Appendices

In this section:

>Understanding the Sentinel LDK Master License – Describes the modules that are available to software vendors in the Sentinel LDK Master license.

>Sentinel LDK Run-time Network Activity – Describes the type of network activity that occurs in the communication between the Sentinel License Manager and a protected application, and between the local Sentinel License Manager and remote Sentinel License Managers.

> Maximum Number of Features in a Sentinel HL Key Maximum Number of Features in a Sentinel HL Key – Describes considerations that determine the maximum number of Features that can be contained in a Sentinel HL key.

>How Sentinel LDK Detects Machine Cloning – Describes the techniques employed by Sentinel LDK to prevent unauthorized use of protected software when the virtual machine on which the software is installed is cloned.

>How Sentinel LDK Protects Time-based Licenses With V-Clock – Describes the technology used in Sentinel LDK to prevent a user from extending the duration of a software license that is locked to a Sentinel SL key.

>How to Optimize Performance for Sentinel LDK Run‑time Environment – Describes how you can optimize the performance in the Sentinel LDKRun-time Environment

> Protecting Applications in Docker Containers – Describes how to protect applications that execute in a Docker container.

> Protecting Applications in Linux LXC Containers – Describes how to protect applications that execute in an LXC container under Linux.

>Troubleshooting – Provides a checklist to help you solve some of the most common problems that your customers might encounter when using the Sentinel HL keys. Also includes a list of specific problems you or your customers may experience, together with the solutions.

> – Provides a comparison of the functionality between Sentinel LDK-EMS and Sentinel EMS. This appendix assists vendors who want to choose between these two products or who are considering migrating from Sentinel LDK-EMS to Sentinel EMS.