SUBSCRIBE TO TMCnet
TMCnet - World's Largest Communications and Technology Community

CHANNEL BY TOPICS


QUICK LINKS




5 Product Activation Alternatives for Disconnected Environments

Software Licensing Featured Articles

5 Product Activation Alternatives for Disconnected Environments

January 06, 2014
By Jacqueline Lee, Contributing Writer

Software companies operate in an increasingly complex business environment. Virtualized environments now allow businesses to operate applications both on-premises and off-premises, and cloud licensing thus comes in a range of models that can be difficult to track.


Also, the growth of employee mobile device use, communication between branch offices and siloed zones within network environments can complicate software sharing in a way that puts companies in danger of violating their end-user agreements.

Instead of only offering straight-up product activation for licensing, application producers can offer alternatives ranging from support for simple disconnected environments to controls that are so tight that no digital activation record exists.

As described in a Flexera Software blog post, here are some available license activation options for software vendors in such disconnected scenarios:

1. Sneaker-net activation

Sneaker-net activation allows an employee to save an encrypted product serial number and locking parameters within the fingerprint file. When the user uploads the fingerprint file onto an endpoint, the entitlement system generates the appropriate activation record for the target system. Sneaker-net is the most commonly used activation method for disconnected systems, but it becomes inefficient when dealing with a large volume of requests.

2. Secure proxy activation

Network administrators can route activation through a secure proxy server. Instead of direct activation between the network and the endpoint, the application connects to a proxy server for license activation and relocation. This activation solution works when IT maintains separate zones within a network for security reasons.

3. Volume activation and transfer

Instead of "calling home" to activate a license, the endpoint's request is directed to a dedicated local license server that can automatically activate the license. The local license server keeps activation requests from overwhelming the network administrator.

4. Self-service

The end user receives activation keys during the ordering process, inputs the codes into a Web portal and receives an application license. It's similar to sneaker-net activation except that instead of receiving a license from an Internet terminal, the end user downloads the license from the portal.

5. Keyboard only

Keyboard-only activation protects licenses when security is critical. The endpoint user activates the license after receiving the information over e-mail, snail mail or hand carry. The activation information is inputted using the keyboard, and no digital record exists. Activation information can also be carried on a dongle that has a unique, readable signature. The application only runs when both the dongle signature and the activation information are present.

As application producers deliver software in multiple environments with multiple security levels, products like FlexNet Licensing from Flexera enable producers to offer flexible product activation options for their customers while preventing losses from agreement violations.




Edited by Blaise McNamee

Software Licensing Homepage





Technology Marketing Corporation

2 Trap Falls Road Suite 106, Shelton, CT 06484 USA
Ph: +1-203-852-6800, 800-243-6002

General comments: [email protected].
Comments about this site: [email protected].

STAY CURRENT YOUR WAY

© 2024 Technology Marketing Corporation. All rights reserved | Privacy Policy