Contents - Index


4.2.1.1 Quick Start

Protecting an application with Sheriff requires four steps:

  1. Product Identification
  2. Product Registration
  3. Licence Authorisation
  4. Runtime Implementation

These steps are explained in detail in topics that follow.