RLM License Administration Manual Page 2 of 136 Revision History

Total Page:16

File Type:pdf, Size:1020Kb

RLM License Administration Manual Page 2 of 136 Revision History RLM License Administration RLM v14.2 June, 2021 Table of Contents Section 1 – License Management Introduction Introduction ......................................................................................... 5 What's New in RLM v14.2 ................................................................. 7 Section 2 – License Administration Basics Installing an RLM-licensed Product …............................................. 9 The License Server ............................................................................. 11 The License File ................................................................................... 20 HOST line...................................................................................... 21 ISV line.......................................................................................... 21 LICENSE line............................................................................... 23 UPGRADE line............................................................................. 34 CUSTOMER line.......................................................................... 37 The License Environment............................................................ 38 License Administration Tools ............................................................ 40 Client Authentication.......................................................................... 48 The RLM Web Server......................................................................... 49 The RLM Options File ....................................................................... 62 The ISV Options File .......................................................................... 68 Section 3 – Advanced Topics Token-Based Licenses ........................................................................ 82 How to Queue for Licenses ................................................................ 85 How to use Roaming Licenses ........................................................... 86 Failover License Servers .................................................................... 90 Transferring Licenses to Another Server ........................................ 93 Section 4 – Reference Material RLM Environment Variables ........................................................... 97 RLM Performance Testing ............................................................... 100 Reportlog File Format ....................................................................... 103 RLM hostids ...................................................................................... 115 Optional hostid Installation Instructions ........................................ 117 IPv6 Considerations .......................................................................... 118 RLM Status Values ........................................................................... 119 RLM Version History ....................................................................... 126 RLM License Administration Manual Page 2 of 136 Revision History ................................................................................ 135 RLM License Administration - Copyright (c) 2006-2021, Reprise Software, Inc RLM - Reprise License Manager - Copyright (c) 2006-2021 Reprise Software, Inc Reprise License Manager TM Copyright © 2006-2021, Reprise Software, Inc. All rights reserved. Detached Demo, Open Usage, Reprise License Manager, RLM Activation Pro, RLM, RLM-Embedded and Transparent License Policy are all trademarks of Reprise Software, Inc. RLM contains software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org) RLM contains software (the GoAhead WebServer) developed by GoAhead Software, Inc. RLM License Administration Manual Page 3 of 136 Section 1 – License Management Introduction RLM License Administration Manual Page 4 of 136 Introduction About this Manual This manual describes setup and maintenance of the RLM licensing system, and as such it is intended for license administrators and users at organizations which have purchased software which uses the Reprise License Manager. This manual explains how to install and configure the licensing system included with your software. Introduction To RLM You are most likely reading this manual because one or more of your software vendors (ISVs) have included RLM in their product(s) to enforce their license agreements. This manual describes the components of RLM that you need to understand in order to accomplish day-to-day license administration tasks. RLM allows your organization to know that you are using purchased software within the license limits set by your ISV. In addition, RLM collects usage information (at your option) for later reporting and analysis. This usage information is provided in a fully-documented report log format, described in Appendix A of this manual. When one of your ISVs delivers software to you that incorporates RLM, in addition to the normal application files, you will receive some additional RLM components: • the rlm (generic) license server provided by Reprise Software, called "rlm" on Unix systems, or "rlm.exe" on Windows. This is the same for every ISV who uses RLM. • the rlm utilities ("rlmutil" on Unix, "rlmutil.exe" on Windows) provided by Reprise Software. This is the same for every ISV who uses RLM. • A custom license server, built from components from Reprise Software by your ISV. This server will have a different name for each ISV. • a license file to describe your rights to the product. This license file is unique to your site. In addition to these components which your ISV supplies, you can create an ISV options file to control various aspects of operation of each licensed product. This options file is described later in this manual. In addition, an RLM options file allows you to restrict access to various administration commands. RLM is a client-server system, with license requests transmitted over TCP/IP from the software application to a license server that controls license usage rights. What sets RLM apart? RLM was designed from the start to emphasize openness, transparency, and simplicity. RLM is open because we publish the format of our report log file, so that you can always examine and generate usage reports on licensing activity from the RLM servers. RLM License Administration Manual Page 5 of 136 RLM is transparent in the sense that we do not allow "back doors" which lead to unique behaviors from one ISV to another. In addition, we have removed policy from the application code, and placed it into the license key itself, so that everyone will be able to understand the license terms without having to understand a particular implementation by an ISV. RLM is simple because we include functionality like truly automatic selection of license servers from a set of multiple, independent servers. In older license management systems, the ISV ends up writing much code to manage multiple license servers. This is handled by RLM itself. Software License Management Basics RLM is similar in structure to most popular license managers. RLM consists of 3 major components: 1. a client library 2. a license server (RLM has 2 license servers - a generic server called rlm and an ISV- specific server.) 