License Information documents

Repository for licenses under the IPLA family

IMPORTANT: READ CAREFULLY

Two license agreements are presented below.

1. IBM International License Agreement for Evaluation of Programs
2. IBM International Program License Agreement

If Licensee is obtaining the Program for purposes of productive use (other than evaluation, testing, trial "try or buy," or demonstration): By clicking on the "Accept" button below, Licensee accepts the IBM International Program License Agreement, without modification.

If Licensee is obtaining the Program for the purpose of evaluation, testing, trial "try or buy," or demonstration (collectively, an "Evaluation"): By clicking on the "Accept" button below, Licensee accepts both (i) the IBM International License Agreement for Evaluation of Programs (the "Evaluation License"), without modification; and (ii) the IBM International Program License Agreement (the "IPLA"), without modification.

The Evaluation License will apply during the term of Licensee's Evaluation.

The IPLA will automatically apply if Licensee elects to retain the Program after the Evaluation (or obtain additional copies of the Program for use after the Evaluation) by entering into a procurement agreement (e.g., the IBM International Passport Advantage or the IBM Passport Advantage Express agreements).

The Evaluation License and the IPLA are not in effect concurrently; neither modifies the other; and each is independent of the other.

The complete text of each of these two license agreements follow.



LICENSE INFORMATION

The Programs listed below are licensed under the following License Information terms and conditions in addition to the Program license terms previously agreed to by Client and IBM. If Client does not have previously agreed to license terms in effect for the Program, the International License Agreement for Evaluation of Programs (Z125-5543-05) applies.

Program Name (Program Number):
IBM Security Access Manager Virtual Edition 9.0.6 (Evaluation)
IBM Security Access Manager Virtual Edition Non-Production 9.0.6 (Evaluation)
IBM Security Access Manager Virtual Edition Advanced Access Control Module 9.0.6 (Evaluation)
IBM Security Access Manager Virtual Edition Advanced Access Control Module Non-Production 9.0.6 (Evaluation)
IBM Security Access Manager Virtual Edition Federation Module 9.0.6 (Evaluation)
IBM Security Access Manager Virtual Edition Federation Module Non-Production 9.0.6 (Evaluation)
IBM Security Access Manager Virtual Enterprise Edition 9.0.6 (Evaluation)
IBM Security Access Manager Virtual Enterprise Edition Non-Production 9.0.6 (Evaluation)

The following standard terms apply to Licensee's use of the Program.

Evaluation Period

The evaluation period begins on the date that Licensee agrees to the terms of this Agreement and ends after 90 days.

Prohibited Uses

Licensee may not use or authorize others to use the Program, alone or in combination with other services or products, in support of any of the following high risk activities: design, construction, control, or maintenance of nuclear facilities, mass transit systems, air traffic control systems, automotive control systems, weapons systems, or aircraft navigation or communications, or any other activity where program failure could give rise to a material threat of death or serious personal injury.

Supporting Programs

Licensee is authorized to install and use the Supporting Programs identified below. Licensee is authorized to install and use such Supporting Programs only to support Licensee's use of the Principal Program under this Agreement. The phrase "to support Licensee's use" would only include those uses that are necessary or otherwise directly related to a licensed use of the Principal Program or another Supporting Program. The Supporting Programs may not be used for any other purpose. A Supporting Program may be accompanied by license terms, and those terms, if any, apply to Licensee's use of that Supporting Program. In the event of conflict, the terms in this License Information document supersede the Supporting Program's terms. Licensee must obtain sufficient entitlements to the Program, as a whole, to cover Licensee's installation and use of all of the Supporting Programs, unless separate entitlements are provided within this License Information document. For example, if this Program were licensed on a PVU (Processor Value Unit) basis and Licensee were to install the Principal Program or a Supporting Program on a 100 PVU machine (physical or virtual) and another Supporting Program on a second 100 PVU machine, Licensee would be required to obtain 200 PVU entitlements to the Program.

