spk-logo-white-text-short2
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Installing and Configuring Rational 8.1.1 RLKS and LKAD

Written by SPK Blog Post
Published on July 28, 2011

This week’s posting deals with Rational licensing on the Windows platform. We are going to have a look at setting up a Windows Rational license server and how to configure it. It also turns out that with the arrival of Rational 7.1.2, a new version of the license server is required. Rational License Key Server (RLKS) 8.1.1 is now required to support the later versions of Rational tools (ClearCase, ClearQuest, etc).

Because of this new requirement, this article may be timely for you in planning and executing a license server upgrade. Additionally, we talk about the new client machine License Key Administrator (LKAD) 8.1.1 software. In addition to Rational 7.1.2 requiring RLKS 8.1.1, client machine installs of Rational 7.1.2 now install the client machine license administrator software (LKAD) as a separate software application now located in a separate package group.

Please give us feedback regarding the usefulness of this article. To access this week’s article, click here: SPK_RationalLicenseServerInstall

Latest White Papers

A Field Guide to Threat Vectors in the Software Supply Chain

A Field Guide to Threat Vectors in the Software Supply Chain

As a software developer, your main priority should be quickly and efficiently delivering software. The last thing you want is to worry about security threats. In this eBook, we will educate you on eliminating threat vectors with GitLab to secure your software supply...

Related Resources

Enhancing Traceability and Compliance with PTC Windchill

Enhancing Traceability and Compliance with PTC Windchill

As complex, smart, and connected products become the norm, manufacturers must contend with increasingly stringent regulations. Traceability and compliance are mission-critical. Manufacturers must also meet rising customer expectations and overcome unpredictable supply...

A Field Guide to Threat Vectors in the Software Supply Chain

A Field Guide to Threat Vectors in the Software Supply Chain

As a software developer, your main priority should be quickly and efficiently delivering software. The last thing you want is to worry about security threats. In this eBook, we will educate you on eliminating threat vectors with GitLab to secure your software supply...

An Executive’s Guide to Strengthening Software Supply Chain Security

An Executive’s Guide to Strengthening Software Supply Chain Security

Modern software is assembled from a complex web of components, contributors, and tools, both internal and external. While this modularity accelerates development, it also expands the attack surface. For executives, a single breach in the software supply chain can...