3. a text file which describes the licenses granted (the license file). Your ISVs application is linked with the client library which provides access to the license management functions. The license server is used for floating licenses and logging of usage data. You, as a License Administrator, have the ability to control certain aspects of the license server's operations by specifying options in a file called the ISV Options File. The RLM client library (linked into your ISVs application) and the license server are both controlled by license authorizations stored in a text file called the license file. Most license managers provide APIs with calls to control many of the aspects of licensing behavior, as well as options within the license servers to control licensing behavior. The design philosophy of RLM is to preserve the simplicity of the system for both ISVs and License Administrators by avoiding all unnecessary options in the client library and the license servers and moving all these options to the license file, where they are visible and understandable by everyone. In general, license policy should be kept out of the application and the license server, and placed into the license itself. This makes for a more understandable licensing system for both ISVs and License Administrators. The API is simpler, and the license server performs in a more standard way from ISV to ISV. This prevents license management confusion by customers. We learned this the hard way when we supported hundreds of customers in the past, and applied these lessons to the design of RLM. Table of Contents RLM License Administration Manual Page 6 of 136 What's New in RLM v14.2 This section lists the new features in RLM v14.2, along with pointers to the relevant sections in the manual. • In rlmstat, he first line of the product information will contain the server's license pool #, and an ID, if specified. See License Administration Tools on page 40 for more information.. • The license environment variable (ISV_LICENSE or RLM_LICENSE) now has whitespace trimmed from the start and end of the string. See The License Environment on page 38 for more information. • rlm -verify will now cause the ISV servers to verify their licenses, then exit. See The License Server on page 11 for more information. • If rlm is started with
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • What Is Peer-To-Peer File Transfer? Bandwidth It Can Use
    sharing, with no cap on the amount of commonly used to trade copyrighted music What is Peer-to-Peer file transfer? bandwidth it can use. Thus, a single NSF PC and software. connected to NSF’s LAN with a standard The Recording Industry Association of A peer-to-peer, or “P2P,” file transfer 100Mbps network card could, with KaZaA’s America tracks users of this software and has service allows the user to share computer files default settings, conceivably saturate NSF’s begun initiating lawsuits against individuals through the Internet. Examples of P2P T3 (45Mbps) internet connection. who use P2P systems to steal copyrighted services include KaZaA, Grokster, Gnutella, The KaZaA software assesses the quality of material or to provide copyrighted software to Morpheus, and BearShare. the PC’s internet connection and designates others to download freely. These services are set up to allow users to computers with high-speed connections as search for and download files to their “Supernodes,” meaning that they provide a How does use of these services computers, and to enable users to make files hub between various users, a source of available for others to download from their information about files available on other create security issues at NSF? computers. users’ PCs. This uses much more of the When configuring these services, it is computer’s resources, including bandwidth possible to designate as “shared” not only the and processing capability. How do these services function? one folder KaZaA sets up by default, but also The free version of KaZaA is supported by the entire contents of the user’s computer as Peer to peer file transfer services are highly advertising, which appears on the user well as any NSF network drives to which the decentralized, creating a network of linked interface of the program and also causes pop- user has access, to be searchable and users.
    [Show full text]
  • IPFS and Friends: a Qualitative Comparison of Next Generation Peer-To-Peer Data Networks Erik Daniel and Florian Tschorsch
    1 IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks Erik Daniel and Florian Tschorsch Abstract—Decentralized, distributed storage offers a way to types of files [1]. Napster and Gnutella marked the beginning reduce the impact of data silos as often fostered by centralized and were followed by many other P2P networks focusing on cloud storage. While the intentions of this trend are not new, the specialized application areas or novel network structures. For topic gained traction due to technological advancements, most notably blockchain networks. As a consequence, we observe that example, Freenet [2] realizes anonymous storage and retrieval. a new generation of peer-to-peer data networks emerges. In this Chord [3], CAN [4], and Pastry [5] provide protocols to survey paper, we therefore provide a technical overview of the maintain a structured overlay network topology. In particular, next generation data networks. We use select data networks to BitTorrent [6] received a lot of attention from both users and introduce general concepts and to emphasize new developments. the research community. BitTorrent introduced an incentive Specifically, we provide a deeper outline of the Interplanetary File System and a general overview of Swarm, the Hypercore Pro- mechanism to achieve Pareto efficiency, trying to improve tocol, SAFE, Storj, and Arweave. We identify common building network utilization achieving a higher level of robustness. We blocks and provide a qualitative comparison. From the overview, consider networks such as Napster, Gnutella, Freenet, BitTor- we derive future challenges and research goals concerning data rent, and many more as first generation P2P data networks, networks.
