Configuring applications for Azure Rights Management
Applies to: Azure Information Protection, Office 365
This information is for IT administrators and consultants who have deployed Azure Information Protection. If you are looking for user help and information about how to use the Rights Management functionality for a specific application or how to open a file that is rights-protected, use the help and guidance that accompanies your application.
For example, for Office applications, click the Help icon and enter search terms such as Rights Management or IRM. For the Azure Information Protection client for Windows, see the Azure Information Protection client user guide.
After you have deployed Azure Information Protection for your organization, use the following information to configure applications, the Azure Information Protection client, and services. For example, Office applications such as Word 2016, Word 2013, and Word 2010. Also services such as Exchange Online (transport rules, data loss prevention, do not forward, and message encryption) and SharePoint Online (protected libraries). For information about how these applications and services support the data protection service from Azure Information Protection, see How applications support the Azure Rights Management service.
For information about supported versions and other requirements, see Requirements for Azure Rights Management.
To configure on-premises servers such as Exchange Server and SharePoint Server, see Deploying the Azure Rights Management connector.
For high-level examples and screenshots of applications configured to use the Azure Rights Management service, see Azure RMS in action: What administrators and users see.
In addition to these applications and services, there are other applications that support the Rights Management APIs. This category includes line-of-business applications that are written in-house by using the Rights Management SDK, and applications from software vendors that are written by using the Rights Management SDK. For these applications, follow the instructions that are provided with the application.
After you’ve configured your applications to support the Azure Rights Management service, use the Azure Information Protection deployment roadmap to check whether there are other configuration steps that you might want to do before you roll out Azure Information Protection to users and administrators. If not, you might find the following operational information useful:
Before commenting, we ask that you review our House rules.