LogoLogo
  • Welcome to Cyphor
  • .NET Code Obfuscation
    • Getting Started
    • How to Obfuscate
    • Basic Code Obfuscation
      • Symbol Renaming
      • Body Mutation
      • Control Flow
      • Constant Encryption
      • Call Hiding
      • Debug Protection
      • Integrity Checks
      • Self Healing
    • Advanced Obfuscation
      • Attribute-Based Obfuscation
      • Guide to obfuscation
      • Code Inlining
      • What is RASP?
      • Protections that protect each other
      • Program not working after obfuscation
      • Keeping performance with obfuscation
      • Virtualization
  • Dashboard
    • Files
    • Billing
      • Pay as you go
      • Examples
    • Projects
      • Code Guard Tasks
      • Permissions
        • Roles
      • Files
      • SAML and SSO
  • Code Guard
    • Introduction
    • Implement with your licensing system
      • Setting up a gateway
      • Setting up the SDK
    • Secured values
      • Dynamic values
      • Code Encryption
        • Page 1
    • Preventing analysis
    • Enhanced visibility
      • Disabling tracing on production
      • Logging external methods
      • Optimizing Memory Usage
    • Edge connectivity
    • Preventing modifications
      • Preventing assembly load
      • Allowing partial tampering
      • Enterprise EDRs and XDRs
      • Dynamic Hook protection
      • Thread hijacking
      • Guard Checksums
      • DLL Injection
      • Handling complex RE attacks
        • Custom payload detection
    • Granular Integrity Checks
    • Virtualized Environments
    • Troubleshooting
    • Threat database
    • Real time alerts
      • Alert Insights
  • CLI Tool
    • Introduction
    • Global options
    • Profiles
    • Projects
    • Obfuscator
      • Obfuscation Schemes
      • Task templates
      • Protecting files
        • Global obfuscation flags
        • Using templates to obfuscate files
        • Quick obfuscation
      • Monitoring obfuscation jobs
    • Securing local storage
Powered by GitBook
On this page

Was this helpful?

  1. Code Guard
  2. Implement with your licensing system

Setting up a gateway

Before getting the .NET SDK installed in your project, it is important to setup the authorization endpoint. This can be done through the Codeguard dashboard.

Once the endpoint is configured, Codeguard will send a request to your endpoint whenever a connection is established. The .NET SDK will then serialize the data and send it as a POST request to the endpoint.

Accepting and rejecting connections

Upon successful configuration of the gateway endpoint, it is necessary to establish a method for the Codeguard nodes to interpret the response from your licensing endpoint.

The initial method for determining authorization is through the HTTP response code. If the endpoint returns a 401 Unauthorized error, the Codeguard node will reject the incoming connection. Conversely, if the response is a 200 status code, the node will authorize the connection.

Alternatively, if the licensing endpoint's return codes do not align with this format, it is possible to implement a Regex pattern to override the previously described behavior. This pattern will be matched against the endpoint response, and if a match is found, the session will be authorized.

PreviousImplement with your licensing systemNextSetting up the SDK

Last updated 1 year ago

Was this helpful?