    [Show full text]
  • Worksoft Certify Installation Guide
    Installation Guide Worksoft Certify® Worksoft, Inc. · 15851 Dallas Parkway, Suite 855 · Addison, TX 75001 www.worksoft.com · 866-836-1773 Worksoft Certify Installation Guide Version 11 © Copyright 2019 by Worksoft, Inc. All rights reserved. Worksoft is a business name of Worksoft, Inc. Information in this document is subject to change and revision without notice. The software described herein may only be used and copied as outlined in the Software License Agreement. No part of this manual may be reproduced by any means, electronic or mechanical, for any purpose other than the purchaser’s personal use, without prior written permission from Worksoft. Worksoft provides this documentation “as is” without warranty of any kind, either express or implied. Worksoft may revise information in this document without notice and does not represent a commitment on the part of Worksoft, Inc. Worksoft, Inc. may have patents or pending patent applications covering subject matter in this document. The furnishing of this document does not give you any license to these patents except as expressly provided in any written license agreement from Worksoft, Inc. Patent Worksoft Certify® U.S. Patent No. 7,600,220 Trademarks Worksoft Certify® is a registered trademark of Worksoft, Inc. Microsoft Office® is a registered trademark of Microsoft Corporation in the United States and/or other countries. Microsoft® is a registered trademark of Microsoft Corporation in the United States and/or other countries. All other trademarks and trade names mentioned in this guide are the property of their respective owners. Third-Party Copyrights This product includes software developed and copyrighted by the following persons or companies: Reprise License Manager™ Data Dynamics, Ltd., ActiveReports Microsoft® Enterprise Library Infragistics® NetAdvantage® Apache Logging Services log4net Antlr ANTLR The above copyright holders disclaim all responsibility or liability with respect to its usage or its effect upon hardware or computer systems.
    [Show full text]
  • Validation Rules for Enhanced Foxy P2P Network Investigations Ricci Ieong, Kam-Pui Chow
    Validation Rules for Enhanced Foxy P2P Network Investigations Ricci Ieong, Kam-Pui Chow To cite this version: Ricci Ieong, Kam-Pui Chow. Validation Rules for Enhanced Foxy P2P Network Investigations. 10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.73- 83, 10.1007/978-3-662-44952-3_6. hal-01393761 HAL Id: hal-01393761 https://hal.inria.fr/hal-01393761 Submitted on 8 Nov 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Chapter 6 VALIDATION RULES FOR ENHANCED FOXY P2P NETWORK INVESTIGATIONS Ricci Ieong and Kam-Pui Chow Abstract Experiments with the Foxy P2P network have demonstrated that the first uploader of a file can be identified when search queries are sub- mitted to all the network nodes during initial file sharing. However, in real Foxy networks, file search queries are not transmitted to the entire Foxy network and this process may not identify the first uploader. This paper presents a set of validation rules that validate the observed first uploader. The validation rules define the seeder curve that consistently describes the number of uploaders over time.
