Updated: July 13, 2020 (November 10, 2003)

  Charts & Illustrations

How Protected Content Is Used

My Atlas / Charts & Illustrations

459 wordsTime to read: 3 min
Rob Helm by
Rob Helm

As managing vice president, Rob Helm covers Microsoft collaboration and content management. His 25-plus years of experience analyzing Microsoft’s technology... more

Applications obtain use licenses from Windows Rights Management Services (RMS) servers to access protected content. Shown here is a scenario in which a user edits a protected document with Word 2003. The scenario proceeds as follows:

(1)The user opens the protected document in Word.

(2) Word requests a use license for the document from the RMS client. The RMS client verifies the identity of Word using a digital signature, to ensure that it will enforce the rights specified by the content owner, and that it’s not (for example) a cracker tool.

(3) The RMS client requests a use license from the RMS server. (The “server” might actually be a farm; RMS enables organizations to set up farms of servers that all share common certificates.) The request includes the user’s Rights Management Account Certificate, a digital certificate previously issued to the user by RMS that enables the user to access protected content on the specific computer. The request also includes the publishing license associated with the document. The publishing license includes the content key for the document encrypted with the RMS server’s public key, and it is digitally signed by the content author.

Atlas Members have full access

Get access to this and thousands of other unbiased analyses, roadmaps, decision kits, infographics, reference guides, and more, all included with membership. Comprehensive access to the most in-depth and unbiased expertise for Microsoft enterprise decision-making is waiting.

Membership Options

Already have an account? Login Now