Archive | Tech Blog

RSS feed for this section

Integrating Active Directory with K2

K2 has supported integration with Active Directory authentication for many years. Since AD and K2 deal with computers and users, it is natural to leverage existing configuration, avoid duplicated efforts, and ensure consistency across multiple enterprise environments. Here are some of the ways that AD Configuration can be used to control Software Asset Management processes. […]

Enforcing Bentley SELECT licensing with K2 7.2

Bentley Logo

Update (2015-01-25) In K2 version 7.2.0.7, we have added additional functionality to better manage some intricacies of how Bentley measures SELECT licensing. For full details, read the technote Managing Bentley SELECT Licensing. Bentley SELECT licensing is somewhat of an unusual license type. Under SELECT licensing, the usage of the license is measured by counting the total number of […]

New Product definitions including SQL Server Editions

We have recently added various new product definitions to PRS. As usual, they will automatically be added to your Products window whenever your KeyServer has discovered a similar footprint on your site. New definitions include Microsoft SQL Server 2014, as well as definitions for the following specific editions of SQL Server: Enterprise, Standard, Express, Express […]

Manually Creating Accurate Product Definitions

K2 includes a Product Recognition Service (PRS) which automatically analyzes the software discovered on computers within your organization and provides relevant product details for use in license management, software optimization, and cost reduction. While the PRS recognition database is constantly evolving to keep up with new product releases and uncommon discoveries, you are never forced […]

Clutter: when to delete, when to hide

trash

The KeyConfigure user interface supports deletion of any of the main objects, but you should think twice before deleting. Often the motivation for deleting objects is to “clean up” the data. However, there are better ways to clean up than simply deleting data. Deleted objects can no longer be displayed in reports and this can obscure […]

The KeyServer Client Communication Protocol

Computer Network

The K2 client-server communication protocol is lightweight yet robust.  It is also fault tolerant, and supports your configured license Policies with the greatest possible transparency to end users. UDP port 19283 is opened on the KeyServer host in order to receive client connections.  As a KeyServer administrator, there is generally no need to understand the details […]

Using Asset ID for IT Asset Management (ITAM) with K2

Asset ID in K2 QR code

There are various ways to identify computers uniquely based on hardware properties. In particular, a MAC address or a hardware Serial Number typically are unique across all computers and are readily available in any systems containing computer records. K2 uses these properties as well as others to maintain a unique ID for each computer. However, […]

New Browser definitions added to PRS

New Browser Definitions

We have recently added definitions to our Product Recognition Service for versions 23-25 of Firefox, versions 29-30 of Google Chrome, and version 11 of Internet Explorer. If you have these versions installed at your site, you should automatically receive the new product definitions. However, your Products window may be filtered to hide Ignored products, in […]