    [Show full text]
  • Installation Guide Release 1.2.5 Contents
    Installation Guide Release 1.2.5 Contents 1 Requirements 1 1.1 Software dependencies........................................1 2 Installation 2 2.1 Obtain the Vortex Platform installation file.............................2 2.2 Run the Vortex Platform Setup Wizard...............................2 2.3 Vortex Web directories organization.................................9 2.4 Complete the installation for an Apache Maven build system.................... 10 2.5 Uninstalling Vortex Platform..................................... 10 3 Licensing Vortex Web 14 3.1 General................................................ 14 3.2 Development and Deployment Licenses............................... 14 3.3 Installing the License File...................................... 14 3.4 Running the License Manager Daemon............................... 15 3.5 Utilities................................................ 16 4 Compiling the examples 17 5 Troubleshooting 18 6 Contacts & Notices 19 6.1 Contacts............................................... 19 6.2 Notices................................................ 19 i CHAPTER 1 Requirements 1.1 Software dependencies 1.1.1 Required before installation The following software must be installed on your host system before installing Vortex Web: • An Oracle Java Development Kit (JDK) v7 minimum (ensure that JAVA_HOME is defined and that the java executable is in your PATH). 1.1.2 Other noteworthy dependencies Vortex Web uses the following open source libraries, which are automatically installed by the Vortex Setup Wizard if they
    [Show full text]
  • Setting up Site Licenses
    XC LICENSE SERVER Setting Up the Site Licenses INTRODUCTION To complete the installation of an XC Site License, create an options file that includes the Host Name (computer’s name) of each client machine. Save the options file as microchip.opt in the same directory as the license file. For example, if you have the Windows® version of the Network License Server installed, the path to the options file would be: C:\ProgramData\Microchip\xclm\license\microchip.opt In the options file, create a Host Name Group that lists all of the Host Names for the clients that will have access to the license. For example: HOST_GROUP xc8_users <hostname> <hostname2> ... The xc8_users is an arbitrary name. You can have multiple HOST_GROUP lines with the same name in the options file, and the server will concatenate the lists. To use the group, add: INCLUDE swxc8n-pro host_group xc8_user Where the swxc8n-pro is the product name in the license file, host_group specifies that a host group will be used, and xc8_user is the HOST_GROUP name. Possible product names are given in the table below. Product Name swxc8n-pro swxc16n-pro swxc32n-pro swxc32n-cpp For additional information see: • Starting the License Server • Running the License Server as a Service 2015 Microchip Technology Inc. DS50002337A-page 1 XC License Server STARTING THE LICENSE SERVER The installer does NOT start the server for you. Therefore, you MUST follow these instructions to start a network license server. To start the network license server, you need to have a Command or Terminal window open to the bin directory in the path that you selected to install the license server.
    [Show full text]
  • Smart Regulation in the Age of Disruptive Technologies
    SMART REGULATION IN THE AGE OF DISRUPTIVE TECHNOLOGIES Andrea Renda CEPS, Duke, College of Europe 13 March 2018 A New Wave of Regulatory Governance? • First wave: structural reforms (1970s-1980s) • Privatizations, liberalizations • Second wave: regulatory reform (1980s-1990s) • Ex ante filters + “Less is more” • Third wave: regulatory governance/management (2000s) • Policy cycle concept + importance of oversight • Better is more? Alternatives to regulation, nudges, etc. • Fourth wave: coping with disruptive technologies? (2010s) Competition Collusion Access Discrimination Digital Technology as “enabler” Jobs Unemployment Enforcement Infringement Key emerging challenges • From national/EU to global governance • From ex post to ex ante/continuous market monitoring (a new approach to the regulatory governance cycle) • Need for new forms of structured scientific input (a new approach to the innovation principle, and to innovation deals) • From regulation “of” technology to regulation “by” technology • A whole new set of alternative policy options • Away from neoclassical economic analysis, towards multi-criteria analysis and enhance risk assessment/management/evaluation Alternative options & Problem definition Regulatory cycle Impact Analysis Risk assessment, Risk management Evaluation dose-response Emerging, disruptive Policy strategy and Learning technology experimentation • Scientific input and forecast • Mission-oriented options • Ongoing evaluation • Mission-led assessment • Pilots, sprints, sandboxes, tech- • Pathway updates • Long-term
    [Show full text]
  • Pure Software in an Impure World? WINNY, Japan's First P2P Case
    20 U. OF PENNSYLVANIA EAST ASIA LAW REVIEW [Vol. 8 ! ! ! ! [This Page Intentionally Left Blank.] ! Pure Software in an Impure World? WINNY, Japan’s First P2P Case Ridwan Khan* “Even the purest technology has to live in an impure world.”1 In 2011, Japan’s Supreme Court decided its first contributory infringement peer-to-peer case, involving Isamu Kaneko and his popular file-sharing program, Winny. This program was used in Japan to distribute many copyrighted works, including movies, video games, and music. At the district court level, Kaneko was found guilty of contributory infringement, fined 1.5 million yen, and sentenced to one year in prison. However, the Osaka High Court reversed the district court and found for Kaneko. The High Court decision was then affirmed by the Supreme Court, which settled on a contributory infringement standard based on fault, similar to the standard announced by the United States Supreme Court in MGM Studios * The author would like to thank Professor David Shipley of the University of Georgia for his guidance in preparing this article. He would also like to thank Professor Paul Heald of the University of Illinois College of Law for additional help. Finally, the author expresses gratitude to Shinya Nochioka of the Ministry of Finance and Yuuka Kawazoe of Osaka Jogakuin for their friendship and advice on Japanese legal matters and language through the two years spent researching and writing this article. All mistakes, however, are the responsibility of the author. All translations of Japanese language materials into English are by the author. 1 Benjamin Wallace, The Rise and Fall of Bitcoin, WIRED MAGAZINE (Nov.
