Protection Key User Guide en V1-0

Embed Size (px)

Citation preview

  • 8/6/2019 Protection Key User Guide en V1-0

    1/17

    July 2009

    Protection Key UtilityReference Manual and

    User Guide

  • 8/6/2019 Protection Key User Guide en V1-0

    2/17

  • 8/6/2019 Protection Key User Guide en V1-0

    3/17

    Copyright CYME International T&D Inc.

    All Rights Reserved

    No part of this publication may be reproduced, or transmitted in any form

    or by any means without the written permission of CYME International T&D.

    Possession or use of the CYME software described in this publication isauthorized only pursuant to a valid written license agreement from CYME.

    CYME makes no warranty, either expressed or implied, including but notlimited to any implied warranties of merchantability or fitness for a particularpurpose, regarding these materials and makes such materials available solely onan "as-is" basis.

    CYME International T&D reserves the right to revise and improve itsproducts as it sees fit. The information in this manual is subject to modificationwithout notice.

    While every precaution has been taken in the preparation of this manual,CYME assumes no responsibility for errors or omissions, or for damages resultingfrom the use of the information contained herein.

    CYME International T&D Inc.1485 Roberval, Suite 104St. Bruno QC J3V 3P8

    Canada

    Tel.: (450) 461-3655Fax: (450) 461-0966

    Canada & United States: Tel.:1-800-361-3627

    Internet : http://www.cyme.comE-mail: [email protected]

    Other Trademarks: The names of all products and services other than CYMEsmentioned in this document are the trademarks or trade names of the respective owners.

  • 8/6/2019 Protection Key User Guide en V1-0

    4/17

  • 8/6/2019 Protection Key User Guide en V1-0

    5/17

    Protection Key Utility Reference Manual and Users Guide

    TABLE OF CONTENTS 1

    Table of Contents

    Chapter 1 Getting Started............................................................................................11.1 Overview of the Protection Key Utilities (PKU).............................................1

    1.1.1 Computer System Requirements .....................................................11.1.2 Installing the Protection Key Utilities ................................................21.1.3 Running the Protection Key Utilities .................................................3

    Chapter 2 Protection Key Utilities Interface..............................................................52.1 The Licenses Window ..................................................................................52.2 The Detachable Licenses Window ...............................................................62.3 The Client Settings Window .........................................................................72.4 The Server Settings Window ........................................................................82.5 The Registration / Firmware Window ...........................................................8

    2.5.1 Registration Number ........................................................................82.5.2 C2V / V2C File Exchange System ...................................................9

    Chapter 3 Advanced Configuration of the Protection Key ....................................11

  • 8/6/2019 Protection Key User Guide en V1-0

    6/17

  • 8/6/2019 Protection Key User Guide en V1-0

    7/17

    Protection Key Utility Reference Manual and Users Guide

    CHAPTER 1 GETTING STARTED 1

    Chapter 1 Getting Started

    1.1 Overview of the Protection Key Utilities (PKU)

    The protection key utilities program is a dedicated interface created to assist the user inconfiguring access to the CYME software applications.

    Two different types of protection keys are available: a hardware USB physical keyconnected behind the computer or a software license key residing in the memory. Both of thesetypes of keys are available as a stand alone version (used only on a single computer) or as anetwork version that counts the number of concurrent users, the later generally installed on adedicated server.

    The following USB hardware keys are available:

    Stand alone (local) perpetual key.

    Stand alone (local) Time period or expiration date key.

    Network perpetual key.

    Network time period or expiration date key.

    And the following software license keys are also available :

    Stand alone (local) perpetual key.

    Stand alone (local) Time period or expiration date key.

    Network perpetual key.

    Network time period or expiration date key.

    1.1.1 Computer System Requirements

    CYME's software runs on personal computers (PC) and servers using Windows (TM) XP,Vista (either 32 or 64 bits) or Server 2003. The .NET framework (version 2.0 or better) has to beinstalled as well.

    The recommended hardware requirements are:

    A Pentium IV - based computer.

    512 MB of extended memory and 100 MB of free hard disk space.

    Any mouse or monitor supported by Windows.

  • 8/6/2019 Protection Key User Guide en V1-0

    8/17

    Protection Key Utility Reference Manual and Users Guide

    2 CHAPTER 1 GETTING STARTED

    1.1.2 Installing the Protection Key Utilities

    The PKU is installed automatically with any of the CYME software. The related files willappear in a sub-folder of the main application installation directory. Should you want to install onlythe PKU on a server, without CYME main application, you may do so by downloading only the

    PKU package from CYME download page.

    The following installation procedures are valid if you have a hardware USB physical keyconnected behind the computer or a software license key residing in the memory. Both of thesetypes of keys are available as a stand alone version (used only on a single computer) or as anetwork version that counts the number of concurrent users, the later generally installed on adedicated server. The installation procedures depends if you have a hardware or a software key.

    1.1.2.1 Hardware Keys Setup

    The following instructions are valid for all type of keys:

    a) Make sure you install your application or the protection key setup installationpackage prior to connecting the key. By default, the protection key driver will be

    installed by the application package. If you wish to install only the protection keydriver on a server, you may download this installation package here.

    (http://www.cyme.com/downloads/updates/fullversions.shtml)

    b) Connect the key to the USB port. If the LED lights-up, the key is recognized by thesystem.

    1.1.2.2 Software Keys Setup

    The following instructions are valid for all type of keys:

    a) Make sure you install your application or the protection key setup installationpackage. If you are installing the license on a server, MAKE SURE you are installing

    the license on the computer that will act as the server.b) Go to the Windows Start button > All Programs > CYME > Protection Key

    Utilities > Protection Key Utilities 1.0

    c) In the dialog box that appears, select Registration / Firmware.

  • 8/6/2019 Protection Key User Guide en V1-0

    9/17

    Protection Key Utility Reference Manual and Users Guide

    CHAPTER 1 GETTING STARTED 3

    d) Copy and paste the registration number you have received from us in thecorresponding field and click on Register. This process could take a few seconds.

    e) Check at the bottom of the screen for more details if an error occurs.

    1.1.3 Running the Protection Key Utilities

    The PKU program can be started under the Windows Start button > All Programs >CYME > Protection Key Utilities > Protection Key Setup x.x rev x.

  • 8/6/2019 Protection Key User Guide en V1-0

    10/17

  • 8/6/2019 Protection Key User Guide en V1-0

    11/17

    Protection Key Utility Reference Manual and Users Guide

    CHAPTER 2 PROTECTION KEY UTILITIES INTERFACE 5

    Chapter 2 Protection Key Utilities Interface

    2.1 The Licenses Window

    This window shows the software/modules licenses status. It can display:

    Software or modules that are accessible from your computer.

    You can filter on a specific server/software or see all the software. The remotecomputers accessible are identified by (remote) next to the server name. (Local) isfor the key directly installed on your computer.

    If you want to block yourself from a module, use the check box in the Enable column.(Make sure you are at the All available Software level).

  • 8/6/2019 Protection Key User Guide en V1-0

    12/17

    Protection Key Utility Reference Manual and Users Guide

    6 CHAPTER 2 PROTECTION KEY UTILITIES INTERFACE

    2.2 The Detachable Licenses Window

    When a network license protection key is used, it is possible to Detach a license fromthe server to enable the module to work as stand alone. This could be the case if you want to useyour computer while you are not connected to the server. Note that it is possible to block or

    restrain the possibility to detach a license in the network server license manager. See Chapter 3Advanced Configuration of the Protection Key.

    Once a license has been detached from the server, it cannot be re-attached to it until theexpiration date is reached.

  • 8/6/2019 Protection Key User Guide en V1-0

    13/17

    Protection Key Utility Reference Manual and Users Guide

    CHAPTER 2 PROTECTION KEY UTILITIES INTERFACE 7

    2.3 The Client Settings Window

    When you are using a protection key connected to a server or if you are in a networkenvironment, the following window provides you with the most important options to connect to theserver.

    Allow Remote Access to ACC :

    Makes it possible for a remote user to change some of your protection key settings(Enables other network users to access and perform actions on Admin ControlCenter on this machine).

    Enable Detachable Licenses

    When selected, enables Products for which detachable licenses have been definedto be detached from a host machine and temporarily attached to a recipient machine.

