{"id":3656,"date":"2019-03-25T17:45:20","date_gmt":"2019-03-25T20:45:20","guid":{"rendered":"http:\/\/xexeu.elipse.com.br\/pt\/using-a-softkey-with-elipse-softwares-products\/"},"modified":"2019-05-07T20:12:11","modified_gmt":"2019-05-07T23:12:11","slug":"using-a-softkey-with-elipse-softwares-products","status":"publish","type":"post","link":"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/","title":{"rendered":"Using a softkey with Elipse Software&#8217;s products."},"content":{"rendered":"<div align=\"justify\">Softkeys are software protection mechanisms introduced with the new operating systems virtualizations technologies. They work as an alternative to the hardkeys, still the most common system in this case. With a softkey, Elipse products can be executed in remote environments such as cloud computing, since the license is validated via software and not via hardware, as is the case with a hardkey.<\/div>\n<div align=\"justify\">\n<p><b>Differences between softkeys and hardkeys <\/b><\/p>\n<p>There are two types of license control for Elipse applications: hardkeys and softkeys. Both are protection tools against illegal software usage.<\/p>\n<p>A hardkey is a physical device connected to the computer&#8217;s USB port; when running the software, it verifies the license programmed in this device. The hardkey&#8217;s main advantage is portability, because the license is not bound to a single server; it means greater convenience for systems integrators and final customers who need to access the license as quickly and easily as possible. Additionally, the hardkey can be removed from the machine in case it presents any problem and then reinstalled in another computer.<\/p>\n<p>The softkey, on the other hand, is a non-portable license. Its main difference to the hardkey is its license validation process (security mechanism), which occurs every 60 days and can happen automatically (via internet) or manually. Unlike the hardkey, the softkey is bound to the machine, and can&#8217;t be transferred or removed after being installed.<\/p>\n<p>Use a hardkey when:<\/p>\n<ul>\n<li>Your license needs to be portable (development licenses);<\/li>\n<li>The computer is in a physically secure place;<\/li>\n<li>The license can&#8217;t be bound to a single computer.<\/li>\n<\/ul>\n<p>Use a softkey when:<\/p>\n<ul>\n<li>The application is in a virtual environment;<\/li>\n<li>The servers have no USB port;<\/li>\n<li>The computer isn&#8217;t in a physically secure place.<\/li>\n<\/ul>\n<p><b>How the softkey works <\/b><\/p>\n<p>Softkeys can be installed in one of the following ways:<\/p>\n<ul>\n<li><b>Via Elipse License Manager (eLic)<\/b>: this (recommended) procedure is simple and automatic; its only requirement is a connection to the internet.<\/li>\n<li><b>Manual procedure<\/b>: to be used only when the machine has no access to the internet.<\/li>\n<\/ul>\n<p><b>NOTE<\/b>: for an easy and quick procedure, we suggest installing it via eLic, and <b>not <\/b>manually.<\/p>\n<p>Every 60 days, the license needs to be reprogrammed\/revalidated. If the computer running eLic is connected to the internet, it will automatically reprogram all licenses on the network on a periodic basis, requiring no client intervention. In case of an isolated network, that is, in case of no internet access, the license must be reprogrammed manually twice a year.<\/p>\n<p>The softkey&#8217;s expiration date can be verified via eLic or E3Admin, and a warning note for its revalidation starts popping up 30 days before this date. Manual (offline) reprogramming, as well as its requeste, is the <b>customer&#8217;s sole responsibility<\/b>, and it can be done in one of the following ways:<\/p>\n<ul>\n<li><b>Via HKCustomer:<\/b> requires only direct access to the server;<\/li>\n<li><b>Via eLic<\/b>:\u00a0 this option is indicated only in cases when the client has no access to the server, only via Remote Desktop.<\/li>\n<\/ul>\n<p>Once installed in the server, the softkey is bound to the machine, and it can&#8217;t be removed or transferred.<\/p>\n<p>Softkey&#8217;s pros:<\/p>\n<ul>\n<li>Requires no USB port;<\/li>\n<li>The license is not bound to a portable device, therefore it can&#8217;t be lost or stolen;<\/li>\n<li>Allows you to create a virtual environment.<\/li>\n<\/ul>\n<p>Softkey&#8217;s cons:<\/p>\n<ul>\n<li>Requires periodic reprogramming;<\/li>\n<li>The license is bound to the server, and can&#8217;t be removed\/transferred to other hardware;<\/li>\n<li>Requires a complex off-line installation process;<\/li>\n<li>If a problem occurs in your machine and the softkey is lost, its reinstallation is required.<\/li>\n<\/ul>\n<p>Softkey&#8217;s restrictions:<\/p>\n<ul>\n<li>Make sure the machine where the softkey is installed is the final one, and that it&#8217;s properly set up;<\/li>\n<li>The machine where the softkey is installed must be ready be reprogrammed periodically;<\/li>\n<li>After installing the softkey in a <b>physical machine<\/b>, its settings (UUID, PCU, network cards, etc.) can no longer me edited, since its cloning could be detected and this would cause the machine to stop working. If this happens, this softkey can no longer be restored, and a new one has to be generated. This operation is costly and takes very long to be completed. In this case, contact Elipse Software as soon as possible.<\/li>\n<\/ul>\n<p><b>Elipse License Manager (eLic)<\/b><\/p>\n<p>The goal of Elipse License Manager is to manage the updates of the protection devices (hardkey\/softkey) used for Elipse Software&#8217;s products licensing purposes. Its main features are:<\/p>\n<ul>\n<li>Activating the softkey (as long as the machine is connected to the internet);<\/li>\n<li>Automatically reprogramming softkeys and hardkeys (as long as the machine running eLic is connected to the internet);<\/li>\n<li>Centralizing licenses management;<\/li>\n<li>Collecting and applying memory off-line (manual procedure, not connected to the internet);<\/li>\n<li>Controlling expiration dates.<\/li>\n<\/ul>\n<p>To download Elipse License Manager (eLic), go to <a href=\"http:\/\/www.elipse.com.br\/eng\/download_e3.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Elipse&#8217;s webpage<\/a>.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Softkeys are software protection mechanisms introduced with the new operating systems virtualizations technologies. They work as an alternative to the hardkeys, still the most common system in this case. With&hellip;<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0},"categories":[838],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Using a softkey with Elipse Software&#039;s products. - Elipse Knowledgebase<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using a softkey with Elipse Software&#039;s products.\" \/>\n<meta property=\"og:description\" content=\"Softkeys are software protection mechanisms introduced with the new operating systems virtualizations technologies. They work as an alternative to the hardkeys, still the most common system in this case. With&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/\" \/>\n<meta property=\"og:site_name\" content=\"Elipse Knowledgebase\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/elipsesoftware\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-25T20:45:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-07T23:12:11+00:00\" \/>\n<meta name=\"author\" content=\"Eduardo Grazziotin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eduardo Grazziotin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/\"},\"author\":{\"name\":\"Eduardo Grazziotin\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/person\/f9fc2442228f8cc06308387a6725ef03\"},\"headline\":\"Using a softkey with Elipse Software&#8217;s products.\",\"datePublished\":\"2019-03-25T20:45:20+00:00\",\"dateModified\":\"2019-05-07T23:12:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/\"},\"wordCount\":1565,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#organization\"},\"articleSection\":[\"Softkey\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/\",\"url\":\"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/\",\"name\":\"[:pt]Using a softkey with Elipse Software&#039;s products.[:en]Using a softkey with Elipse Software's products.[:] - Elipse Knowledgebase\",\"isPartOf\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#website\"},\"datePublished\":\"2019-03-25T20:45:20+00:00\",\"dateModified\":\"2019-05-07T23:12:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/kb.elipse.com.br\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Using a softkey with Elipse Software&#8217;s products.