RMS Client Deployment Notes
Updated: August 1, 2015
Applies To: Active Directory Rights Management Services, Azure Rights Management, Windows 7 with SP1, Windows 8, Windows 8.1, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows Vista
The Rights Management Service client (RMS client) version 2 is also known as the MSIPC client. It is software for Windows computers that communicates with Microsoft Rights Management services on-premises or in the cloud to help protect access to and usage of information as it flows through applications and devices, within the boundaries of your organization, or outside those managed boundaries. In addition to shipping with the Rights Management sharing application for Windows, the RMS client is available as an optional download that can, with acknowledgment and acceptance of its license agreement, be freely distributed with third-party software so that clients can protect and consume content that has been protected by Rights Management services.
This topic includes the following sections:
The RMS client can be freely redistributed and bundled with other applications and IT solutions. If you are an application developer or solution provider and want to redistribute the RMS client, you have two options:
Recommended: Embed the RMS client installer in your application installation and run it in silent mode (the /quiet switch, detailed in the next section).
Make the RMS client a prerequisite for your application. With this option, you might need to provide users with additional instructions for them to obtain, install, and update their computers with the client before they can use your application.
The RMS client is contained in an installer executable file named setup_msipc_<arch>.exe, where <arch> is either x86 (for 32-bit client computers) or x64 (for 64-bit client computers). The 64-bit (x64) installer package installs both a 32-bit runtime executable for compatibility with 32-bit applications that run on a 64-bit operating system installation, as well as a 64-bit runtime executable for supporting native 64-bit applications. The 32-bit (x86) installer will not run on a 64-bit Windows installation.
You need elevated privileges to install the RMS client, such as a member of the Administrators group on the local computer.
You can install the RMS client by using either of the following installation methods:
Silent mode. By using the /quiet switch as part of the command-line options, you can silently install the RMS client on computers. The following example shows a silent mode installation for the RMS client on a 64-bit client computer:
Interactive mode. Alternately, you can install the RMS client by using the GUI-based setup program that's provided by the RMS Client Installation Wizard. To do this, double-click the RMS client installer package (setup_msipc_<arch>.exe) in the folder to which it was copied or downloaded on your local computer.
The following section contains frequently asked questions about the RMS client and the answers to them.
The RMS client is supported with the following operating systems:
Windows Server Operating System
Windows Client Operating System
Windows Server 2012 R2
Windows Server 2012
Windows Server 2008 R2
Windows 7 with minimum of SP1
Windows Server 2008 (AD RMS only)
Windows Vista with minimum of SP2 (AD RMS only)
The RMS client is supported on x86 and x64 computing platforms.
By default, the RMS client is installed in %ProgramFiles%\Active Directory Rights Management Services Client 2.<minor version number>.
The following files are installed as part of the RMS client software:
In addition to these files, the RMS client also installs multilingual user interface (MUI) support files in 44 languages. To verify the languages supported, run the RMS client installation and when the installation is complete, review the contents of the multilingual support folders under the default path.
No. This version of the RMS client ships as an optional download that can be installed separately on computers running supported versions of the Microsoft Windows operating system.
If you installed this RMS client by using the silent installation option, the RMS client inherits your current Microsoft Update settings. If you installed the RMS client by using the GUI-based setup program, the RMS client installation wizard prompts you to enable Microsoft Update.
The following section contains settings information about the RMS client. This information might be helpful if you have problems with applications or services that use the RMS client.
Some settings depend on whether the RMS-enlightened application runs as a client mode application (such as Microsoft Word and Outlook, or the RMS sharing application), or server mode application (such as SharePoint and Exchange). In the following tables, these settings are identified as Client Mode and Server Mode, respectively.
The RMS client stores licenses on the local disk and also caches some information in the Windows registry.
Client Mode Paths
Server Mode Paths
License store location
Template store location
<SID> is the secure identifier (SID) for the account under which the server application is running. For example, if the application is running under the built-in Network Service account, replace <SID> with the value of the well-known SID for that account (S-1-5-20).
