3 Examples
This section provides a series of examples illustrating the use of the RMS protocols. The examples are:
Protecting content by using offline publishing.
Protecting content by using online publishing.
Consuming protected content.
Each example is described in the following sections as a set of conceptual actions that are interchanged between RMS and participants. These actions correspond to the interfaces described in section 2.1.2.2.
Each example, where applicable, assumes the client is well informed of the appropriate SCP, which is obtained by using service location discovery, a directory service, or pre-existing local configuration data.