XLS Padlock provides a robust deactivation system, allowing end users to deregister their activated workbook application from a computer. This is especially useful if your customers need to transfer their secure application to a new machine or need to re-register due to system changes.
Deactivation generates a certificate that the end user must forward to you, the vendor. Using XLS Padlock, you can verify the authenticity of this certificate thanks to the Test Deactivation Certificate feature. It is crucial to note that once deactivated, the current activation key will be rendered invalid by XLS Padlock, necessitating the issue of a new key to the user.
When a user decides to deactivate their workbook app, they must generate a deactivation certificate and send it to you:
Upon receipt, you can use the 'Test deactivation certificate' button in XLS Padlock to verify the certificate. If the deactivation is successful, XLS Padlock will display the deactivation date and the unique identifier of the user's computer:
This information enables you to manage new activations for your client or handle deactivations manually.
For a more seamless experience, XLS Padlock supports online deactivation if you have the XLS Padlock Activation Kit installed on your web server. The application will communicate with the server to unregister the activation. If the server is unreachable or the computer is offline, a deactivation certificate will still be created.
With online deactivation, everything is automated, this is easier for both your customers and you.
Initiating a deactivation in a secure application protected by XLS Padlock provides users with the necessary flexibility to manage their licenses. There are three main methods to start this process:
ØThe first option is through the integrated Welcome dialog of the application. Upon launching the secure application, the welcome dialog appears, presenting various options, including a "Deactivate" button. By clicking this button, users can begin the deactivation process in a user-friendly and guided manner:
ØThe second method involves the use of the command line. Advanced users may prefer this method for system automation or integration. To do this, the user needs to open the Windows command prompt, navigate to the directory where the secure application's executable file is located, and then enter the name of the executable followed by the `-deact` parameter. For instance, if the executable is named `Application.exe`, the complete command would be:
By pressing Enter, the parameter is passed to the executable file, triggering the deactivation process.
ØThe third method employs the VBA API provided by XLS Padlock. For more details on using VBA APIs for deactivation, please consult the article Start Deactivation of the Workbook Application With VBA.
Please be advised that once a key is deactivated, it will be locally blacklisted and can no longer be reused on the computer from which it was deactivated. Users must understand that deactivation is a final action for the specific machine, and the deactivated key will not be eligible for reactivation on the same system. If you wish to use the application on the same computer in the future, a new key will be required. Please also note that we speak about activation keys, not activation tokens (as defined in the WooCommerce Integration Kit).
Deactivation is a powerful feature that adds flexibility and control for both the vendor and the end user. By understanding and effectively managing deactivation, you can provide better service to your customers and streamline the activation process.
Copyright © 2023 G.D.G. Software