Like all software, K2 is licensed according to a particular metric that takes into account various measures of usage. K2 requires a license, or “seat”, for any client computer with recent activity related to K2 services, such as program management, computer login tracking, and software audits. The measure of “recent” depends on the type of K2 service the computer has accessed, and various details of that service. The number of active client computers cannot exceed the number of seats supported by your KeyServer license.
Any computer that has the K2 client software installed, and has at some point connected to KeyServer, is listed in the Computers table. Each computer is placed in one of four Login categories according to that computer's usage pattern and the specific configuration of K2. K2 administrators can move computers between categories as necessary in order to manage the allocation of K2's licensed seats.
Dedicated computers have access to all services. A Dedicated computer will not have its seat automatically reassigned, even if the computer has not actively used K2's services. A computer will be moved into the Dedicated category if a Node Policy is assigned to it, or if an administrator manually moves the computer.
If an administrator moves a Dedicated computer to another Login type, and Node Policies assigned to that computer will be revoked. Usage of any such Policies will remain in the Usage Log, and Reports will reflect that usage. Furthermore, unless the computer is changed to Excluded, usage of the products associated with a Node Policy might again assign the policy, moving the computer back to the Dedicated category.
By default, computers are initially placed in the Leased category. Leased computers have an associated expiration time, after which they will be moved to the Dormant category. This expiration time is extended each time the computer accesses one of K2's services. The length of the extension depends on the type of activity, and is encoded in the K2 license. Activity that can extend a lease expiration includes:
Note that usage of ignored software does not affect the expiration of a Leased computer.
Once a Leased computer has been inactive for a period of time, it is changed to Dormant. These computers do not count against the KeyServer client limit, as they are not currently making use of any KeyServer services. Dormant computers will not appear in Audit reports but historical software usage information will still be available in usage reports. If a Dormant computer makes a connection to KeyServer in order to report usage activity, to upload audit info, or to use managed software, it will automatically change back to Leased or Dedicated.
Computers that are Excluded do not count against the KeyServer client limit. These computers cannot receive any services and no new information will be recorded by KeyServer. Like Dormant computers, Excluded computers will not appear in Audit reports but they may appear in usage reports if there is relevant historical usage data. Computer name and profile information remains available for reference from various other reports. Software usage will not be Managed or Observed on these computers, even if the same software is managed on other computers. Note: Keyed programs (legacy) are dependent on an interaction with KeyServer, so these simply will not run on excluded clients just as they will not run on computers that do not have the KeyAccess client software installed.