Reader small image

You're reading from  Mastering Identity and Access Management with Microsoft Azure - Second Edition

Product typeBook
Published inFeb 2019
PublisherPackt
ISBN-139781789132304
Edition2nd Edition
Tools
Right arrow
Author (1)
Jochen Nickel
Jochen Nickel
author image
Jochen Nickel

Jochen Nickel is a Cloud, Identity and Access Management Solution Architect with a clear focus and in-depth technical knowledge of Identity and Access Management. He is currently working for inovit GmbH in Switzerland leading and executing projects in the field of Identity and Access Management including Data Classification and Information protection. Jochen is focused on Microsoft Technologies, especially in the Enterprise Mobility + Security Suite, Office 365 and Azure. He is an established speaker at many technology conferences like Azure Bootcamps, TrustInTech Meetups or the Experts Live Switzerland and Europe.
Read more about Jochen Nickel

Right arrow

Chapter 14. Understanding Encryption Key Management Strategies

In this chapter, you'll learn to use the three different key deployment models to address different compliance requirements and understand what role the Azure Key Vault service plays in this. We'll discuss the three Azure Rights Management Services flows for a better understanding of how keys are used in the complete Azure Information Protection (AIP) solution to address the correct implementation and to help you troubleshooting the solution. This chapter will be divided into the following sections:

  • Azure Information Protection key basics:
    • Key deployment models
    • What is a hardware security module (HSM)?
    • What is the Azure Key Vault? 
  • How Azure RMS works under the hood:
    • Algorithms and key lengths
    • User environment-initialization flow
    • Content protection flow
    • Content consumption flow

Let's start with the AIP key basics!

 

Azure Information Protection key basics


The Azure Rights Management Service (RMS) is part of the AIP solution of Microsoft. The Rights Management web service provides protection functionality, including administration, account certification, and licensing. Certification refers to the account certification and activation activities performed by Azure RMS. Each user must acquire a set of certificates and associated keys to be able to participate. Licensing refers to the set of operations by which Azure RMS grants access to protected content to authorized users. The Azure RMS service grants a use license (usage rights) for each document to authorized users.

Note

The Azure RMS service exposes Simple Object Access Protocol (SOAP) interfaces that are used by clients to interact with Azure RMS

The Azure Rights Management web service also uses rights management templates, which specify a predefined set of rights and conditions that can be applied to protect content. In AIP, the rights-management templates...

How Azure RMS works under the hood


It's quite important to how RMS works it delivers the data protection service of the complete Azure Information Protection solution. First of all, the protected data will never be transferred to the Azure Information Protection or Rights Management service itself. Basically, the data is encrypted at the application level and includes a policy that defines who is authorized and which usage rights are applied for these users. Keep in mind that group memberships are cached for three hours. So, if you change permissions, remember this to avoid misinterpreted results. To get a better understanding of the three typical flows, let's explore the flows in this section. But first, we'll look at the algorithms and key lengths used by Azure RMS.

Algorithms and key lengths

Azure RMS uses the following cryptographic controls in the different usage scenarios. The following table gives you the needed information if you get asked in a project or workshop:

Summary


In this chapter, you received all the necessary information to map your requirements to the correct key-deployment model. We looked at the pros and cons of using HYOK. With the provided configuration examples, we gathered practical experience, which you can now share or use in your next project or workshop. We learned about the main Azure RMS flows, which are helpful in understanding how Azure RMS works under the hood. You can use this knowledge to support deployments or troubleshoot common issues because many errors happen on the environment-initialization (bootstrapping) process or in the deployment.

In the next chapter, we'll finish configuring the example Azure Information Protection solution, and then you'll be fully prepared for your journey with this nice technology.

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Mastering Identity and Access Management with Microsoft Azure - Second Edition
Published in: Feb 2019Publisher: PacktISBN-13: 9781789132304
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at £13.99/month. Cancel anytime

Author (1)

author image
Jochen Nickel

Jochen Nickel is a Cloud, Identity and Access Management Solution Architect with a clear focus and in-depth technical knowledge of Identity and Access Management. He is currently working for inovit GmbH in Switzerland leading and executing projects in the field of Identity and Access Management including Data Classification and Information protection. Jochen is focused on Microsoft Technologies, especially in the Enterprise Mobility + Security Suite, Office 365 and Azure. He is an established speaker at many technology conferences like Azure Bootcamps, TrustInTech Meetups or the Experts Live Switzerland and Europe.
Read more about Jochen Nickel

Cryptographic controls...