    [Show full text]
  • Frequently Asked Questions
    Copyright & File-Sharing FREQUENTLY ASKED QUESTIONS WHAT IS COPYRIGHT? BUT I BOUGHT IT. WHY CAN’T I SHARE IT? WHAT CAN I DO TO AVOID COPYRIGHT Copyright refers to the legal rights creators have There is a difference between using and distributing INFRINGEMENT? over the use, distribution, and reproduction of copyrighted materials. Purchasing songs, movies, or Download content from legitimate sources and do original work (music, movies, software, etc.). software from legitimate sources does not give you the not share copyrighted materials online. Uninstall Copyright infringement is the unlawful use of any right to share these materials over the Internet or make P2P applications (e.g., Popcorn Time, BitTorrent, material protected under copyright law. Common copies for others. When you purchase a Peer-to-Peer Vuze), which may be sharing your files without violations include downloading ‘pirated’ copies of (P2P) program (e.g., Frostwire, BitTorrent, Vuze), you your knowledge. Do not share your NetID and copyrighted materials or sharing files not intended only buy the software, not any files you download or password with anyone. Keep your computer for you to distribute. share using this software. up-to-date with the latest security patches and anti-virus software. HOW DO I KNOW IT’S COPYRIGHTED? DOES UMASS IT MONITOR MY INTERNET Assume all materials are copyright-protected CONNECTION? HOW CAN I LEGALLY DOWNLOAD CONTENT? unless you created them or you have received the No. We do not monitor the contents of your computer Services like Amazon, iTunes, and eMusic offer author’s explicit permission to distribute them. All or issue copyright complaints.
    [Show full text]
  • GASP Installation
    GASP Installation AeroSoft, Inc. 2000 Kraft Drive, Suite 1400 Blacksburg, VA 24060-6363 (540) 557-1900 (540) 557-1919 (FAX) http://www.aerosoftinc.com Chapter 1 Getting Started 1.1 Overview of Steps The following list provides a general overview of the steps needed to install GASP. 1. Downloading and installing the software 2. Setting any necessary environment variables 3. Generating your machine's hostId 4. Requesting a license key 5. Installing the license 6. Running the license manager 7. Documentation and tutorial information The GASP software package can be installed on either linux or windows based platforms. Depending on the platform, the user will download either specific linux files or windows files. The specifics of each are explained in the following sections. Note: If a GASP license has already been installed on the local net- work, the user can skip steps 3 to 6. For installations where the license server is run on a different machine, the aerosoft/etc/keys/gasp.lic file should be modified to reflect the correct license server host. This is done using a text editor and changing \localhost" to the license server host name. 1 2 GASP Version 5, AeroSoft, Inc. 1.2 Installing GASP on Linux Platforms For linux installation, the user will need to install a common (platform independent) file archive, and a binary (platform specific) file archive. Both the common file archive and platform file archive help create the aerosoft directory (for more information about the directory structure, see the GASP users manual. The common file archive contains files that are independent of platform (i.e., operating system and hardware).
    [Show full text]
  • Internet Contract
    Diocese of Youngstown Office of Catholic Schools Our Lady of Peace Revised 2005 Student use of the INTERNET Educational Acceptable Use Policy and Agreement Student use of the Internet on school computer hardware, on school premises, or through school obtained accounts, both on-site and through remote connections, is governed in accordance with Diocesan Policy, the policies of the Administrators’ Handbook and the Student/ Family Handbook. The MISSION of OLOP school Technology Committee, working in partnership with faculty, students and administrators, is to research and deploy common everyday technology into the infrastructure in such a way as to benefit the students and staff not by teaching technology, but teaching how to utilize existing technologies to gain a richer learning experience and understanding of how to most effectively utilize the technology that is now so common place in our everyday lives. Please read the following carefully before signing the attached agreement. INTRODUCTION: The Our Lady Of Peace School (OLOP) offers world wide web Internet access to your child at his/her school. OLOP provides computer equipment, computer services, and Internet access to its students and staff for educational purposes only, offering vast, diverse, and unique resources to promote educational excellence at OLOP School. The purpose of this document is to inform parents, guardians and students and all users of the availability of the Internet resources, as well as the rules governing its use, and to obtain express parental or guardian permission for an individual student to use technology and the Internet while at school. The computer system and all computer software and hardware is the property of the school.
    [Show full text]