Supporting Programs:
IBM DB2 Advanced Workgroup Server Edition 11.1
IBM Security Directory Server 6.4
IBM QRadar Log Manager Software 7.3
IBM QRadar Event Capacity 7.3
IBM Security Directory Suite v8.0.1 Limited Edition
IBM Security Directory Integrator 7.2

Prohibited Components

Notwithstanding any provision in the Agreement, Licensee is not authorized to use any of the following components or functions of the Program:
IBM Security Directory Server Proxy server (of IBM Security Directory Server)
IBM Security Directory Integrator Federated Directory Server

Separately Licensed Code

The provisions of this paragraph do not apply to the extent they are held to be invalid or unenforceable under the law that governs this license. Each of the components listed below is considered "Separately Licensed Code". IBM Separately Licensed Code is licensed to Licensee under the terms of the applicable third party license agreement(s) set forth in the NON_IBM_LICENSE file(s) that accompanies the Program. Notwithstanding any of the terms in the Agreement, or any other agreement Licensee may have with IBM, the terms of such third party license agreement(s) governs Licensee's use of all Separately Licensed Code unless otherwise noted below.

Future Program updates or fixes may contain additional Separately Licensed Code. Such additional Separately Licensed Code and related licenses are listed in another NON_IBM_LICENSE file that accompanies the Program update or fix. Licensee acknowledges that Licensee has read and agrees to the license agreements contained in the NON_IBM_LICENSE file(s). If Licensee does not agree to the terms of these third party license agreements, Licensee may not use the Separately Licensed Code.

For Programs acquired under the International Program License Agreement ("IPLA") or International Program License Agreement for Non Warranted Program ("ILAN") and Licensee is the original licensee of the Program, if Licensee does not agree with the third party license agreements, Licensee may return the Program in accordance with the terms of, and within the specified time frames stated in, the "Money-back Guarantee" section of the IPLA or ILAN IBM Agreement.

Note: Notwithstanding any of the terms in the third party license agreement, the Agreement, or any other agreement Licensee may have with IBM:
(a) IBM provides this Separately Licensed Code to Licensee WITHOUT WARRANTIES OF ANY KIND;
(b) IBM DISCLAIMS ANY AND ALL EXPRESS AND IMPLIED WARRANTIES AND CONDITIONS INCLUDING, BUT NOT LIMITED TO, THE WARRANTY OF TITLE, NON-INFRINGEMENT OR INTERFERENCE AND THE IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, WITH RESPECT TO THE SEPARATELY LICENSED CODE;
(c) IBM is not liable to Licensee, and will not defend, indemnify, or hold Licensee harmless for any claims arising from or related to the Separately Licensed Code; and
(d) IBM is not liable for any direct, indirect, incidental, special, exemplary, punitive or consequential damages including, but not limited to, lost data, lost savings, and lost profits, with respect to the Separately Licensed Code.

Notwithstanding these exclusions, in Germany and Austria, IBM's warranty and liability for the Separately Licensed Code is governed only by the respective terms applicable for Germany and Austria in IBM license agreements.

Note: IBM may provide limited support for some Separately Licensed Code. If such support is available, the details and any additional terms related to such support will be set forth in the License Information document.

The following are Separately Licensed Code:
CentOS

Source Components and Sample Materials

The Program may include some components in source code form ("Source Components") and other materials identified as Sample Materials. Licensee may copy and modify Source Components and Sample Materials for internal use only provided such use is within the limits of the license rights under this Agreement, provided however that Licensee may not alter or delete any copyright information or notices contained in the Source Components or Sample Materials. IBM provides the Source Components and Sample Materials without obligation of support and "AS IS", WITH NO WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTY OF TITLE, NON-INFRINGEMENT OR NON-INTERFERENCE AND THE IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

Export and Import Restrictions

This Program may contain cryptography. Transfer to, or use by, users of the Program may be prohibited or subject to export or import laws, regulations or policies, including those of the United States Export Administration Regulations. Licensee assumes all responsibility for complying with all applicable laws, regulations, and policies regarding the export, import, or use of this Program, including but not limited to, U.S. restrictions on exports or reexports. To obtain the export classification of this Program refer to: https://www.ibm.com/products/exporting/.



