0% found this document useful (0 votes)
88 views

Pipeline Studio - Standalone Licensing Help

Uploaded by

erwin.hindarto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views

Pipeline Studio - Standalone Licensing Help

Uploaded by

erwin.hindarto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Standalone Licensing

Contents
Contents ............................................................................................................................... 1
Introduction ........................................................................................................................... 1
Determining the Hardware Key Manufacturing Code............................................................. 1
Installing the PipelineStudio Hardware Key ........................................................................... 2
Installing the USB Hardware Key ...................................................................................... 2
Installing the Parallel Port Hardware Key .......................................................................... 2
Troubleshooting .................................................................................................................... 4
Notation ................................................................................................................................ 4

Introduction
This document explains PipelineStudio® standalone licensing using a hardware key (bitlock)
only.
If you purchased a PipelineStudio network license, refer instead to the “Network
Licensing Help” document in the networklicensing folder on your PipelineStudio
CD.

Determining the Hardware Key Manufacturing Code


PipelineStudio 2.5 and above requires the hardware key to be manufactured in 1996 or later.
If you have a key that was manufactured before 1996, contact Emerson technical support to
exchange your key for a new key.
To determine the manufacturing date of the key, look at the manufacturing code on the key.
This is the second line on the label, below the line labeled SRB01617. The first two digits of
the manufacturing code indicate the year in which the key was manufactured.
For example:
9518L9336
| | | | |
year | | | lot code
week | last digits of part #
Supplier
This code represents a key manufactured in the 18th week of 1995 by supplier L.
The lot code is 6 and the last three digits of the part number is 933.
On some older keys, this number is covered by a small metal plate with the name
LICENERGY or SSI (Scientific Software Intercomp).
1
If this is the case, check the size of the white plastic housing on the hardware key.
If the housing measures 2-1/8 inches by 2-5/8 inches, the key should be returned for
replacement.

Installing the PipelineStudio Hardware Key


PipelineStudio uses hardware keys called Sentinel SuperPro keys, manufactured by
SafeNet, Inc.
When you placed your order for PipelineStudio, you specified whether you wanted a version
that uses network licensing or a version that uses standalone licensing. The type of
hardware key you receive—network or stand-alone — depends on the version of
PipelineStudio that you ordered. Network keys can be identified by the phrase
“SuperProNet” stamped into the plastic on one side of the key.
Sentinel SuperPro standalone hardware keys come in two form-factors: parallel port or USB.
Again, the type you received in your package depends on what you specified when you
placed your order.

Sentinel SuperPro USB Key (left) and Parallel Port Key (right)

Parallel port keys (25-pin or 36-pin) connect to a parallel port located on the back of your
computer.
USB keys connect to a USB port located on the back or front of your computer or on a USB
hub.
Use the instructions in the appropriate following section to install your hardware key.
Note: For instructions on installing network hardware keys on a server, please refer to the
“Network Licensing Help” document in the networklicensing folder on your
PipelineStudio CD.

Installing the USB Hardware Key

If you have multiple USB ports (if, for example, you are using a USB hub), you can connect
up to 10 USB hardware keys on a single computer. Cascading (connecting multiple keys to
the same port) is not supported for Sentinel SuperPro USB hardware keys.
We recommend installing the Sentinel system driver prior to connecting any USB keys to
your system.
 Locate an available USB port on your computer.
 Attach the key to the USB port. Make sure it is securely and tightly connected.

Installing the Parallel Port Hardware Key

The Sentinel SuperPro key can be attached to any parallel port on your computer, as the
Sentinel driver automatically polls each port to locate the key.

