Decommissioning and deactivating protection for Azure Information Protection
You are always in control of whether your organization protects content by using the Azure Rights Management service from Azure Information Protection. If you decide you no longer want to use this information protection service, you have the assurance that you won’t be locked out of content that was previously protected.
If you don’t need continued access to previously protected content, deactivate the service and let your subscription for Azure Information Protection expire. For example, this would be appropriate for when you have completed testing Azure Information Protection before you deploy it in a production environment.
However, if you have deployed Azure Information Protection in production and protected documents and emails, make sure that you have a copy of your Azure Information Protection tenant key before you deactivate the Azure Rights Management service. Make sure that you have a copy of your key before your subscription expires to ensure that you can retain access to content that was protected by Azure Rights Management after the service is deactivated. If you used the bring your own key solution (BYOK) where you generate and manage your own key in an HSM, you already have your Azure Information Protection tenant key. But if it was managed by Microsoft (the default), see the instructions for exporting your tenant key in Operations for your Azure Information Protection tenant key article.
Even after your subscription expires, your Azure Information Protection tenant remains available for consuming content for an extended period. However, you will no longer be able to export your tenant key.
When you have your Azure Information Protection tenant key, you can deploy Rights Management on premises (AD RMS) and import your tenant key as a trusted publishing domain (TPD). You then have the following options for decommissioning your Azure Information Protection deployment:
|If this applies to you …||… do this:|
|You want all users to continue using Rights Management, but use an on-premises solution rather than using Azure Information Protection →||Use the Set-AadrmMigrationUrl cmdlet to direct existing users to your on-premises deployment when they consume content protected after this change. Users will automatically use the AD RMS installation to consume the protected content.
For users to consume content that was protected before this change, redirect your clients to the on-premises deployment by using the LicensingRedirection registry key for Office 365 apps, Office 2019, Office 2016, or Office 2013. For instructions, see the service discovery section in the RMS client deployment notes, and the LicenseServerRedirection registry key for Office 2010, as described in Office Registry Settings.
|You want to stop using Rights Management technologies completely →||Grant a designated administrator super user rights and install the Azure Information Protection client for this user.
This administrator can then use the PowerShell module from this client to bulk-decrypt files in folders that were protected by the Azure Rights Management service. Files revert to being unprotected and can therefore be read without a Rights Management technology such as Azure Information Protection or AD RMS. Because this PowerShell module can be used with both the Azure Rights Management service from Azure Information Protection and AD RMS, you have the choice of decrypting files before or after you deactivate the Azure Rights Management service, or a combination.
|You are not able to identify all the files that were protected by the Azure Rights Management service from Azure Information Protection. Or, you want all users to be able to automatically read any protected files that were missed →||Deploy a registry setting on all client computers by using the LicensingRedirection registry key for Office 365 apps, Office 2019, Office 2016, or Office 2013, as described in the service discovery section in the RMS client deployment notes, and the LicenseServerRedirection registry key for Office 2010, as described in Office Registry Settings.
Also deploy another registry setting to prevent users from protecting new files by setting DisableCreation to 1, as described in Office Registry Settings.
|You want a controlled, manual recovery service for any files that were missed →||Grant designated users in a data recovery group super user rights and install the Azure Information Protection client for these users so that they can unprotect files when this action is requested by standard users.
On all computers, deploy the registry setting to prevent users from protecting new files by setting DisableCreation to 1, as described in Office Registry Settings.
For more information about the procedures in this table, see the following resources:
For information about AD RMS and deployment references, see Active Directory Rights Management Services Overview.
For instructions to import your Azure Information Protection tenant key as a TPD file, see Add a Trusted Publishing Domain.
To install the Windows PowerShell module for Azure Rights Management, to set the migration URL, see Installing the AADRM PowerShell module.
To use PowerShell with the Azure Information Protection client, see Using PowerShell with the Azure Information Protection client.
When you are ready to deactivate the Azure Rights Management service for your organization, use the following instructions.
Deactivating Rights Management
Use one of the following procedures to deactivate Azure Rights Management.
You can also use the Windows PowerShell cmdlet, Disable-Aadrm, to deactivate Rights Management.
To deactivate Rights Management from the Office 365 admin center
Go to the Rights Management page for Office 365 administrators.
If you are prompted to sign in, use an account that is a global administrator for Office 365.
On the rights management page, click deactivate.
When prompted Do you want to deactivate Rights Management? click deactivate.
You should now see Rights Management is not activated and the option to activate.
To deactivate Rights Management from the Azure portal
If you haven't already done so, open a new browser window and sign in to the Azure portal. Then navigate to the Azure Information Protection blade.
For example, on the hub menu, click All services and start typing Information in the Filter box. Select Azure Information Protection.
On the initial Azure Information Protection blade, select Protection activation.
On the Azure Information Protection - Protection activation blade, select Deactivate. Select Yes to confirm your choice.
The information bar displays Deactivation finished successfully and Deactivate is now replaced with Activate.
We'd love to hear your thoughts. Choose the type you'd like to provide:
Our feedback system is built on GitHub Issues. Read more on our blog.