Volume Activation Overview

Updated: March 19, 2014

Applies To: Windows 10, Windows 8.1, Windows Server 2012 R2, Windows Server 2016 Standard Technical Preview 5, Windows Server 2016 Datacenter Technical Preview 5

This technical overview for the IT professional describes the volume activation technologies in Windows operating systems and how your organization can benefit from using these technologies to deploy and manage volume licenses for a medium to large number of computers.

Did you mean…

Volume activation description

A number of technologies are available in Windows client and server operating systems to simplify the task of configuring the distribution and management of an organization’s volume software licenses. These technologies include:

  • The Volume Activation Services server role   Volume Activation Services is a server role Windows Server starting with Windows Server 2012 that enables you to automate and simplify the issuance and management of Microsoft software volume licenses for a variety of scenarios and environments. With Volume Activation Services, you can install and configure the Key Management Service (KMS) and enable Active Directory-based Activation.
  • Key Management Service (KMS)   KMS is a role service that allows organizations to activate systems within their network from a server where a KMS host has been installed. With KMS, IT pros can complete activations on their local network, eliminating the need for individual computers to connect to Microsoft for product activation. KMS does not require a dedicated system, and it can be cohosted on a system that provides other services. By default, volume editions of Windows client and server operating systems connect to a system that hosts the KMS service to request activation. No action is required from the user.
  • Active Directory-based Activation   Active Directory-based Activation is a role service that allows you to use Active Directory Domain Services (AD DS) to store activation objects, which can further simplify the task of maintaining volume activation services for a network. With Active Directory-based Activation, no additional host server is needed, and activation requests are processed during computer startup.

    Any computers running a client or server operating system with a Generic Volume License Key (GVLK) that are connected to the domain will activate automatically and transparently. They will stay activated as long as they remain members of the domain and maintain periodic contact with a domain controller. Activation takes place after the licensing service starts. When this service starts, the computer running a Windows client or server operating system contacts AD DS automatically, receives the activation object, and activates without user intervention.

    Note

    AD DS must be at the schema level of Windows Server 2012 or newer to store activation objects. Domain controllers running earlier versions of Windows Server can activate clients after their schemas have been updated using the Windows Server 2012 version of Adprep.exe. For more information, see Running Adprep.exe.

  • Volume Activation Tools console   The Volume Activation Tools snap-in is installed with KMS and Active-Directory–based Activation. You can use the Volume Activation Tools console to install, activate, and manage one or more volume activation license keys in AD DS or on a KMS host.

Other Microsoft volume activation technologies that can be used in conjunction with Windows server operating systems include:

  • Volume Activation Management Tool (VAMT)   The VAMT is a free downloadable MMC snap-in that is included in the Windows Assessment and Deployment Kit (ADK) that enables network administrators and other IT professionals to automate and centrally manage the Windows and Microsoft Office volume and retail activation process. VAMT can manage volume activation by using Multiple Activation Keys (MAKs) or the Windows Key Management Service (KMS).

    VAMT 3.0 includes all the major functionality of the previously released versions of VAMT, and it includes an improved interface, data storage in a SQL Server database for greater scalability and speed, new reporting options, the ability to use Windows PowerShell cmdlets, and new context-sensitive Help. In addition, VAMT 3.0 supports Active Directory-based Activation in addition to KMS and MAK activation. VAMT version 3.1 is included in the Windows ADK. For more information about VAMT, see Volume Activation Management Tool (VAMT) Technical Reference, and VAMT How-To Topics

