You can request updated permissions from ” No matter what you choose here you will never be able to access the document. If that document is downloaded and then opened the user will receive and error stating “You do not have credentials that allow you to open this document. It can be viewed in the browser and the IRM policy can be viewed as working. Test Document 1 is in an IRM protected library and shared with an account. If a standard Live ID is used the document will be able only be able to be viewed in the browser. I have confirmed this scenario with Microsoft as being unsupported. What I found out was that:Īn IRM protected document that is shared to an external user, will not be able to be viewed after it is downloaded, unless they used an Office 365 ID to access the document. The situation revolved around a document that had an IRM policy applied to it and was shared with an external user. Specifically, the AD RMS SDK enables you to programmatically encrypt and decrypt content, associate rights with content, discover AD RMS services, and publish and acquire content licenses.I have began working with IRM policies in Office 365 more often recently and ran into a situation that surprised me. For more information on Secure Islands visit their website:Īlternatively, you can extend AD RMS protection to additional file formats by leveraging the AD RMS Software Development Kit (SDK). They also have a solution for protecting PDF files. Secure Islands offers a developmental framework they can use to supply AD RMS file protection to any file format within three to four weeks. Perhaps you would like to extend AD RMS protection to a specific file format. For more information visit the Liquid Machines website at Their solution can also protect earlier versions of Microsoft Office, image files such as JPG and TIF, and graphics files. Liquid Machines extends AD RMS protection to over 400 different file types including PDF and CAD files. For more information visit their website: GigaTrust has also developed GigaTrust for CAD to protect CAD files. An additional benefit of the Enterprise Plus Solution is that it can block over 250 screen capture and remote sharing applications, further securing your data. GigaTrust also offers PDF file protection as part of their Enterprise Plus Solution. For more information visit the Foxit website: The Foxit PDF Security Suite focuses exclusively on PDF files and may be the simplest option for organizations that need to extend AD RMS protection to only PDF files. pdf documents using your existing rights policy templates, and it integrates with Microsoft Office SharePoint Server. The Foxit PDF Security Suite can protect. Our partners have developed solutions to extend AD RMS protection to many additional file types. For more information on XPS visit the article XPS documents can be created by any application that can print to the Microsoft XPS Document Writer. XPS is an electronic paper format based on XML. For a full list of the specific supported Microsoft Office file formats consult the TechNet articleĪD RMS and Microsoft Office Deployment ConsiderationsĪD RMS can also be used to protect Microsoft XML Paper Specification (XPS) files. In addition, Microsoft InfoPath is supported in Microsoft Office 2007. All other versions can read AD RMS protected content. Only Microsoft Office Ultimate 2007, Office Enterprise 2007, Office Professional Plus 2007, and Office 2003 Profession versions support both creating and reading AD RMS protected content. The purpose of this post is to explain what Microsoft applications support AD RMS protection, and to explain how you may protect file types from other applications that are important within your organization.ĪD RMS is natively supported in both the 20 editions of Microsoft Outlook, Microsoft Word, Microsoft Excel, and Microsoft PowerPoint. Once your AD RMS installation is in place your end users can begin creating and consuming protected content using AD RMS aware applications. (This post was originally published on the original AD RMS blog in March 2010) First published on CloudBlogs on Apr, 28 2012
0 Comments
Leave a Reply. |