After you have developed the protected application and finished the
tests on your development machine, the next step is to deploy and distribute
the application to the user. The following provides a checklist of the needed system
files (i.e. libraries) that must be included with your application.
For macOS applications, the needed system files include the KeyCheck library and the ElecKey
agent (for Local or Network Key).
The table below lists the needed system files for the application
protected as Machine and USB License. These system files must be placed in the
same folder as the protected executable.
Architecture : OS |
System
Files |
Available
in Directory |
x86 : macOS
10.6/10.7/10.8/10.9/10.10/10.11/10.12/10.13/10.14/10.15/11 |
LIBEKC20.DYLIB,
EKAG20 |
/DEPLOY/X86/KEYCHECK |
x86-64 : macOS
10.9/10.10/10.11/10.12/10.13/10.14/10.15/11 |
LIBEKC6420.DYLIB,
EKAG6420 |
/DEPLOY/X86_64/KEYCHECK |
ARM64 : macOS
11 |
LIBEKCARM6420.DYLIB,
EKAGARM6420 |
/DEPLOY/ARM64/KEYCHECK |
The table below lists the needed system files for the application
protected as Network License. These system files must be placed in the same
folder as the protected executable.
Architecture : OS |
System
Files |
Available
in Directory |
x86 : macOS
10.6/10.7/10.8/10.9/10.10/10.11/10.12/10.13/10.14/10.15/11 |
LIBEKC20.DYLIB |
/DEPLOY/X86/KEYCHECK |
NKAG20 |
/DEPLOY/X86/NETWORK |
|
x86-64 : macOS
10.9/10.10/10.11/10.12/10.13/10.14/10.15/11 |
LIBEKC6420.DYLIB |
/DEPLOY/X86_64/KEYCHECK |
NKAG6420 |
/DEPLOY/X86-64/NETWORK |
|
ARM64 : macOS
11 |
LIBEKCARM6420.DYLIB |
/DEPLOY/ARM64/KEYCHECK |
NKAGARM6420 |
/DEPLOY/
ARM64/NETWORK |
Besides the above system files, the application also needs the Network
Key configuration file, which specifies the parameters for connecting to
the NetKey License Server. The default file name is
NETKEY.PLIST, or you can change the file name as you want. The file must be
placed in the same folder as the protected executable.
For more information on how to deploy the NetKey
License Server and Network License, see the NetKey License
Server section.
NOTE: Because the Network Key configuration
file must be configured by the user in accordance to their network
environment. The user should be advised how to use this file. |