1 / 11

Securing Program Usage in the Enterprise

Securing Program Usage in the Enterprise. 9 th April 2008 Rupert Stanley Ross Systems International Ltd. Application Protection. Safeguard Execute and Read Attributes Control access to program by: User or Group Local or Network

bandele
Download Presentation

Securing Program Usage in the Enterprise

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Securing Program Usage in the Enterprise 9th April 2008Rupert StanleyRoss Systems International Ltd.

  2. Application Protection • Safeguard Execute and Read Attributes • Control access to program by: • User or Group • Local or Network • This is a bit coarse what is needed is an Access Control List approach • Who - Which Users, Several from diverse groups • Where - Which machines • What - The Suite/Program/Component • When - Dates and Times Securing Program Usage in the Enterprise

  3. Synergy with Licensing Component is OK to Execute if it matches - Securing Program Usage in the Enterprise

  4. How It is Done • Stop the program being executed by anybody by: • Putting a license check at one or more points in the program • Enable anyone to run the program • Have separate license files for each user/group of users • Protect the license file with SAFEGUARD Note. License files act like access control lists Trick is to have a master license file and allow administrator to create and manage licenses, thereby control license usage. RSI LICENSE ENABLES YOU TO DO THIS Securing Program Usage in the Enterprise

  5. RSI LICENSING HIERARCHY Securing Program Usage in the Enterprise

  6. RSI LICENSE COMPONENTS ColourDescription Green Licensing Programs Blue License Libraries Yellow Source and header filesPurple User Programs Securing Program Usage in the Enterprise

  7. LICENSE The license process provides the capability for a licensor to issue, extend and print user licenses.It is bound with the USERLICE Library to include the Licensor dependant components to be defined.It required a FULLY VALID Licensor License to operate. This is password protected. Securing Program Usage in the Enterprise

  8. VIEWLICE • VIEWLICE has commands to maintain the licence file • Add Entries to the Licence File • Alter the Execute Times for a given element number • Delete Entries from the Licence File • Exit the program • Fix Command (FC) to provide input line editing. • Help to display command syntax • Info to see the type and currency of licences • Alters the password for the file • Print the User License File • Undo all the changes to date Securing Program Usage in the Enterprise

  9. LICEUSER LICEUSR is the means whereby the licensor can customise the LICENSE program and LICELIB library to enable him to license his programs Securing Program Usage in the Enterprise

  10. LICENSING A PROGRAM #pragma search "licelib"#pragma search "liceusr" #include "licensr.h"#include "liceusr.h" CheckLicense(<file>, <prod>, <msg>, <max>); Where: <file> Define name of the license file <prod> Product Number from a define in liceusr.h file <msg> Product and Contact details in the infringement message <max> Maximum number of tolerated infringements CheckLicense("=RSILICE", FINFO, "FINFO - Contact RSI (01206-392923)", 2); Securing Program Usage in the Enterprise

  11. QUESTIONS? THANK YOU RUPERT STANLEY +44(0)-1206-392923 rupert@rsi-ns.com www.rsi-ns.com Securing Program Usage in the Enterprise

More Related