Office of Information Technology

1, Set up KeyClient. 2, Get Application(s). 3, Install.

Step 1: Install and Configure Key Client

1.1 KeyClient

To install and use the applications from this download site, you must have KeyClient installed. This small program transparently negotiates license checkout from the KeyServer. Many UA computers set up by IT departments already have this software installed, but if yours does not, or you wish to upgrade to the most current version, click on the "KeyClient" link in the menu at the left to download an installer.


  • Download KeyAccess software, then double click or otherwise run the downloaded installer;
  • Configure the Windows client in the dialog box that appears:
    • Choose TCP/IP (Winsock) for network protocol
    • Choose Windows login name for user name sources
    • Enter ( in the field for KeyServer's name or address

Macintosh OS X

  • Download KeyAccess software, then double click or otherwise run the downloaded installer;
  • Follow the instructions in the dialog box to install the client.
    • You will need to enter your login password to install the software.
    • Enter in the field for KeyServer's name or address

1.2 Check Firewall Settings

Client computers must be able to send to and receive data from the KeyServer process on port 19283 and shadow (fail-over) servers on port 19315. Click here for more information, including configuring the built-in firewall in Windows XP SP 2.

1.3 KeyCheckout (option for laptops only)

Run KeyCheckout while conneted to the UA network to check out application licenses for those applications that will be used off the UA network. The portable licenses expire after a pre-determined check-out time (usually 17 days). 

Only laptop computers that will be used both on and off the UA network need KeyCheckout to run keyed applications.  Some applications do not require a portable key to run, and some applications are not allowed to run with a portable key, so check the note in the menu item for applications you wish to use off-network.

The KeyCheckout program is intended to be placed in the following locations on your startup drive so that it is accessible from the Windows Control Panel or the Macintosh Systems Preferences panel for KeyAccess:

  • Windows: \Program Files\Sassafras K2\Client
  • Macintosh: /Library/KeyAccess

Step 2: Download application(s) and copy serial numbers

2.1 Download application installer(s)

Download the application installer(s) to your computer by clicking on the links in the download tables. Your browser should automatically convert these formats into folders and applications, but you may need to convert them after downloading by double clicking on the downloaded archive.  Be careful to note where you save the downloaded files.

2.2 Copy the serial number(s)

Copy the serial number(s) for the licensed applications you will install from the table; you will generally, though not always, need to enter a valid serial number as part of the installation process or, for some applications, the first time you run the application.

Step 3: Install Application and clean up

3.1 Find the application or installer

You may need the UA serial numbers from the applications list.

Find the application or installer downloaded onto your computer in step 2 and run it; if the application appears in a virtual volume, drag to the application to the Application or Programs directory of the startup volume. Please read the notice about your obligations regarding use of the application and KeyAccess. Most vendor's installation programs present additional dialogs requiring your input:

  • Please select a "typical" installation (the default choice) if the choice is offered.
  • When prompted for registration information, enter University of Alaska for the institution
  • Paste or enter the serial number you copied in step 1 (incorrect serial numbers will not work)
  • If you elect to read the "read me" file at the end of installation, this may take you to the vendor's web site.

3.2 Delete Application Installers

The installers are no longer needed, and they take up a lot of space on your drive, so delete them.

Back to Top