You can use Windows registry keys to set or modify some RMS client configurations. For example, as an administrator for RMS-enlightened applications that communicate with AD RMS servers, you might want to update the enterprise service location (override the AD RMS server that is currently selected for publishing) depending on the client computer's current location within your Active Directory topology. Or, you might want to enable RMS tracing at the client computer, to help troubleshoot a problem with an RMS-enlightened application. Use the following table to identify the registry settings that you can change for the RMS client.
AD RMS only: To update the enterprise service location for a client computer
Update the following registry keys:
To enable and disable tracing
Update the following registry key:
To change the frequency in days to refresh templates
The following registry values specify how often templates will be refreshed on the user’s computer if the TemplateUpdateFrequencyInSeconds value is not set. If neither of these values are set, the default refresh interval for applications using the RMS client (version 1.0.1784.0) to download templates is 1 day. Versions prior to this have a default value of every 7 days.
To change the frequency in seconds to refresh templates
The following registry values specify how often templates will be refreshed on the user’s computer. If this value or the value to change the frequency in days (TemplateUpdateFrequency) is not set, the default refresh interval for applications using the RMS client (version 1.0.1784.0) to download templates is 1 day. Versions prior to this have a default value of every 7 days.
AD RMS only: To download templates immediately at the next publishing request
During testing and evaluations, you might want the RMS client to download templates as soon as possible. To do this, remove the following registry key and the RMS client will download templates immediately at the next publishing request rather than wait for the time specified by the TemplateUpdateFrequency registry setting:
AD RMS only: To enable support for federated authentication
If the RMS client computer connects to an AD RMS cluster by using a federated trust, you must configure the federation home realm.
AD RMS only: To support partner federation servers that require forms-based authentication for user input
By default, the RMS client operates in silent mode and user input is not required. Partner federation servers, however, might be configured to require user input such as by way of forms-based authentication. In this case, you must configure the RMS client ignore silent mode so that the federated authentication form appears in a browser window and the user is promoted for authentication.
AD RMS only: To block ILS service consumption
By default, the RMS client enables consuming content protected by the ILS service but you can configure the client to block this service by setting the following registry key. If this registry key is set to block the ILS service, any attempts to open and consume content protected by the ILS service will return the following error:
Templates make it easy for users and administrators to quickly apply Rights Management protection and the RMS client automatically downloads templates from its RMS servers or service If you put the templates in the following folder location, the RMS client will not download any templates from its default location and instead, download the templates that you have put in this folder. The RMS client might continue to download templates from other available RMS servers.
Client Mode: %localappdata%\Microsoft\MSIPC\UnmanagedTemplates
Server Mode: %allusersprofile%\Microsoft\MSIPC\Server\UnmanagedTemplates\<SID>
When you use this folder, there is no special naming convention required except that the templates should be issued by the RMS server or service and they must have the .xml file name extension. For example, Contoso-Confidential.xml or Contoso-ReadOnly.xml are valid names.
The RMS client can be limited to using only specific trusted AD RMS servers by making the following changes to the Windows registry on local computers.
To enable limiting RMS client to use only trusted AD RMS servers
Value: If a non-zero value is specified, the RMS client will trust only the specified servers that are configured in the TrustedServers list and the Azure Rights Management service.
To add members to the list of trusted AD RMS servers
Value: The string values added in this registry key location can be either DNS domain name format (for example, adrms.contoso.com) or full URLs to trusted AD RMS servers (for example, https://adrms.contoso.com). If a specified URL starts with https://, the RMS client will use SSL or TLS to contact the specified AD RMS server.
RMS service discovery lets the RMS client check which RMS server or service to communicate with before protecting content. Service discovery might also happen when the RMS client consumes protected content, but this is less likely to happen because the policy attached to the content contains the preferred RMS server or service and only if that is unsuccessful does the client then run service discovery.
Service discovery first looks for an on-premises version of Rights Management (AD RMS). If that is unsuccessful, service discovery automatically looks for the cloud version of Rights Management (Azure RMS).
To perform service discovery for an on-premises deployment, the RMS client checks the following:
The Windows registry on the local computer: If service discovery settings are configured in the registry, these settings are tried first. By default, these settings are not configured in the registry.
Active Directory Domain Services: A domain-joined computer queries Active Directory for a service connection point (SCP). If an SCP is registered, the URL of the RMS server is returned to the RMS client to use.
If your account has sufficient privileges (Enterprise Admins and local administrator for the AD RMS server), you can automatically register a a service connection point (SCP) when you install the AD RMS root cluster server. If a SCP already exists in the forest, you must first delete the existing SCP before you can register a new one.
You can register and delete an SCP after AD RMS is installed by using the following procedure. Before you start, make sure that your account has the required privileges (Enterprise Admins and local administrator for the AD RMS server).
To enable AD RMS service discovery by registering an SCP in Active Directory
Open the Active Directory Management Services console at the AD RMS server:
If you are using Windows Server 2008 R2 or Windows Server 2008, click Start, click Administrative Tools, and then click Active Directory Rights Management Services.
If you are using Windows Server 2012 R2 or Windows Server 2012, in Server Manager, click Tools, and then click Active Directory Rights Management Services.
In the AD RMS console right-click the AD RMS cluster, and then click Properties.
Click the SCP tab.
Select the Change SCP check box.
Select the Set SCP to current certification cluster option, and then click OK.
As an alternative to using an SCP or where an SCP does not exist, you can configure the registry on the client computer so that the RMS client can locate its AD RMS server.
To enable client-side AD RMS service discovery by using the Windows registry
Open the Windows registry editor, Regedit.exe:
On the client computer, in the Run window, type regedit, and then press ENTER to open the Registry Editor.
In the Registry Editor, navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSIPC.
If you are running a 32-bit application on a 64-bit computer, the path will be as follows:
To create the ServiceLocation subkey, right-click MSIPC, point to New, click Key, and then type ServiceLocation.
To create the EnterpriseCertification subkey, right-click ServiceLocation, point to New, click Key, and then type EnterpriseCertification.
To set the enterprise certification URL, double-click the (Default) value, under the EnterpriseCertification subkey, and when the Edit String dialog box appears, for Value data, type <http or https>://AD RMS_cluster_name/_wmcs/Certification, and then click OK.
To create the EnterprisePublishing subkey, right-click ServiceLocation, point to New, click Key, and then type EnterprisePublishing.
To set the enterprise publishing URL, double-click (Default) , under the EnterprisePublishing subkey, and when the Edit String dialog box appears, type for Value data the following <http or https>://AD RMS_cluster_name/_wmcs/Licensing, and then click OK.
Close the Registry Editor.
If the RMS client can't find an SCP by querying Active Directory and it's not specified in the registry, service discovery calls for AD RMS will fail.
In some cases, you might need to redirect traffic during service discovery, for example, when two organizations are merged and the old licensing server in one organization is retired and clients need to be redirected to a new licensing server. Or, you migrate from AD RMS to Azure RMS. To enable licensing redirection, use the following procedure.
To enable RMS licensing redirection by using the Windows registry
Open the Windows registry editor, Regedit.exe:
In the Registry Editor, navigate to one of the following:
For 64-bit version of Office on x64 platform: HKLM\SOFTWARE\Microsoft\MSIPC\Servicelocation
For 32-bit version of Office on x64 platform: HKLM\SOFTWARE\Wow6432Node\Microsoft\MSIPC\Servicelocation
Create a LicensingRedirection subkey, by right-clicking Servicelocation, point to New, click Key, and then type LicensingRedirection.
To set the licensing redirection, right-click the LicensingRedirection subkey, select New, and then select String value. For Name, specify the previous server licensing URL and for Value specify the new server licensing URL.
For example, to redirect licensing from a server at Contoso.com to one at Fabrikam.com, you might enter the following values:
If the old licensing server has both intranet and extranet URLs specified then a new name and value mapping has to be set for both of these URLs under the LicensingRedirection key.
Repeat the previous step for all servers that need to be redirected.
Close the Registry Editor.