1 / 9

Information Rights Management

Information Rights Management. What is IRM?. Information Rights Management gives authors control over how people use the documents and e-mail they send IRM is a policy tool, NOT a security panacea Designed for sensitive communications Not every document or mail will use IRM.

Download Presentation

Information Rights Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Rights Management

  2. What is IRM? • Information Rights Management gives authors control over how people use the documents and e-mail they send • IRM is a policy tool, NOT a security panacea • Designed for sensitive communications • Not every document or mail will use IRM

  3. IRM features in Office • “Do Not Forward” e-mail • Includes optional expiration • “Do Not Distribute” documents • Provides more granularity • Access can be Read, Change, or Full Control • Additional options include Printing and Expiration • Specifying recipients uses e-mail addresses • Support for Exchange DLs makes it easy to manage access control as group membership changes • “Company Confidential” policies • Supports “permission policies” in enterprises • Admins control policies, even after content is protected

  4. Rights Management Architecture Other ISV Microsoft Windows Windows Rights Management client

  5. Windows Server 2003 w/ Windows Rights Management Services DocumentAuthor DocumentRecipient How IRM Works 7. RM Server validates user and request 8. License is issued and returned 5. Recipient clicksdocument / e-mail 1. Author creates adocument/e-mail 6. App sends credentials and rights to RM Server 2. Author defines a set of rights & recipients 3. Author saves or sends content, causing encryption 9. Application rendersdocument / e-mailand enforces rights 4. Author distributesdocument / e-mail

  6. Enterprise Deployment • Benefits of enterprise deployment • Corporate control over all content • NT authentication to identify users • Integration with AD and support for DLs • Admins can create “permission policies” that appear in Office UI • Client requirements • Office 2003 Professional • Windows Rights Management client components • Connect to Microsoft to activate every desktop • Can be administrated through logon script or on-demand on first use • Proxied through corporate server • Transparent to end-user • Connect to corporate RM server for certificate distribution • Transparent to end-user • Server infrastructure • Windows Server 2003 w/ RM services installed • RM requires a premium CAL • Scales from one server to large clusters • Utilizes SQL for configuration and user databases • Requires ActiveDirectory

  7. Microsoft Service Offering • Free trial service for Office customers • Enables IRM “out of the box” • Relies on Passport authentication • Doesn’t require an IT infrastructure • Admins can disable this to retain complete control over IRM of document and e-mail • Makes it easy for enterprise IT to evaluate the feature before opting-in • Provides a convenient way for end users to collaborate across corp boundaries

  8. Software requirements • Software requirements for running Windows RMS servers.

  9. Infrastructure requirements • The following elements must exist in the infrastructure in which you are running Windows RMS.

More Related