs.

     
Lock Code / Locking Code / Fingerprints Refers to the actual output string (in hex format) resulting from locking to the system properties.
Memory file A memory file is a data file that is used for storing strings in a Sentinel key. Usage examples might include migrating existing license data to Sentinel EMS, storing homegrown license data, or usage counters.
     

Namespace

(for all enforcements except for Sentinel LDK )

A namespace acts as a logical partition for your Sentinel EMS workspace, providing unique storage locations within Sentinel EMS.

If you have multiple product lines, you can maintain different namespaces for them. The features, products, and product suites defined in a namespace are available only to those users who have permissions for that namespace. Users with roles that have entitlement-related permissions (such as order takers) can access these items from all namespaces.

     

Namespace

(for Sentinel LDK)

Also known as Batch Code

A Sentinel EMS namespace is known as a batch code in Sentinel LDK.

A namespace (batch code) represents your company's unique vendor code. When you order Sentinel protection keys from Thales, you specify your namespace, which is both written to the keys before dispatch and printed on the outside of each Sentinel HL key. Your company can have one or more namespaces. The namespace for Sentinel protection keys with a demo vendor code is DEMOMA.

In Sentinel EMS, a namespace also acts as a workspace, differentiating between separate storage locations, similar to those that are designated for use with Sentinel RMS. If you have multiple namespaces, the features, memory files, and products in each namespace are available only to those users who have permissions for that namespace. Users with roles that have entitlement-related permissions (such as order takers) can access these items from all namespaces.

     
Network A type of license (in contrast with a standalone license). Described above in Auto-checkout.
     
Network User Limit

The maximum number of users a network license can support concurrently.

     
Node Locked Described below (see Trial Standalone Node Locked).
     
Output Type

Refers to the format of generated RMS licenses, such as, encrypted and readable.

     
Primary Criteria and Secondary Criteria

For server-locked licenses, you can specify two sets of locking criteria known as primary and secondary locking criteria. The licensed application will run if any of the locking criteria is matched.

     
Private Vendor Info See Vendor Info below.
  Product A product is a software application that can be ordered or licensed. It is a combination of individual features and is associated with one or more license models.
  Product Family

Group of products derived from a common product platform. These goods or services use similar or same production processes, have similar physical characteristics, and may share customer segments, distribution channels, pricing methods, promotional campaigns, and other elements of the marketing mix. Products comprising a family are usually priced and discounted as a package. Several product families make up a product portfolio.

 

  Product Key A unique string that identifies a Glossary in an entitlement. Product keys can be used to log in and activate the relevant line item. Every product key is unique across entitlements.
     
Product Suite A product suite* is a combination of products that are meant to be sold together. The products included in a product suite* may be functionally similar or complementary. A product suite* can include one or more products from its parent namespace.
     
Public Vendor Info See Vendor Info.
  Reports Sentinel EMS reports provide access to selected current information from the Sentinel EMS database. Different predefined reports are available to meet various requirements. The reports provide information in tabular form and, where applicable, in a graphical chart.
     
  Revocation or License Revocation

Revocation is a process by which a software vendor allows return of licenses by the customer.

NOTE   Third-party licenses can be revoked using the Revoke Immediately option.

     
Revocation Tool – command-line based A command-line tool that software vendors can use to configure license revocation on end users' computer.
     
Revocation Tool – GUI based A GUI-based tool that software vendors can use to configure license revocation on end users' computer.
     
Sentinel HL key

The hardware-based protection and licensing component of Sentinel—a physical Sentinel HL key (such as a dongle).

>Sentinel HL Basic key. Standard Sentinel HL local key that is used to protect software, and has a perpetual license. This key:

Does not have any memory functionality.

Does not support concurrency or remote desktops.

Does not support V‑Clock.

>Sentinel HL network key. Any Sentinel HL key that supports concurrency. This includes the following keys:

Sentinel HL Net key

Sentinel HL NetTime key

Any Sentinel HL (Driverless configuration) key except for Sentinel HL Basic keys

>Sentinel HL (Driverless configuration) key Sentinel HL key that does not require the Run-time Environment to protect an application or data file on a Windows machine.

>Sentinel HL (HASP configuration) key. Sentinel HL key that is fully compatible with protected applications that require the older HASP HL keys.

For more information about Sentinel HL keys, see Sentinel LDK Software Licensing and Protection Guide and Sentinel Hardware Protection Keys.

     
Sentinel SL key

The software-based protection and licensing component of Sentinel—a virtual Sentinel HL key. Product activation is instantaneous. End users can immediately start using the software with its fully-licensed functionality. The online connection with end users can enable user registration data to be collected and used for marketing purposes.

     
Standalone

A type of license that is intended for single computers.

 

Start Date (for an entitlement line item)

The date before which no operations, such as login by product key, activation, or revocation*, are allowed on an entitlement Glossary.

NOTE   As one line item can have multiple licenses for multiple features, specifying a license start date different from the line item start date helps in addressing different start dates for multiple features.

  Start Date
(for an entitlement)
The date before which operations, such as login by EID, activation, or revocation*, are not allowed on an entitlement.
     
Trial duration

The time period (defined in the number of days or hours) to allow the use of the licensed application.

     
Trial Standalone Node Locked

A Sentinel RMS license model, which is all of the following:

>Trial: A temporary license that allows software usage for fixed days or hours starting from the first use.

>Standalone: A license typically meant for non-networked environments (such as home users).

>Node locked: Means the software can only be used on one machine.

     
User Limit

>For Network Licenses: Specifies the number of tokens (concurrent instances) a license can have.

>For Standalone Licenses: Setting a user limit for standalone licenses will limit the number of licensed features used concurrently. For example, a customer purchased a licensed application, which has five features licensed and hard limit is set to three. This limit will ensure that not more than three licensed features are used concurrently. However, since standalone licenses can be used by any number of local applications (instances), the hard limit set may not hold much meaning, especially in desktop environments.

It is useful for platforms where the whole OS is treated as a single application and so all tasks/processes share memory space. In such environments user limit can be used with standalone licenses for controlling features of a device.

V2CP file

Vendor-to-Customer package file. A file that contains license information for an activated product. The V2CP file is available for download at the end of the activation process. For offline activations, the vendor or end user (customer) uses the V2CP file to apply the encoded license on the relevant computer. V2CP files can safely be sent by email.

You can customize the V2CP file name format, if needed. For details, see License File Name (V2CP) Configuration.

     
Vendor comments Refers to comments that can be specified by the software vendor to be appended at the end of a Sentinel RMS license.
     
Vendor Info

Refers to miscellaneous information that a software vendor can include as a part of the license code for identification.

The private vendor information will remain encrypted in all license formats (whether readable or encrypted). The public vendor information will remain encrypted in encrypted licenses and readable in readable licenses, respectively.

     
Virtual Clock Virtual clock that is available in Sentinel SL keys and Sentinel HL (Driverless configuration) keys. In Sentinel LDK, also known as V-Clock.

<5.5Preview>

Webhook Notifies client applications about an update to a Sentinel EMS entity.