Content protection with dynamic encryption and key delivery
AMS website | Code Samples | Troubleshooting guide
Use Azure Media Services to secure your media from the time it leaves your computer all the way through storage, processing, and delivery. With Media Services, you can deliver your live and on-demand content encrypted dynamically with Advanced Encryption Standard (AES-128) or any of the three major digital rights management (DRM) systems: Microsoft PlayReady, Google Widevine, and Apple FairPlay.
FairPlay Streaming is an Apple technology that is only available for video transferred over HTTP Live Streaming (HLS) on iOS devices, in Apple TV, and in Safari on macOS. Media Services also provides a service for delivering AES keys and DRM (PlayReady, Widevine, and FairPlay) licenses to authorized clients. If content is encrypted with an AES clear key and is sent over HTTPS, it is not in clear until it reaches the client.
In Media Services v3, a content key is associated with Streaming Locator (see this example). If using the Media Services key delivery service, you can let Azure Media Services generate the content key for you. The content key should be generated yourself if you're using you own key delivery service, or if you need to handle a high availability scenario where you need to have the same content key in two data centers.
When a stream is requested by a player, Media Services uses the specified key to dynamically encrypt your content by using AES clear key or DRM encryption. To decrypt the stream, the player requests the key from Media Services key delivery service or the key delivery service you specified. To decide if the user is authorized to get the key, the service evaluates the content key policy that you specified for the key.
You can use the REST API, or a Media Services client library to configure authorization and authentication policies for your licenses and keys.
Widevine is not available in the GovCloud region.
Media services will be enforcing TLS 1.2 for all requests to KeyDelivery, RESTv2, Streaming Endpoint and Live Event streaming origins. Accounts with existing TLS 1.0 or 1.1 usage will be exempt from this enforcement. If you wish to enforce TLS 1.2 for all your requests to these media services endpoints, please contact AMS support.
Browsers that support DRM clients
Common browsers support the following DRM clients:
|Microsoft Edge, Internet Explorer 11||PlayReady|
Controlling content access
You can control who has access to your content by configuring the content key policy. Media Services supports multiple ways of authorizing users who make key requests. The client (player) must meet the policy before the key can be delivered to the client. The content key policy can have open or token restriction.
An open-restricted content key policy may be used when you want to issue a license to anyone without authorization. For example, if your revenue is ad-based and not subscription-based.
With a token-restricted content key policy, the content key is sent only to a client that presents a valid JWT token or a simple web token (SWT) in the license/key request. This token must be issued by an STS.
Using Azure AD as an STS
You can use Azure AD as an STS. It must be configured to create a token signed with the specified key and issue claims that you specified in the token restriction configuration. The Media Services license/key delivery service returns the requested license or key to the client if both of these conditions exist:
- The token is valid.
- The claims in the token match those configured for the license or key.
When you configure the token-restricted policy, you must specify the primary verification key, issuer, and audience parameters. The primary verification key contains the key that the token was signed with. The issuer is the STS that issues the token. The audience, sometimes called scope, describes the intent of the token or the resource that the token authorizes access to. The Media Services license/key delivery service validates that the values in the token match the values in the template.
Token replay prevention
The Token Replay Prevention feature allows you to set a limit on how many times the same token can be used to request a key or a license. You can add a claim of type
urn:microsoft:azure:mediaservices:maxuses in the token, where the value is the number of times the token can be used to acquire a license or key. All subsequent requests with the same token to Key Delivery will return an unauthorized response.
- You must have control over token generation. The claim needs to be placed in the token itself.
- When using this feature, requests with tokens whose expiry time is more than one hour away from the time the request is received are rejected with an unauthorized response.
- Tokens are uniquely identified by their signature. Any change to the payload (for example, update to the expiry time or the claim) changes the signature of the token and it will count as a new token that Key Delivery hasn't come across before.
- Playback fails if the token has exceeded the
- It can be used for all existing protected content (only the token issued needs to be changed).
- It works with both JWT and SWT.
Using a custom STS
You might choose to use a custom STS to provide tokens. Reasons include:
Your identity provider (IDP) doesn't support STS.
You might need more flexible or tighter control to integrate the STS with your subscriber billing system.
For example, an OTT service operator might offer multiple subscriber packages, such as premium, basic, and sports. The operator might want to match the claims in a token with a subscriber's package so that only the contents in a specific package are made available. In this case, a custom STS provides the needed flexibility and control.
To include custom claims in the token to select between different ContentKeyPolicyOptions with different DRM license parameters, for example, a subscription license versus a rental license.
To include a claim representing the content key identifier of the key that the token grants access to.
When you use a custom STS, two changes must be made:
- When you configure a license delivery service for an asset, you need to specify the security key used for verification by the custom STS instead of the current key from Azure AD.
- When a JTW token is generated, a security key is specified instead of the private key of the current X509 certificate in Azure AD.
There are two types of security keys:
- Symmetric key: The same key is used to generate and to verify a JWT.
- Asymmetric key: A public-private key pair in an X509 certificate is used with a private key to encrypt/generate a JWT and with the public key to verify the token.
If you use .NET Framework/C# as your development platform, the X509 certificate used for an asymmetric security key must have a key length of at least 2048. This key length is a requirement of the class System.IdentityModel.Tokens.X509AsymmetricSecurityKey in .NET Framework. Otherwise, the following exception is thrown: IDX10630: The 'System.IdentityModel.Tokens.X509AsymmetricSecurityKey' for signing can't be smaller than '2048' bits.
Using a license/key delivery service other than Media Services
You can edit key policy templates if you want to use a different license/key delivery service.
How-tos, tutorials and samples
.Net Digital Rights Management sample shows you how to implement a multi-DRM system with Media Services v3 by using .NET.
There are additional content protection samples available for Node.JS and Python:
|Node.JS Upload and stream HLS and DASH with PlayReady and Widevine DRM||Python Upload and stream HLS and DASH with PlayReady and Widevine DRM||Demonstrates how to encode and stream using Widevine and PlayReady DRM|
|Node.JS Basic Playready DRM content protection and streaming||Python Basic Playready DRM content protection and streaming||Demonstrates how to encode and stream using PlayReady DRM|
|Node.JS Basic Widevine DRM content protection and streaming||Python Basic Widevine DRM content protection and streaming||Demonstrates how to encode and stream using Widevine DRM|
Get help and support
You can contact Media Services with questions or follow our updates by one of the following methods:
- Q & A
- Stack Overflow. Tag questions with
- @MSFTAzureMedia or use @AzureSupport to request support.
- Open a support ticket through the Azure portal.
Submit and view feedback for