2
1. Locate an available parallel port on your computer. If your computer has only one
parallel port, you may need to temporarily remove any existing parallel port devices
(such as a Zip drive or printer) in order to connect the key. These devices may be
reconnected to the key’s outside connector after you have installed the key.
2. Attach the key to the parallel port connector.
 If you are using a 25-pin key, we recommend you attach the key directly to
the parallel port without using an extension cable between the computer and
the key. However, you may use a cable to connect a printer or other parallel
device to the key; see below for more information on using cables with the
key.
 If you are using a 36-pin key, you may use a cable to connect the key to the
computer, but do not use an extension cable to connect a printer or other
parallel device to the key.
3. Tighten the screws to connect the key securely to the port.
4. If necessary, reconnect any other parallel port devices to the outside connector on
the key. We recommend using a shielded printer cable if you are connecting a printer
to your computer through the key.

Using Cables with the Sentinel SuperPro Hardware Key


Due to the large variety of cables currently on the market, we do not recommend a specific
brand or type of cable for use with the key.
However, we do recommend the following:
 Cables should not be longer than 6 feet in length.
 Cables should be shielded.
 Do not use ribbon cables.
 Cables must be straight-through; that is, they must have all pin signals wired through
to the connectors on either end of the cable.
Please be aware that not all combinations of cables and printers are compatible with the
key—contact PipelineStudio technical support if you encounter a compatibility problem.

Connecting Multiple Parallel Port Keys


Multiple Sentinel SuperPro keys can be attached to the same parallel port; this is called
cascading. Network keys may be cascaded with stand-alone keys. The number of keys that
can be cascaded is dependent on the system they are attached to. Typically, up to five keys
can be connected to the same port. Refer to your PC documentation for more information
about attaching devices to your parallel port.
You should be able to cascade an Emerson key with a key from another software supplier,
provided that the other supplier’s application also uses a key manufactured by SafeNet, Inc.
However:
 This relies on the other supplier’s application being coded correctly to support
cascaded keys.
 We cannot guarantee using a PipelineStudio key in conjunction with another
supplier’s key
Keys can be connected to up to three parallel ports on the same computer. For example, if
you have three parallel ports on your computer, you could attach a separate key to each port

3
simultaneously. The Sentinel driver automatically polls all parallel (and USB) ports when
looking for a key.
As a general rule, when you are cascading multiple security keys together and one of the
keys is a Sentinel SuperPro, the SuperPro should be placed last in the chain (furthest from
the computer). This is true when cascading SafeNet keys or SafeNet keys in combination
with keys manufactured by other security vendors.
When multiple SuperPro keys are cascaded, the order in which they are placed should be
determined by the hardware revision (part number) of the SuperPro keys. As a general rule,
the newest SuperPro key should be closest to the computer, with each SuperPro behind it
being an older revision of the key. For example, if you have a 103737-001 SuperPro and a
103933-001 SuperPro, the 103933-001 (newer revision) SuperPro should be closer to the
computer, with the 103737-001 SuperPro behind it.
To determine the revision of the key, look at the manufacturing code (see the “Determining
the Hardware Key Manufacturing Code” section of this document)
Sentinel SuperPro cascading issues only occur when a 103933-001 or 104016-001 model
SuperPro is involved. As long as these two revisions of the SuperPro are the closest to the
computer, the cascading order of other SuperPro keys should not matter. It is easier to
remember, however, that when cascading multiple revisions of the SuperPro key, the newest
revision must be first.
Contact PipelineStudio technical support if you encounter any problems with using multiple
parallel port keys.

Troubleshooting
Should you encounter any problems please contact the PipelineStudio technical support
team at energysolutions.support@emerson.com.

Notation
PipelineStudio, TNet and Emerson are registered trademarks of Emerson Electric Co.
Windows, Excel and SQL Server are registered trademarks of Microsoft Corporation.
Intel is a registered trademark of Intel Corporation.
SentinelRMS* © 1989-2008 SafeNet, Inc. All rights reserved
SafeNet, Sentinel, SentinelLM, and Sentinel RMS are either trademarks or registered trademarks of SafeNet, Inc.
All other product names referenced herein are trademarks or registered trademarks of their respective
manufacturers.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy