Security level of a “paper-based” licenses

If CAL's are "paper-based" licenses, how can a network administrator control or monitor the use of permission to identify in the license that follow the agreement and to control what computers domain user account to access?
