EasyManua.ls Logo

SafeNet Sentinel User Manual

SafeNet Sentinel
282 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
1.2.0

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the SafeNet Sentinel and is the answer not in the manual?

SafeNet Sentinel Specifications

General IconGeneral
TypeHardware Security Module (HSM)
InterfaceUSB
CompatibilityWindows, macOS, Linux
DimensionsVaries by model
WeightVaries by model
Operating Temperature0°C to 50°C

Summary

Part 1: Sentinel Key Basics

Chapter 2 – Sentinel Keys SDK Components

Provides information about the major components included in the Sentinel Keys SDK for developers, distributors, and customers.

Chapter 3 – Planning Application Protection and Licensing Strategy

Explains concepts for planning application protection and licensing strategies, including features, templates, and groups.

Chapter 4 – Protecting Applications Using Shell

Providing Licensing Settings

Details on setting licensing attributes like Active, Lease, and Limit executions for Shell-protected applications.

Providing Networking Settings

Configuration options for networking settings including Access Mode, License Sharing, and Maintain license time.

Providing Security Settings

Configuration options for security settings like Multi-layering levels and debugger presence for Shell-protected applications.

Shell Protection Using the Command-Line Utility

Instructions on using the Command-Line Shell Utility for protecting applications via command-line interface.

Chapter 5 – Protecting Applications Using API

Steps to Protect Applications Using API

Outlines the steps for protecting applications using Business Layer API functions, including conceptual planning and implementation.

Chapter 6 – Secure Remote Updates

Secure Remote Update

Describes the secure update process for updating hardware keys remotely without withdrawing them.

Secure Remote New License Addition

Explains methods for adding new licenses to end-user tokens remotely.

Chapter 7 – Implementing Secure Licensing

Implement Query-Response Protection

Explains the AES algorithm-based query/response protection as a primary method for securing applications.

Chapter 8 – License Grouping

Creating New Groups

Step-by-step guide on creating new license groups using the License Manager screen.

Modifying Default Feature Instances

Instructions on modifying licensing values of default feature instances after adding them to a group.

Creating New Feature Instances

Guide on creating new feature instances with different licensing values to manage varied licensing requirements.

Chapter 9 – Programming Sentinel Hardware Keys

Programming Sentinel Keys using Sentinel Keys Toolkit

Steps for programming Sentinel Keys and distributor keys using the License Manager in Sentinel Keys Toolkit.

Chapter 10 – Redistributables for Customers and Distributors

Appendix A – Troubleshooting

Problems and Solutions

Provides solutions to typical problems encountered while using Sentinel Hardware Keys.

Problem: Time/Date Tampering

Troubleshooting steps for time/date tampering errors when using Sentinel Keys Toolkit.

Appendix C – Sentinel Keys Hardware Specifications

Appendix D – Migration from SuperPro and UltraPro