LICENSE INFORMATION

The Programs listed below are licensed under the following License Information terms and conditions in addition to the Program license terms previously agreed to by Client and IBM. If Client does not have previously agreed to license terms in effect for the Program, the International Program License Agreement (Z125-3301-14) applies.

Program Name (Program Number):
IBM Security Access Manager Virtual Edition 9.0.6 (5725-V90)
IBM Security Access Manager Virtual Edition Non-Production 9.0.6 (5725-V90)
IBM Security Access Manager Virtual Edition Advanced Access Control Module 9.0.6 (5725-V90)
IBM Security Access Manager Virtual Edition Advanced Access Control Module Non-Production 9.0.6 (5725-V90)
IBM Security Access Manager Virtual Edition Federation Module 9.0.6 (5725-V90)
IBM Security Access Manager Virtual Edition Federation Module Non-Production 9.0.6 (5725-V90)
IBM Security Access Manager Virtual Enterprise Edition 9.0.6 (5725-V90)
IBM Security Access Manager Virtual Enterprise Edition Non-Production 9.0.6 (5725-V90)

The following standard terms apply to Licensee's use of the Program.

Limited use right

As described in the International Program License Agreement ("IPLA") and this License Information, IBM grants Licensee a limited right to use the Program. This right is limited to the level of Authorized Use, such as a Processor Value Unit ("PVU"), a Resource Value Unit ("RVU"), a Value Unit ("VU"), or other specified level of use, paid for by Licensee as evidenced in the Proof of Entitlement. Licensee's use may also be limited to a specified machine, or only as a Supporting Program, or subject to other restrictions. As Licensee has not paid for all of the economic value of the Program, no other use is permitted without the payment of additional fees. In addition, Licensee is not authorized to use the Program to provide commercial IT services to any third party, to provide commercial hosting or timesharing, or to sublicense, rent, or lease the Program unless expressly provided for in the applicable agreements under which Licensee obtains authorizations to use the Program. Additional rights may be available to Licensee subject to the payment of additional fees or under different or supplementary terms. IBM reserves the right to determine whether to make such additional rights available to Licensee.

Specifications

Program's specifications can be found in the collective Description and Technical Information sections of the Program's Announcement Letters.

Prohibited Uses

Licensee may not use or authorize others to use the Program, alone or in combination with other services or products, in support of any of the following high risk activities: design, construction, control, or maintenance of nuclear facilities, mass transit systems, air traffic control systems, automotive control systems, weapons systems, or aircraft navigation or communications, or any other activity where program failure could give rise to a material threat of death or serious personal injury.

Supporting Programs

Licensee is authorized to install and use the Supporting Programs identified below. Licensee is authorized to install and use such Supporting Programs only to support Licensee's use of the Principal Program under this Agreement. The phrase "to support Licensee's use" would only include those uses that are necessary or otherwise directly related to a licensed use of the Principal Program or another Supporting Program. The Supporting Programs may not be used for any other purpose. A Supporting Program may be accompanied by license terms, and those terms, if any, apply to Licensee's use of that Supporting Program. In the event of conflict, the terms in this License Information document supersede the Supporting Program's terms. Licensee must obtain sufficient entitlements to the Program, as a whole, to cover Licensee's installation and use of all of the Supporting Programs, unless separate entitlements are provided within this License Information document. For example, if this Program were licensed on a PVU (Processor Value Unit) basis and Licensee were to install the Principal Program or a Supporting Program on a 100 PVU machine (physical or virtual) and another Supporting Program on a second 100 PVU machine, Licensee would be required to obtain 200 PVU entitlements to the Program.

