Licensing report
The license report itemizes the licenses currently in use on Trust Protection Foundation, listed by license type. This is an automatic report that is read-only, and the license data is periodically submitted via email to CyberArk at reports@venafi.com.
This report is required in accordance with the CyberArk EULA.
What’s important about licensing?
The Licensing report provides a snapshot of the licenses used, organized by type. This report helps ensure that your company is in compliance with CyberArk's license agreement.
The Description column of the report tells you how each type of data was calculated.
Information contained in the report
|
Category |
License Type |
Identity Type |
Description |
|---|---|---|---|
|
Certificate Manager - Self-Hosted |
Trust Protection Foundation |
TLS Certificates |
The number of active server certificates multiplied by the number of additional instances of applications where the certificate is being validated. |
|
|
Trust Protection Foundation |
TLS Certificates |
The number of active server or device certificates configured for provisioning multiplied by the number of additional instances of non-basic applications where the certificate and/or private key are being provisioned. |
|
|
Long-lived Certificates |
Certificates |
The number of active server certificates that have a validity period of 90 days or more. |
|
|
Short-lived Certificates |
Certificates |
The number of active server certificates that have a validity period of less than 90 days. |
|
|
Effective Contract Renewal Date |
Certificates |
The date from which the enrollments for both long-lived and short-lived certificates are counted. |
|
|
Advanced Key Protect |
Certificates |
The number of active server or device certificates who's keys are generated using an HSM and are configured for enrollment and/or provisioning multiplied by the number of additional instances of non-basic applications where the certificate and/or private key are being provisioned. |
|
SSH Manager for Machines |
Trust Protection Foundation |
SSH Devices |
The number of hosts (client, server, appliance, or virtual instance) running on their own operating system with a unique IP address using Trust Protection Foundation for SSH discovery and mapping. |
|
|
Trust Protection Foundation |
SSH Devices |
The number of hosts (client, server, appliance, or virtual instance) running on their own operating system with a unique IP address using Trust Protection Foundation for SSH key remediation. |
|
|
|
|
|
|
No Product Assignment |
Client Device |
Certificates |
The number of active managed client device certificates multiplied by the number of additional instances of applications where the certificate is being validated. |
|
CyberArk System Information |
|
|
|
|
Organization Name |
|
The name of the organization that was provided in the CyberArk Configuration Console when the system was initially set up. You cannot change this value. |
|
|
Deployment Type |
|
The deployment type that was provided in the CyberArk Configuration Console when the system was initially set up. You cannot change this value. |
|
|
System Version |
|
The version of Trust Protection Foundation running on this server. |
|
|
Active Features |
|
|
The license-able components that have been enabled on this system. |
|
Usage Statistics |
|
Shows whether usage statistics are configured to be sent back to CyberArk via the Usage Report. For more information, see Usage Report. |
|
|
Advanced Key Protect |
|
|
Status of the Advanced Key Protect module, which provides features related to HSM remote and central key generation. |
|
Code Sign Manager - Self-Hosted |
|
|
Status of Code Sign Manager - Self-Hosted product, which provides HSM storage and retrieval of keys used to sign code. |