Anyone who runs software licensed under the CONNECT model from Bentley Systems, Inc. knows that proper management of those licenses is essential, as failure to adhere to entitlement limits will […]
Anyone who runs software licensed under the CONNECT model from Bentley Systems, Inc. knows that proper management of those licenses is essential, as failure to adhere to entitlement limits will […]
If you manage Macs, it’s a good guess that you do so using JAMF. Most likely then, you’ve also deployed KeyAccess using JAMF Pro. There’s a new twist with KeyAccess […]
With any system that maintains a database of computers, a critical question is how each record is uniquely identified. For many organizations, identifying computers simply by Computer Name is sufficient […]
During installation of the K2 client, a “Department” field can be placed on the client. This value is then sent from KeyAccess to KeyServer, and can be used in a […]
Any organization using KeyServer has a powerful tool for learning how and where computers and software are being used. Using KeyServer, policies can be configured which specify how product usage […]
Sassafras supplies an API that third party vendors use to build KeyServer support directly into their products. A vendor builds a custom license (.lic) file that includes basic details (such […]
Last year Apple announced that High Siera (10.13) would be the last version of OS X to support 32 bit applications. Furthermore, starting in 2018, beta versions of the current […]
The K2 client-server communication protocol is lightweight yet robust. It is also fault tolerant, and supports your configured license Policies with the greatest possible transparency to end users. UDP port 19283 […]
This is a followup to Counting K2 Client Licenses for Thin Clients, which covered the issues an Administrator must consider before deploying the K2 client (KeyAccess) to Thin Client Servers. […]
K2 provides all of its software license management options equally to software installed on physical, virtual, or thin client computers. Simply counting the number of physical and virtual computers will […]

| Thank you for Signing Up |


Chuck White US Defense Contractor (company name withheld)I’ve worked with your product now for many years, and I have never worked with a server or technology which is as simple to use and just runs year after year after year. The only thing that changes is the increased capabilities. K2’s reliability, cross platform support, and incredible functionality amaze me. You all are to be congratulated.
Give us a call or drop by anytime, we endeavour to answer all enquiries within 24 hours on business days.