Supporting Programs:
IBM DB2 Advanced Workgroup Server Edition 11.1
IBM Security Directory Server 6.4
IBM QRadar Log Manager Software 7.3
IBM QRadar Event Capacity 7.3
IBM Security Directory Suite v8.0.1 Limited Edition
IBM Security Directory Integrator 7.2

Prohibited Components

Notwithstanding any provision in the Agreement, Licensee is not authorized to use any of the following components or functions of the Program:
IBM Security Directory Server Proxy server (of IBM Security Directory Server)
IBM Security Directory Integrator Federated Directory Server

Non-Production Limitation

If the Program is designated as "Non-Production", the Program can only be deployed as part of the Licensee's internal development and test environment for internal non-production activities, including but not limited to testing, performance tuning, fault diagnosis, internal benchmarking, staging, quality assurance activity and/or developing internally used additions or extensions to the Program using published application programming interfaces. Licensee is not authorized to use any part of the Program for any other purposes without acquiring the appropriate production entitlements.

Components Not Used for Establishing Required Entitlements

When determining the number of entitlements required for Licensee's installation or use of the Program, the installation or use of the following Program components are not taken into consideration. In other words, Licensee may install and use the following Program components, under the license terms, but these components are not used to determine the number of entitlements required for the Program.
IBM DB2 Advanced Workgroup Server Edition
IBM Tivoli Directory Integrator
IBM Security Directory Server
IBM Security Directory Suite Limited Edition

Separately Licensed Code

The provisions of this paragraph do not apply to the extent they are held to be invalid or unenforceable under the law that governs this license. Each of the components listed below is considered "Separately Licensed Code". IBM Separately Licensed Code is licensed to Licensee under the terms of the applicable third party license agreement(s) set forth in the NON_IBM_LICENSE file(s) that accompanies the Program. Notwithstanding any of the terms in the Agreement, or any other agreement Licensee may have with IBM, the terms of such third party license agreement(s) governs Licensee's use of all Separately Licensed Code unless otherwise noted below.

Future Program updates or fixes may contain additional Separately Licensed Code. Such additional Separately Licensed Code and related licenses are listed in another NON_IBM_LICENSE file that accompanies the Program update or fix. Licensee acknowledges that Licensee has read and agrees to the license agreements contained in the NON_IBM_LICENSE file(s). If Licensee does not agree to the terms of these third party license agreements, Licensee may not use the Separately Licensed Code.

For Programs acquired under the International Program License Agreement ("IPLA") or International Program License Agreement for Non Warranted Program ("ILAN") and Licensee is the original licensee of the Program, if Licensee does not agree with the third party license agreements, Licensee may return the Program in accordance with the terms of, and within the specified time frames stated in, the "Money-back Guarantee" section of the IPLA or ILAN IBM Agreement.

Note: Notwithstanding any of the terms in the third party license agreement, the Agreement, or any other agreement Licensee may have with IBM:
(a) IBM provides this Separately Licensed Code to Licensee WITHOUT WARRANTIES OF ANY KIND;
(b) IBM DISCLAIMS ANY AND ALL EXPRESS AND IMPLIED WARRANTIES AND CONDITIONS INCLUDING, BUT NOT LIMITED TO, THE WARRANTY OF TITLE, NON-INFRINGEMENT OR INTERFERENCE AND THE IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, WITH RESPECT TO THE SEPARATELY LICENSED CODE;
(c) IBM is not liable to Licensee, and will not defend, indemnify, or hold Licensee harmless for any claims arising from or related to the Separately Licensed Code; and
(d) IBM is not liable for any direct, indirect, incidental, special, exemplary, punitive or consequential damages including, but not limited to, lost data, lost savings, and lost profits, with respect to the Separately Licensed Code.

Notwithstanding these exclusions, in Germany and Austria, IBM's warranty and liability for the Separately Licensed Code is governed only by the respective terms applicable for Germany and Austria in IBM license agreements.

Note: IBM may provide limited support for some Separately Licensed Code. If such support is available, the details and any additional terms related to such support will be set forth in the License Information document.