  • Multiple Activation Key (MAK)   A MAK is a volume license key that is used for one-time activation with activation services that are hosted by Microsoft. There are two ways to use MAK to activate computers:
    • MAK independent activation   Each computer must independently connect and be activated by Microsoft over the Internet or by telephone.
    • MAK proxy activation   A computer that is acting as a MAK proxy gathers activation information from multiple computers on the network, and then sends a centralized activation request to Microsoft on their behalf. MAK proxy activation is configured by using the Volume Activation Management Tool (VAMT).
  • Automatic Virtual Machine Activation AVMA lets you install virtual machines on a properly activated Windows server without having to manage product keys for each individual virtual machine, even in disconnected environments. There are no product keys to manage and no stickers on the servers to read. The virtual machine is activated and continues to work even when it is migrated across an array of virtualization servers. AVMA only requires a virtualization server running Windows Server 2012 R2 Datacenter. The guest virtual machine operating system must be Windows Server 2012 R2 Datacenter, Windows Server 2012 R2 Standard, or Windows Server 2012 R2 Essentials. For more details about AVMA, see Automatic Virtual Machine Activation.

How does volume activation work?

Before you configure and use volume activation technologies, it may be helpful to understand how volume activation works.

In an environment that is using a KMS host, the volume activation process is as follows:

  1. KMS is installed on a server.
  2. The KMS host key is installed on the KMS host, and then activated by contacting the hosted activation services at Microsoft.
  3. After the KMS is enabled, it registers an SRV record in Domain Name System (DNS) each time KMS is started or once per day.
  4. A KMS client computer discovers the KMS host from a configured registry entry or through the KMS SRV record in DNS.
  5. The client sends an RPC request to the KMS host on 1688/TCP (the default setting). This request includes an encrypted client computer ID. If the computer has never been activated and there is no response from the KMS host, the client sends a new request after two hours. If the computer has been activated, the client sends a new reactivation request after seven days.
  6. The KMS host adds the client computer ID to a table and returns the activation count to the client.
  7. The client evaluates the activation count against the license policy and activates if the activation threshold is met.
    Note

    KMS maintains an activation threshold, which requires that the organization activate at least five computers (physical or virtual machines) running a server operating system with Windows Server 2012 or later and at least 25 client computers running Windows 8 or later. The computers running Windows Server 2012 must connect within a 30-day period to active KMS client computers.

In an environment that is using Active Directory-based Activation, the volume activation process is as follows:

  1. A user with Enterprise Administrator permissions installs the Active Directory-based Activation role service on a domain controller, including the KMS host key, and then activates the KMS host key with the activation services that are hosted by Microsoft.

    Note

    This installation can be completed from any computer where the Volume Activation Tools console is installed.

  2. When a domain-joined computer running Windows with a GVLK starts, the licensing service on the client automatically queries the domain controller for licensing information.
    Note

    Active Directory-based Activation cannot be used to license computers that are not members of the domain.

  3. If a valid activation object is found, activation proceeds silently without user intervention. The same renewal guidelines apply to Active Directory-based Activation as to KMS activation.
    Note

    If volume license information is not found in AD DS, clients running Windows look for a KMS host, and then attempt activation by following the KMS activation process.

If Active Directory-based Activation or KMS activation are not options (such as to license computers in remote locations), MAK keys can be distributed as part of an operating system image. This is done through WMI script and the change product key wizard, or by using VAMT. After a MAK is installed, each client needs to connect to Microsoft individually over the Internet or by telephone to complete activation.

A second MAK validation option is available for client computers that are not connected to the Internet, such as in remote or highly secured environments. In MAK Proxy activation, VAMT installs a MAK product key on a client computer, obtains the installation ID (IID) from the target computer, sends the IID to Microsoft on behalf of the client, and obtains a confirmation ID (CID). The tool then activates the client computer by installing the CID.

Practical applications

Validating the licenses and activating tens, hundreds, or thousands of computers in multiple locations is an important network administration task. By doing so, you verify that operating systems and applications are genuine, have not been compromised, and will be supported. Volume Activation Services in can help you accomplish these tasks.

The following are common licensing and activation-related questions.

What is activation?

Product activation is the process of validating software with the manufacturer. Activation confirms the genuine status of a product and that the product key has not been compromised. It establishes a relationship between the software’s product key and a particular installation of that software on a device. In earlier versions of the Windows operating system, activation and validation (using the Windows Genuine tool) occurred separately. This caused confusion for users who thought the terms were interchangeable. In Windows operating systems starting with Windows Server 2012 or Windows 8, activation and validation occur at the same time.

What are my activation options?

For released versions of Windows client and server operating systems, licenses can be obtained through the following channels:

  • Retail   Microsoft software products that are acquired through a retail store are individually licensed and come with one unique product key (printed on the product packaging), which the user enters during product installation. The computer uses this product key to complete activation after the software installation is complete. This final activation step can be accomplished online or by telephone.
  • Original equipment manufacturer (OEM)   Most OEMs sell systems that include a standard build of Windows and other software. OEM activation is performed by associating the operating system to the firmware of the computer. This process occurs before the computer is sent to the customer so that the software is already activated and no additional actions are required by the user. OEM activation remains valid as long as the customer uses the OEM-provided image on the computer. If customers want to create customized images, they can use the image provided by the OEM as the basis for creating custom images.
  • Volume licensing   A volume license is a product key that allows an organization to activate a specific number of clients to use a particular piece of software. Microsoft Volume Licensing offers customized programs that are tailored to the size and purchasing preference of a variety of organizations. To become a volume licensing customer, the organization needs to set up a volume license agreement with Microsoft.

What happens if systems are not activated?

Activation is designed to be relatively transparent to users. However, the operating system must be activated immediately upon installation. Failure to activate the Windows operating systems will prevent users from completing customization.

When should I use volume activation?

Customers can use one or all three of the volume activation scenarios described earlier (KMS, Active Directory-based activation, or MAK) to activate systems in their environments.

  • When to use the Key Management Service (KMS): KMS is the default key for volume activation clients, regardless of the Windows version they are running. If you have a network where multiple versions of Windows client and server operating systems are deployed, you will probably want to use KMS to activate them.

    Important

    Installations of KMS on Windows 7 SP1 or Windows Server 2008 R2 SP1 must be updated in order to support activation of clients running operating systems starting with Windows 8 or Windows Server 2012. For more information, see An update that adds support for Windows 8 and for Windows Server 2012 to Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 KMS hosts is available.

    KMS enables organizations to activate systems within their network, eliminating the need for individual computers to connect to Microsoft for product activation.

    To use KMS activation, the computer must have the qualifying operating system license (often obtained through OEMs as part of a new computer purchase), and they must contain a Windows marker in the BIOS.

  • When to use Active Directory-based Activation: Active Directory-based Activation simplifies the process of activating clients that are running an operating system starting with Windows 8 or Windows Server 2012. In addition, it requires the AD DS schema of Windows Server 2012 or later.

    Activation objects themselves are not editable. However, an administrator with proper permissions can use advanced AD DS tools to view each activation object and to configure security access control lists (ACLs) for the activation objects to restrict access as needed. Administrators can delete activation objects, if necessary. On a local client, a user can use the command line to perform these functions if they have Write access to the activation object.

  • When to use Multiple Activation Key (MAK): Not all of an organization’s computers are conveniently located on the organization’s networks. Computers may be laptops that are in the possession of employees who travel frequently, may be located in branch offices that do not have good connectivity to the host network, or may be part of extremely secure networks that are disconnected from the main network. You can use MAK to activate these clients.
    Note

    For more information about configuring and using MAK activation, see the Volume Activation Deployment Guide

System requirements

Volume activation services can be installed and used on any computer running Windows Server 2012 or later operating system.

Active Directory-based Activation requires that AD DS be at the schema level of Windows Server 2012 or later in order to store activation objects. Domain controllers that are running earlier versions of Windows Server can activate clients after their schemas have been updated using the Windows Server 2012 version of Adprep.exe.

KMS can be installed by using the Server Manager on any computer running Windows Server 2012 or later operating system. It can also be installed from the command line and used on computers running earlier versions of Windows Server.

KMS can be used to activate computers running any version of Windows that can be a member of a domain.

