Silk Meter architecture and design considerations

The following diagram shows how Silk Meter licensing and metering are used in an application.

  1. A client accesses the Web server and requests usage of a Silk Meter-controlled application or component.

  2. The request is passed to the Usage Control Server, which determines whether or not to grant access to the e-business application, based on information contained in the policy.
    Note
    : If there are multiple valid policies for the same product, the first one in the list that satisfies the request is being used. The following policies are ignored in this case. The order in which the policies are validated is the same as you see in the list of policies on the Policy Administrator window.

  3. The Usage Control Server then authorizes the application to grant access to the requested application or component via the Web server. If the Usage Control Server denies access to the application or component, the Web server may display an error message.

  4. Metering data is collected and stored. These statistics are accessible from the Policy Administrator window.

Design considerations

Silk Meter is constructed for flexibility and extensibility:

Related Topics