Configuring applications for Azure Rights Management
Relevant for: AIP unified labeling client and classic client
This information is for IT administrators and consultants who have deployed Azure Information Protection. If you are looking for user help and information about how to use the Rights Management functionality for a specific application or how to open a file that is rights-protected, use the help and guidance that accompanies your application.
For example, for Office applications, click the Help icon and enter search terms such as Rights Management or IRM. For the Azure Information Protection client for Windows, see the Azure Information Protection client user guide.
After you have deployed Azure Information Protection for your organization, use the following information to configure applications, the Azure Information Protection client, and services, such as:
- Office applications, such as Word 2019, Word 2016, and Word 2013.
- Services, such as Exchange Online (transport rules, data loss prevention, do not forward, and message encryption) and Microsoft SharePoint (protected libraries).
For information about how these applications and services support the data protection service from Azure Information Protection, see How applications support the Azure Rights Management service.
For information about supported versions and other requirements, see Requirements for Azure Information Protection.
To configure on-premises servers such as Exchange Server and SharePoint Server, see Deploying the Azure Rights Management connector.
In addition to these applications and services, there are other applications that support the Rights Management APIs. This category includes line-of-business applications that are written in-house by using the Rights Management SDK, and applications from software vendors that are written by using the Rights Management SDK. For these applications, follow the instructions that are provided with the application.
After you’ve configured your applications to support the Azure Rights Management service, use the AIP deployment roadmap for classification, labeling, and protection to check whether there are other configuration steps that you might want to do before you roll out Azure Information Protection to users and administrators.
If not, you might find the following operational information useful: