Configuring applications for Azure Rights Management

Note

Are you looking for Microsoft Purview Information Protection, formerly Microsoft Information Protection (MIP)?

The Azure Information Protection add-in is retired and replaced with labels that are built in to your Microsoft 365 apps and services. Learn more about the support status of other Azure Information Protection components.

The new Microsoft Information Protection client (without the add-in) is currently in preview and scheduled for general availability.

This article is for IT administrators and consultants who have deployed Azure Information Protection. If you are looking for user help and information about how to use the Rights Management functionality for a specific application or how to open a file that is rights-protected, use the help and guidance that accompanies your application.

For example, for Office applications, click the Help icon and enter search terms such as Rights Management or IRM. For the Azure Information Protection client for Windows, see the Azure Information Protection client user guide.

Resources for configuring applications, the AIP client, and services

After you have deployed Azure Information Protection for your organization, use the following information to configure applications, the Azure Information Protection client, and services, such as:

  • Office applications, such as Word 2019, Word 2016, and Word 2013.
  • Services, such as Exchange Online (transport rules, data loss prevention, do not forward, and message encryption) and Microsoft SharePoint (protected libraries).

For information about how these applications and services support the data protection service from Azure Information Protection, see How applications support the Azure Rights Management service.

For information about supported versions and other requirements, see Requirements for Azure Information Protection.

To configure on-premises servers such as Exchange Server and SharePoint Server, see Deploying the Microsoft Rights Management connector.

In addition to these applications and services, there are other applications that support the Rights Management APIs. This category includes line-of-business applications that are written in-house by using the Rights Management SDK, and applications from software vendors that are written by using the Rights Management SDK. For these applications, follow the instructions that are provided with the application.

Next steps

After you’ve configured your applications to support the Azure Rights Management service, use the AIP deployment roadmap for classification, labeling, and protection to check whether there are other configuration steps that you might want to do before you roll out Azure Information Protection to users and administrators.

If not, you might find the following operational information useful: