Confused about Windows Vista Volume Activation 2.0?

 

The following description comes from the Windows Vista Activation FAQ located at https://www.microsoft.com/technet/windowsvista/plan/faq.mspx

Volume Activation 2.0

Volume Activation 2.0 supports centrally managed Volume License keys. It provides the following two types of keys to customers:

  • Multiple Activation Key (MAK): Although resident on individual computers, this key is encrypted and kept in a trusted store, so that users are not exposed to it and are unable to obtain it once installed on the computer.
  • Key Management Service (KMS) Key: This key is only installed on the KMS host and never on individual computers.

Customers can use any of these keys depending on the needs of their organization and its network infrastructure.

Volume Activation 2.0 supports a simplified setup, and is generally invisible to the users. By default, volume editions do not require a product key to be entered during setup. There is an automatic 30-day grace period during which the computer must be activated.

System administrators can count KMS activations using standard system management software, for example, Microsoft Operations Manager (MOM). Windows Management Infrastructure (WMI), extensive event logging, and built-in Application Programming Interfaces (APIs) can provide a wealth of detail about installed licenses as well as the license state and current grace or expiration period of MAK- and KMS-activated computers.

Volume Activation 2.0 also may provide enhanced security through frequent background validations for genuine modules. This is currently limited to critical software, but may be expanded greatly over time.

Benefits of Volume Activation 2.0

Volume Activation 2.0 provides the following two types of keys, and three methods of activation, to customers:

  • Multiple Activation Key (MAK)
    • MAK Proxy Activation
    • MAK Independent Activation
  • Key Management Service (KMS) Key
    • KMS Activation

Depending on the needs of their organization and its network infrastructure, customers can opt to use any of these activation methods.

MAK Activation

So what exactly is MAK activation? It uses a technology similar to that in use with MSDN Universal and Microsoft Action Pack subscriptions. Each product key can activate a specific number of computers. MAK activation is required only once, unless there are significant hardware changes. If the use of volume-licensed media is not controlled, excessive activations result in a depletion of the activation limit.

There are two ways to activate computers using MAK:

  • MAK Proxy Activation: Enables centralized activation request on behalf of multiple desktops with one connection to Microsoft. MAK Proxy Activation will be available in the solution code name Volume Activation Management Tool (VAMT) which is currently under development with expected availability in 2007.
  • MAK Independent Activation: Requires each target computer to independently connect and activate against Microsoft.

What about Key Activiation? The Key Management Service (KMS) enables organizations to perform local activations for computers in a managed environment without the need to connect to Microsoft. A KMS key is used to enable KMS on a computer controlled by the system administrator in an organization. KMS activation is targeted at managed environments where more than 25 computers are connected to the organizational network. Computers running Windows Vista activate by connecting to a central Windows Vista computer running KMS.

 

KMS Activation

In case of KMS activation, client computers must connect to a KMS host at least once every 180 days to renew their activation. Computers that are not activated try to connect with the KMS host every two hours (value configurable). Once activated, these computers attempt to renew their activation (locally) every seven days (value configurable), and if successful, their 180-day activation life span is renewed.

The computers locate the KMS host using one of the following two methods:

  • Auto-discovery: The computer uses Domain Name System (DNS) service records to automatically locate a local KMS host.
  • Direct connection: A system administrator specifies the KMS host location and communication port

The client computers have a 30-day grace period to complete the activation. Computers that are not activated within this grace period go into Reduced Functionality Mode (RFM). For more information about RFM, see Reduced Functionality.

For more detailed information download the Windows Vista Volume Activation 2.0 Technical Guidance document, and the Windows Vista Volume Activation 2.0 Step-By-Step Guide