    Aggressive Search for Remote Licenses

    If you are having problems finding a remote server, check this box. This option couldbe required on some network due to firewall restrictions. Selecting this check box willenable this machine to connect to remote HASP License Managers, even thoughthey cannot be detected using UDP datagram search methods. Aggressive

    searching reduces the update frequency of remote HASP information, but mayenable firewalls to be transversed.

    Server

    If the Aggressive search is still not working, type the IP Address or server name inthe box. It defines the specific machines that may be searched by this machine forremote HASP License Managers. You must enter information in this field if you havenot selected the Allow remote access licenses check box, as follows:

  • 8/6/2019 Protection Key User Guide en V1-0

    14/17

    Protection Key Utility Reference Manual and Users Guide

    8 CHAPTER 2 PROTECTION KEY UTILITIES INTERFACE

    Specify data as IP addresses (e.g. 10.1.1.17), Broadcast addresses (e.g.10.1.1.255), or machine names (e.g. hklm001.ecomp.com)

    When using the IPv6 protocol, use the IPv6 address format. For example, typeFF02::1 to access all remote HASP License Managers that are part of the defaultlocal group defined in the IPv6 subnet.

    Each entry must be on a separate line.

    2.4 The Server Settings Window

    This window enables you to access the protection key server settings, if allowed. SeeSee Chapter 3 Advanced Configuration of the Protection Key, for more information.

    2.5 The Registration / Firmware Window

    This window enables you to activate your software in case you are using a softwarelicense (as opposed to a hardware USB key). There are a couple of options available to enableyour products:

    1. Using the Registration Number provided by CYME.

    This should be the default option. When you purchase a

    2. Using the C2V / V2C file system

    Important Note:

    If you are installing a Network License, you will need to perform the followingsteps ON THE SERVER computer, not on a client PC.

    2.5.1 Registration Number

    Make sure you install your application or the protection key setup installation package. Ifyou are installing the license on a server, MAKE SURE you are installing the license on thecomputer that will act as the server.

    a) Copy the registration number received from us by e-mail in the correspondingRegistration Number box.

    b) Click on Register. This process could take a few seconds.

    Now, your application is ready to use. To verify that the licenses are working correctly, goto the Licenses page of the interface (see section 2.1 The Licenses Window).

    If an error occurs, you may use the Test procedure to see if any Internet connection orfirewall issues could be the source of the problem. Depending on the security level of your Webbrowser, you might have to confirm that you trust this source. The resulting Web page shoulddisplay something like this:

  • 8/6/2019 Protection Key User Guide en V1-0

    15/17

    Protection Key Utility Reference Manual and Users Guide

    CHAPTER 2 PROTECTION KEY UTILITIES INTERFACE 9

    Project (HASPClient) - Test ResultsTests:

    Database connection : PASSEDSystem Information:

    Server System Time : 2009-05-14 14:58:02Server Version:

    Version : 3.50

    VersionEx : 3.50.117VersionDB : 3.50.117.243

    2.5.2 C2V / V2C File Exchange System

    Make sure you install your application or the protection key setup installation package. Ifyou are installing the license on a server, MAKE SURE you are installing the license on thecomputer that will act as the server.

    a) Click on the Collect button. This will open a Save as type of dialog box.

    b) Save the file anywhere on your computer.

    c) Send the file to CYME by e-mail ([email protected]). You could add the OrderInformation found in the confirmation e-mail you received, including the Registrationnumber.

    d) CYME will process your order manually and send you back a V2C file. Save this fileanywhere on your computer.

    e) Click on the Apply button in the dialog box to open the V2C file.

    Now, your application is ready to use. To verify that the licenses are working correctly, goto the Licenses page of the interface (see section 2.1 The Licenses Window).

  • 8/6/2019 Protection Key User Guide en V1-0

    16/17

  • 8/6/2019 Protection Key User Guide en V1-0

    17/17

    Protection Key Utility Reference Manual and Users Guide

    CHAPTER 3 ADVANCED CONFIGURATION OF THE PROTECTION KEY 11

    Chapter 3 Advanced Configuration of theProtection Key

    An advance interface to customize further the protection key is available. To access it,you may use the hyperlink provided in the Client Settings window of the PKU interface or youmay directly type in your Web browser: http://localhost:1947

    You will be presented with the HASP-SRM Admin Control Center as shown below. Helptopics and instructions are presented directly in this interface.