Requirement #2 for Azure Rights Management: Azure AD directory
You must have an Azure AD directory to use Azure RMS. You use your organization account for this directory to sign in to the Azure Management Portal, where, for example, you can configure and manage Rights Management templates.
If you do not already have an Azure subscription for your organization, you can get one by signing up for a free trial. Go to the Azure Get started page and follow the instructions.
For more information, see the following resources in the Azure Active Directory documentation:
If you want to integrate your Azure AD directory with your on-premises AD forests, see Directory integration.
Note
If you have mobile devices or Mac computers that authenticate on-premises by using AD FS or an equivalent authentication provider, you must use AD FS on the minimum server version of Windows Server 2012 R2, or an alternative authentication provider that supports the OAuth 2.0 protocol.
Multi-factor authentication (MFA) and Azure RMS
To use multi-factor authentication (MFA) with Azure RMS requires at least one of the following:
- Office 2013 (minimum version): If you have Office 2013, you must also install the June 9, 2015, update for Office 2013 (KB3054853). For more information about this update and how modern authentication brings Active Directory Authentication Library (ADAL)-based sign in to Office 2013, see Office 2013 modern authentication public preview announced on the Office blog.
- Rights Management sharing application for Windows: You must have installed the minimum version of 1.0.1908.0, which can be confirmed by using Control Panel, Programs and Features. For more information about the sharing application, see Rights Management Sharing Application for Windows.
- Rights Management sharing app for mobile devices and Mac computers: Make sure that you have the latest version installed. MFA support went into the September 2015 release of the RMS sharing app.
Then, configure your MFA solution:
- For Microsoft-managed tenants (you have Azure Active Directory or Office 365): Configure Azure MFA to enforce MFA for users. For instructions, see Getting started with Azure Multi-Factor Authentication in the cloud from the Azure documentation. For more information about Azure MFA, see What is Azure Multi-Factor Authentication?
- For federated tenants (you operate federation servers on-premises): Configure your federation servers for Azure Active Directory or Office 365. For example, if you are using AD FS, see Configure Additional Authentication Methods for AD FS on TechNet. For more information about this scenario, see The Works with Office 365 – Identity program now streamlined on the Office blog.