Configuring applications for Azure Rights Management

Carol Bailey

Applies to: Azure Information Protection, Office 365


This information is for IT administrators and consultants who have deployed Azure Information Protection. If you are looking for user help and information about how to use the Rights Management functionality for a specific application or how to open a file that is rights-protected, use the help and guidance that accompanies your application.

For example, for Office applications, click the Help icon and enter search terms such as Rights Management or IRM. For the RMS sharing application for Windows, see the Rights Management sharing application user guide.

After you have deployed Azure Information Protection for your organization, use the following information to configure applications and services to support the Azure Rights Management service from Azure Information Protection. These include Office applications such as Word 2013 and Word 2010, and services such as Exchange Online (transport rules, data loss prevention, do not forward, and message encryption) and SharePoint Online (protected libraries). For information about how these applications and services support Rights Management, see How applications support the Azure Rights Management service.


For information about supported versions and other requirements, see Requirements for Azure Rights Management.

To configure on-premises servers such as Exchange Server and SharePoint Server, see Deploying the Azure Rights Management connector.


For high-level examples and screenshots of applications configured to use the Azure Rights Management service, see Azure RMS in action: What administrators and users see.

In addition to these applications and services, there are other applications that support the Rights Management APIs. This category includes line-of-business applications that are written in-house by using the Rights Management SDK, and applications from software vendors that are written by using the Rights Management SDK. For these applications, follow the instructions that are provided with the application.

Next steps

After you’ve configured your applications to support the Azure Rights Management service, use the Azure Information Protection deployment roadmap to check whether there are other configuration steps that you might want to do before you roll out Azure Information Protection to users and administrators. If not, you might find the following operational information useful: