Duration—The time period for which the license is valid, for example:
|
Start Date: The date (day, month, and year) and time (hours and minutes) when the license becomes active and usable.
End Date: The date (day, month, and year) and time (hours and minutes) when the license expires, and the licensed software can no longer be run.
Never Expires: A flag that configures the license to last indefinitely (perpetual license).
|
|
Trial Period: Allows the licensed software to be run for a fixed number of:
>Trial Duration Days: Calendar days beginning from the first use of the license.
>Trial Duration Hours: Total number of hours (cumulative elapsed hours) for which the application can be used.
|
|
Limits—The various limits that control the application access and behavior, for example:
|
User Limit: The maximum number of users in a network who can run the licensed software simultaneously. If the user limit is ‘N’, then ‘N’ number of users can run the licensed software concurrently. However, when the N+1 user or machine tries to run the application, the request will be denied because all licenses are in use by other users. |
|
Soft User Limit: A sub-limit, lower than the user limit, that can also be set to generate notification alerts. For example, when the sub-limit is reached, the end user can be notified that RMS License Manager is close to running out of licenses. |
Policy—Specifies the choices made by the vendor regarding certain violations, for example:
|
Time Tampering: The concept of time-based licensing loses most of its relevance when an end user has the freedom to roll the system clock back to artificially extend the license duration. To safeguard against this, you can enable time tamper detection. When enabled, if the system clock is rolled back beyond the defined tolerance period (24 hours, by default), then the licensed application returns an error.
VM Detection: Virtual machine environments open up the possibility of license misuse either inadvertently or otherwise. To handle such scenarios, you can enforce a policy through the license to deny or allow application usage when a VM is detected on a machine.
|
|
Locking—Specifies the fingerprinting attributes of a license, for example:
|
When a license is restricted to specific permitted machines, clients or License Managers, the corresponding locking information (such as IP address, host name, disk ID, or a custom criterion such as the display card) is embedded in the license code. When locking information in the license does not match the machine, the licensed application fails to run. |
|
Vendor Information—Specifies the additional information that you may want to include in a license code, for example:
|
Vendor information can include a customer reference number, a purchase order, or any information that is used as part of a customized license scheme. The licensed application can retrieve the vendor information at any time. Vendor information can be kept encrypted or as readable plain text within a license string. |
|
Miscellaneous Network Licensing Attributes—Specifies network licensing-related options, for example:
|
|
Redundancy: A pool of License Managers that provide failover if the primary RMS License Manager goes down.
License Commuting: Allows your end user to detach a network license token from RMS License Manager and use it on a remote machine for a specified number of days and then check in the license token on return.
Grace Period: The duration (days or hours) for which a network application can run even when the
network is not accessible. The grace period provides the convenience of using the application under unforeseen circumstances, like network outages.
License Holding: Allows holding a license token for some time after it is released by a specific user. During that time, only the original requester of the license can be granted the license again. This may be useful for applications that are typically short-lived, such as compiling or building a project.
|
(Lease network mode only)
|
License Sharing: Allows multiple instances of a licensed application to share the same license token. You can specify additional limits on how many copies of your software can share a single license token. |
|
Lease-related Licensing Attributes—for example, the frequency of renewing lease: |
|
Lease Duration: The duration of the lease during which the RMS License Manager can remain disconnected from SCC. Optionally, you can choose the lease duration the same as the license duration.
Lease Renewal Frequency: The time after which the assigned machine must connect to the SCC to renew the lease. You can also skip unnecessary lease renewals and opt for renewals only in the case of entitlement updates.
Fingerprint Registration: Only the machine registered (by providing fingerprints) is allowed to obtain the license. It can be a standalone system or a server that also hosts the RMS License Manager. For example, in the case of a standalone lease, a system administrator on the customer site can specify the fingerprints of machines that are permitted to obtain the lease.
|
|
Usage-related Licensing Attributes—for example, whether to collect usage or not? |
|
Collect Usage: Specifies whether the client node collects usage data for reporting and billing. Applicable to the on-premises and lease modes.
|
|
Usage Synchronization Frequency: The time after which the usage data collected by the client machine is synchronized with SCC. The default is 24 hours.
|
|