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kb.elipse.com.br\/#website\",\"url\":\"https:\/\/kb.elipse.com.br\/\",\"name\":\"Elipse Knowledgebase\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kb.elipse.com.br\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kb.elipse.com.br\/#organization\",\"name\":\"Elipse Software\",\"url\":\"https:\/\/kb.elipse.com.br\/\",\"sameAs\":[\"http:\/\/www.facebook.com\/elipsesoftware\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png\",\"contentUrl\":\"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png\",\"width\":161,\"height\":58,\"caption\":\"Elipse Software\"},\"image\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/person\/f9fc2442228f8cc06308387a6725ef03\",\"name\":\"Eduardo Grazziotin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/47913ac4c8f427d44c6391bff49b275f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/47913ac4c8f427d44c6391bff49b275f?s=96&d=mm&r=g\",\"caption\":\"Eduardo Grazziotin\"},\"url\":\"https:\/\/kb.elipse.com.br\/en\/author\/eduardo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Using a softkey with Elipse Software's products. - Elipse Knowledgebase","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/","og_locale":"en_US","og_type":"article","og_title":"[:pt]Using a softkey with Elipse Software&#039;s products.[:en]Using a softkey with Elipse Software's products.[:] - Elipse Knowledgebase","og_description":"Softkeys are software protection mechanisms introduced with the new operating systems virtualizations technologies. They work as an alternative to the hardkeys, still the most common system in this case. With&hellip;","og_url":"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/","og_site_name":"Elipse Knowledgebase","article_publisher":"http:\/\/www.facebook.com\/elipsesoftware","article_published_time":"2019-03-25T20:45:20+00:00","article_modified_time":"2019-05-07T23:12:11+00:00","author":"Eduardo Grazziotin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Eduardo Grazziotin","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/#article","isPartOf":{"@id":"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/"},"author":{"name":"Eduardo Grazziotin","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/person\/f9fc2442228f8cc06308387a6725ef03"},"headline":"Using a softkey with Elipse Software&#8217;s products.","datePublished":"2019-03-25T20:45:20+00:00","dateModified":"2019-05-07T23:12:11+00:00","mainEntityOfPage":{"@id":"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/"},"wordCount":1565,"commentCount":0,"publisher":{"@id":"https:\/\/kb.elipse.com.br\/#organization"},"articleSection":["Softkey"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/","url":"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/","name":"[:pt]Using a softkey with Elipse Software&#039;s products.[:en]Using a softkey with Elipse Software's products.[:] - Elipse Knowledgebase","isPartOf":{"@id":"https:\/\/kb.elipse.com.br\/#website"},"datePublished":"2019-03-25T20:45:20+00:00","dateModified":"2019-05-07T23:12:11+00:00","breadcrumb":{"@id":"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kb.elipse.com.br\/en\/using-a-softkey-with-elipse-softwares-products\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/kb.elipse.com.br\/en\/"},{"@type":"ListItem","position":2,"name":"Using a softkey with Elipse Software&#8217;s products."}]},{"@type":"WebSite","@id":"https:\/\/kb.elipse.com.br\/#website","url":"https:\/\/kb.elipse.com.br\/","name":"Elipse Knowledgebase","description":"","publisher":{"@id":"https:\/\/kb.elipse.com.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kb.elipse.com.br\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kb.elipse.com.br\/#organization","name":"Elipse Software","url":"https:\/\/kb.elipse.com.br\/","sameAs":["http:\/\/www.facebook.com\/elipsesoftware"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/","url":"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png","contentUrl":"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png","width":161,"height":58,"caption":"Elipse Software"},"image":{"@id":"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/person\/f9fc2442228f8cc06308387a6725ef03","name":"Eduardo Grazziotin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/47913ac4c8f427d44c6391bff49b275f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/47913ac4c8f427d44c6391bff49b275f?s=96&d=mm&r=g","caption":"Eduardo Grazziotin"},"url":"https:\/\/kb.elipse.com.br\/en\/author\/eduardo\/"}]}},"_links":{"self":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts\/3656"}],"collection":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/comments?post=3656"}],"version-history":[{"count":2,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts\/3656\/revisions"}],"predecessor-version":[{"id":6251,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts\/3656\/revisions\/6251"}],"wp:attachment":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/media?parent=3656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/categories?post=3656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/tags?post=3656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}