Additional information


Resource


Windows Server 2008 R2 and Windows 7


Windows Server 2012, Windows Server 2012 R2, Windows 8, and Windows 8.1


Product evaluation


Test Lab Guide: Demonstrate Volume Activation Services


Procedures


Volume Activation Operations Guide


Technical content


Volume Activation Technical Reference Guide


Design, planning and deployment


Volume Activation Planning Guide

Volume Activation Deployment Guide


Plan for Volume Activation


Troubleshooting


Solutions to Common Volume Activation Errors


General information and additional resources


Volume Activation Management Tool (VAMT) Overview


Plan volume activation of Office 2013 Preview

Volume activation methods in Office 2013 Preview

时间: 2024-10-08 03:05:53

Volume Activation Overview的相关文章

Windows Server 2016 Volume Activation Tips

This is Scott McArthur, a Supportability Program Manager for Windows and Surface. With the launch of Windows Server 2016 I wanted to share some information on volume activation: Updating your existing KMS hosts to support Windows Server 2016 Setting

Cisco IOS LAN Base、IP Base 和IP Service的区别

Details: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3560-x-series-switches/white_paper_c11-579326.html The LAN Base feature set offers enhanced intelligent services that include comprehensive Layer 2 features, with up-to 255 V

Unity3D用户手册

Welcome to Unity. 欢迎使用Unity. Unity is made to empower users to create the best interactive entertainment or multimedia experience that they can. This manual is designed to help you learn how to use Unity, from basic to advanced techniques. It can be

ospp.vbs是什么文件?激活过程cscript ospp.vbs命令详解

ospp.vbs是什么文件?激活过程cscript ospp.vbs命令详解 在Office 2013激活过程中我们经常会用到cscript ospp.vbs这个命令.那么,很有必要来了解一下,ospp.vbs到底是什么文件?Cscript.exe是脚本运行引擎,这里就不多介绍了.ospp全称为:Office Software Protection Platform,vbs大家都知道是脚本文件,所以得出结论,ospp.vbs就是:Office软件保护平台脚本.它是目前Office自身提供的激活管

开源实践分享:Ceph bluestore部署实践

Ceph bluestore部署 首先为大家分享Ceph bluestore具体该如何部署,使用环境如下? 单节点? CentOS 7.4? 使用 ceph-deploy 进行部署准备 centos 7.4 系统的机器,并配置好 ssh 的无密码登录. 安装 ceph-deployyum install?https://download.ceph.com/rpm-luminous/el7/noarch/ceph-deploy-2.0.0-0.noarch.rpm数据 ceph 安装包mkdir

[转帖] 百度知道: KMS 和OSPP

https://zhidao.baidu.com/question/1819332749671662308.html Key Management Service (KMS).目前Windows Server 2008.Windows7和Office 2010都支持以KMS的方式进行激活.Office软件保护平台脚本(Office Software Protection Platform , ospp.vbs)是Office 2010自身提供的激活管理工具. 准备工作以管理员权限(run as

39. Volume Rendering Techniques

Milan Ikits University of Utah Joe Kniss University of Utah Aaron Lefohn University of California, Davis Charles Hansen University of Utah This chapter presents texture-based volume rendering techniques that are used for visualizing three-dimensional

XIV(1)—Hardware Overview

IBM XIV被业内称为革命性的新一代存储架构,它是采用了大规模并行的分布式网格存储技术,使用了"Scale out"(横向扩展)的存储架构,利用多路网格模块并行分担存储负荷,并通过细粒度数据分布算法保证数据的恒定均衡分布,它不但提高了系统的可靠性.可用性和存取效率,还易于扩展. 1,System models and components Machine type 2812-A14    Machine type 2810-A14     Machine type 2812-114

Deep Networks : Overview

Overview In the previous sections, you constructed a 3-layer neural network comprising an input, hidden and output layer. While fairly effective for MNIST, this 3-layer model is a fairly shallow network; by this, we mean that the features (hidden lay