Volume Activation Overview

发布时间:2020-08-01 18:44:40 作者:yqcdvip
来源:网络 阅读:589

Updated: March 19, 2014

Applies To: Windows 10, Windows 8.1, Windows Server 2012 R2, Windows Server 2016 Standard Technical Preview 5, Windows Server 2016 Datacenter Technical Preview 5

This technical overview for the IT professional describes the volume activation technologies in Windows operating systems and how your organization can benefit from using these technologies to deploy and manage volume licenses for a medium to large number of computers.

Did you mean…

Volume activation description

A number of technologies are available in Windows client and server operating systems to simplify the task of configuring the distribution and management of an organization’s volume software licenses. These technologies include:

Other Microsoft volume activation technologies that can be used in conjunction with Windows server operating systems include:

How does volume activation work?

Before you configure and use volume activation technologies, it may be helpful to understand how volume activation works.

In an environment that is using a KMS host, the volume activation process is as follows:

  1. KMS is installed on a server.

  2. The KMS host key is installed on the KMS host, and then activated by contacting the hosted activation services at Microsoft.

  3. After the KMS is enabled, it registers an SRV record in Domain Name System (DNS) each time KMS is started or once per day.

  4. A KMS client computer discovers the KMS host from a configured registry entry or through the KMS SRV record in DNS.

  5. The client sends an RPC request to the KMS host on 1688/TCP (the default setting). This request includes an encrypted client computer ID. If the computer has never been activated and there is no response from the KMS host, the client sends a new request after two hours. If the computer has been activated, the client sends a new reactivation request after seven days.

  6. The KMS host adds the client computer ID to a table and returns the activation count to the client.

  7. The client evaluates the activation count against the license policy and activates if the activation threshold is met.

    Volume Activation OverviewNote

    KMS maintains an activation threshold, which requires that the organization activate at least five computers (physical or virtual machines) running a server operating system with Windows Server 2012 or later and at least 25 client computers running Windows 8 or later. The computers running Windows Server 2012 must connect within a 30-day period to active KMS client computers.

In an environment that is using Active Directory-based Activation, the volume activation process is as follows:

  1. A user with Enterprise Administrator permissions installs the Active Directory-based Activation role service on a domain controller, including the KMS host key, and then activates the KMS host key with the activation services that are hosted by Microsoft.

    Volume Activation OverviewNote

    This installation can be completed from any computer where the Volume Activation Tools console is installed.

  2. When a domain-joined computer running Windows with a GVLK starts, the licensing service on the client automatically queries the domain controller for licensing information.

    Volume Activation OverviewNote

    Active Directory-based Activation cannot be used to license computers that are not members of the domain.

  3. If a valid activation object is found, activation proceeds silently without user intervention. The same renewal guidelines apply to Active Directory-based Activation as to KMS activation.

    Volume Activation OverviewNote

    If volume license information is not found in AD DS, clients running Windows look for a KMS host, and then attempt activation by following the KMS activation process.

If Active Directory-based Activation or KMS activation are not options (such as to license computers in remote locations), MAK keys can be distributed as part of an operating system p_w_picpath. This is done through WMI script and the change product key wizard, or by using VAMT. After a MAK is installed, each client needs to connect to Microsoft individually over the Internet or by telephone to complete activation.

A second MAK validation option is available for client computers that are not connected to the Internet, such as in remote or highly secured environments. In MAK Proxy activation, VAMT installs a MAK product key on a client computer, obtains the installation ID (IID) from the target computer, sends the IID to Microsoft on behalf of the client, and obtains a confirmation ID (CID). The tool then activates the client computer by installing the CID.

Practical applications

Validating the licenses and activating tens, hundreds, or thousands of computers in multiple locations is an important network administration task. By doing so, you verify that operating systems and applications are genuine, have not been compromised, and will be supported. Volume Activation Services in can help you accomplish these tasks.

The following are common licensing and activation-related questions.

What is activation?

Product activation is the process of validating software with the manufacturer. Activation confirms the genuine status of a product and that the product key has not been compromised. It establishes a relationship between the software’s product key and a particular installation of that software on a device. In earlier versions of the Windows operating system, activation and validation (using the Windows Genuine tool) occurred separately. This caused confusion for users who thought the terms were interchangeable. In Windows operating systems starting with Windows Server 2012 or Windows 8, activation and validation occur at the same time.

What are my activation options?

For released versions of Windows client and server operating systems, licenses can be obtained through the following channels:

What happens if systems are not activated?

Activation is designed to be relatively transparent to users. However, the operating system must be activated immediately upon installation. Failure to activate the Windows operating systems will prevent users from completing customization.

When should I use volume activation?

Customers can use one or all three of the volume activation scenarios described earlier (KMS, Active Directory-based activation, or MAK) to activate systems in their environments.

System requirements

Volume activation services can be installed and used on any computer running Windows Server 2012 or later operating system.

Active Directory-based Activation requires that AD DS be at the schema level of Windows Server 2012 or later in order to store activation objects. Domain controllers that are running earlier versions of Windows Server can activate clients after their schemas have been updated using the Windows Server 2012 version of Adprep.exe.

KMS can be installed by using the Server Manager on any computer running Windows Server 2012 or later operating system. It can also be installed from the command line and used on computers running earlier versions of Windows Server.

KMS can be used to activate computers running any version of Windows that can be a member of a domain.

Additional information

Resource

Windows Server 2008 R2 and Windows 7

Windows Server 2012, Windows Server 2012 R2, Windows 8, and Windows 8.1

Product evaluation



Test Lab Guide: Demonstrate Volume Activation Services


Procedures

Volume Activation Operations Guide


Technical content

Volume Activation Technical Reference Guide


Design, planning and deployment

Volume Activation Planning Guide

Volume Activation Deployment Guide

Plan for Volume Activation

Troubleshooting

Solutions to Common Volume Activation Errors


General information and additional resources

Volume Activation Management Tool (VAMT) Overview

Plan volume activation of Office 2013 Preview

Volume activation methods in Office 2013 Preview 


推荐阅读:
  1. 微软批量产品KMS服务
  2. 使用linux的groupmod命令更改群组识别码或名称

免责声明:本站发布的内容(图片、视频和文字)以原创、转载和分享为主,文章观点不代表本网站立场,如果涉及侵权请联系站长邮箱:is@yisu.com进行举报,并提供相关证据,一经查实,将立刻删除涉嫌侵权内容。

kms ct

上一篇:ORM表多对多的操作

下一篇:怎样快速组建异地虚拟局域网

相关阅读

您好,登录后才能下订单哦!

密码登录
登录注册
其他方式登录
点击 登录注册 即表示同意《亿速云用户服务条款》