License management
This chapter describes both the license management concept and the validation procedure and their results. The steps needed to execute the procedure are explained.
4.1 License management concept
To regulate the commercial use of BAAN IV, a copy protection mechanism called license management is implemented. For testing and demonstration purposes, unprotected software is dispatched with limited validity. This software must be validated and patched before a specified expiry date; after which it can be used normally. Because of the copy protection mechanism, it is not possible to copy applications between machines. The mechanism can also be used by dealers to protect any customizations made by them. This functionality is implemented by means of th licd6.1 license daemon.
Information concerning licenses and bshell usage can be displayed by means of licmon6.1 license monitor program. This program allows for license information of the host, bshell user information, and bshell usage statistics to be displayed. The license monitor is invoked by typing the licmon6.1 command at the UNIX prompt. The message Connected with <hostname> will be displayed.
The following commands are valid at the license monitor command prompt:
brandinfo show the license information of this host
help show the valid commands within licmon6.1
ping ping the license daemon (test connection)
quit quit the license monitor
stats show license daemon statistics
users show user count
who show the users who are active within the bshell
who all show the users who are active in the license monitor
4.2 The validation procedure and its result
After BAAN IV has been installed on the system, the software can be used for a period of two weeks, starting from the date of the installation. After these two weeks, the software will be blocked and it is, therefore, recommended to validate the software immediately after installation.
The validation procedure begins with defining the requested system configuration. A report of this configuration, containing a security key, must be sent to Baan. Upon receiving the report, Baan will send validation keys which have to be entered in the system. The final steps are the validation of the tool set and the configuration of the application.
After this procedure, the installed software must be validated correctly. The BAAN IV package can now be initialized by setting the parameters after which it will be ready for use.