The following are Separately Licensed Code:
CentOS

Source Components and Sample Materials

The Program may include some components in source code form ("Source Components") and other materials identified as Sample Materials. Licensee may copy and modify Source Components and Sample Materials for internal use only provided such use is within the limits of the license rights under this Agreement, provided however that Licensee may not alter or delete any copyright information or notices contained in the Source Components or Sample Materials. IBM provides the Source Components and Sample Materials without obligation of support and "AS IS", WITH NO WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTY OF TITLE, NON-INFRINGEMENT OR NON-INTERFERENCE AND THE IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

Export and Import Restrictions

This Program may contain cryptography. Transfer to, or use by, users of the Program may be prohibited or subject to export or import laws, regulations or policies, including those of the United States Export Administration Regulations. Licensee assumes all responsibility for complying with all applicable laws, regulations, and policies regarding the export, import, or use of this Program, including but not limited to, U.S. restrictions on exports or reexports. To obtain the export classification of this Program refer to: https://www.ibm.com/products/exporting/.

The following units of measure may apply to Licensee's use of the Program.

Processor Value Unit (PVU)

Processor Value Unit (PVU) is a unit of measure by which the Program can be licensed. The number of PVU entitlements required is based on the processor technology (defined within the PVU Table by Processor Vendor, Brand, Type and Model Number at http://www.ibm.com/software/lotus/passportadvantage/pvu_licensing_for_customers.html) and the number of processors made available to the Program. IBM continues to define a processor, for the purpose of PVU-based licensing, to be each processor core on a chip. A dual-core processor chip, for example, has two processor cores.

Licensee can deploy the Program using either Full Capacity licensing or Virtualization Capacity (Sub-Capacity) licensing according to the Passport Advantage Sub-Capacity Licensing Terms (see webpage below). If using Full Capacity licensing, Licensee must obtain PVU entitlements sufficient to cover all activated processor cores* in the physical hardware environment made available to or managed by the Program, except for those servers from which the Program has been permanently removed. If using Virtualization Capacity licensing, Licensee must obtain entitlements sufficient to cover all activated processor cores made available to or managed by the Program, as defined according to the Virtualization Capacity License Counting Rules at http://www.ibm.com/software/lotus/passportadvantage/Counting_Software_licenses_using_specific_virtualization_technologies.html.

* An Activated processor core is a processor core that is available for use in a physical or virtual server, regardless of whether the capacity of the processor core can be or is limited through virtualization technologies, operating system commands, BIOS settings, or similar restrictions.

User Value Unit (UVU)

User Value Unit (UVU) is a unit of measure by which the Program can be licensed. UVU Proofs of Entitlement are based on the number and type of Users for the given Program. Licensee must obtain sufficient entitlements for the number of UVUs required for Licensee's environment as specified in the table below. The UVU entitlements are specific to the Program and type of user and may not be exchanged, interchanged, or aggregated with UVU entitlements of another program or type of user.

In addition to the above, the following terms apply to Licensee's use of the Program.

The Users for the purposes of UVU calculation are the sum of all Internal Users, External Users, and Infrequent Users given access to the Program or whose access is managed by the Program.

- An Internal User is a unique person that is given access to the Program or whose access is managed by the Program and is an employee of the Licensee or a contractor performing work on behalf of the Licensee. Each Internal User equals one User for the purpose of calculating User Value Units.
- An External User is a unique person that is given access to the Program or whose access is managed by the Program and is not an employee of the Licensee or a contractor performing work on behalf of the Licensee. A ratio of fifteen External Users equals one User for the purpose of calculating User Value Units.
- An Infrequent Internal User is an Internal User who accesses the Program or whose access is managed by the Program less than five times a year. A ratio of fifteen Infrequent Internal Users equals one User for the purpose of calculating User Value Units.
- Each Internal, External and Infrequent Internal User must be trackable and auditable.

