Skip to main content

Dictionary

TermDefintion
Asymmetric EncryptionAlso known as public-key cryptography. A public key is used to encrypt data while a pivate key is used to decrypt data.
EntitlementAn entitlement is a right to use, access, or consume a resource.
KeypairsKeypairs are a part of asymmetric cryptography. They consist of a public and private key which are different, but mathematically related.
LicenseThe entitlements, validity date range, and metadata used to determine how a resource can be used. This is typically a JWT file.
License KeyThe authorization key used to verify the authenticity of the license. This key verifies the signature of the license. This is typically an encrypted public key.
Owner KeyThis authentication key uniquely verifies the license holder's ownership of the license key. This is typically private key.