User Definitions for Service Provider

If the Licensee is a Service Provider as defined in the International Passport Advantage or the International Passport Advantage Express Agreement, the UVU calculation must be based upon the following:
- For each end user customer of the Service Provider, an Internal User is a unique person that is given access to the Program or whose access is managed by the Program through or as part of the Service Provider's information technology service, and is an employee of the end user customer or a contractor performing work on behalf of the end user customer. Each Internal User equals one User for the purpose of calculating User Value Units.
- For each end user customer of the Service Provider, an External User is a unique person that is given access to the Program or whose access is managed by the Program through or as part of the Service Provider's information technology service, and is not an employee of the end user customer or a contractor performing work on behalf of the end user customer. A ratio of fifteen External Users equals one User for the purpose of calculating User Value Units.
- For each end user customer of the Service Provider, an Infrequent Internal User is an Internal User that is given access to the Program or whose access is managed by the Program through or as part of the Service Provider's information technology service less than five times per year. A ratio of fifteen Infrequent Internal Users equals one User for the purpose of calculating User Value Units.
- For each end user customer of the Service Provider, each Internal, External and Infrequent Internal User must be trackable and auditable.

Users who no longer have access to the Program and whose access is no longer managed by the Program, but whose identities are retained in the user registry for archival and audit purposes, are not counted for purposes of UVU calculation. User identities must be trackable and auditable.

User Value Unit Conversion Table

For 1 to 5,000 Users, 1.00 UVU per User
For 5,001 to 15,000 Users, 5,000 UVUs plus 0.50 UVUs per User above 5,000
For 15,001 to 50,000 Users, 10,000 UVUs plus 0.30 UVUs per User above 15,000
For 50,001 to 150,000 Users, 20,500 UVUs plus 0.20 UVUs per User above 50,000
For 150,001 to 500,000 Users, 40,500 UVUs plus 0.10 UVUs per User above 150,000
For 500,001 to 1,000,000 Users, 75,500 UVUs plus 0.05 UVUs per User above 500,000
For 1,000,001 to 3,000,000 Users, 100,500 UVUs plus 0.025 UVUs per User above 1,000,000
For greater than 3,000,000 Users, 150,500 UVUs plus 0.01 UVUs per User above 3,000,000


The Programs licensed under this Agreement include Oracle Development Code technology (the "ODBC DriverTechnology") supplied by Oracle USA, Inc. ("Oracle"). The term "ODBC Driver Technology" includes any technology licensed to Oracle by its suppliers. As used in the Agreement, the term "IBM supplier" shall be deemed to include Oracle and its suppliers. In addition to the terms and conditions of this Agreement, as a condition of using the ODBC Driver Technology, Licensee specifically agrees as follows:

(1) IBM may remove the ODBC Driver Technology from the Program at any time and without notice, and Licensee will promptly follow instructions provided by IBM, including without limitation installing any updates, upgrades or fix packs as necessary to complete the removal of the technology.

(2) Licensee may not transfer the ODBC Driver Technology included in the Program.

(3) Should Oracle cease to provide IBM with updates, upgrades, or fixes for the ODBC Driver Technology, any obligation of IBM to provide such updates, upgrades or fixes as part of maintenance or support for the Program shall immediately cease.

Cloud Service Provider

Notwithstanding the terms in the License Agreement, Licensee is permitted to have the Program hosted by a service provider for the benefit of the Licensee.

Supporting Program Details

IBM DB2 Advanced Workgroup Server Edition
- Use Limitations: Use by Principal Program

"Use by Principal Program" means that the Supporting Program is provided exclusively for use by the Principal Program. Neither Licensee nor any application, program or device is authorized to directly use or access the services of the Supporting Program except Licensee may access the Supporting Program to perform administrative functions for the Supporting Program such as backup, recovery and authorized configuration.

IBM QRadar Log Manager Software
- Entitlement: 1 Install

Licensee may only use IBM QRadar Log Manager Software to monitor up to 5,000 Events Per Second (EPS) and 750 IBM Security Access Manager physical or virtual appliance Log Sources. Licensee is prohibited from using this Supporting Program in connection with any other software or hardware.

Install is a unit of measure by which the Supporting Program can be licensed. An Install is an installed copy or instance of the Supporting Program on a physical or virtual disk made available to be executed on a computer. Licensee must obtain an entitlement for each Install of the Supporting Program.

L/N: L-CYII-B4T6SX
D/N: L-CYII-B4T6SX
P/N: L-CYII-B4T6SX