Azure Information Protection Premium Government Service Description
Article
Note
To provide a unified and streamlined customer experience, the Azure Information Protection classic client and Label Management in the Azure Portal are deprecated for GCC, GCC-H, and DoD customers as of September 31, 2021.
The classic client will be officially retired, and will stop functioning, on March 31, 2022.
Azure Information Protection unified labeling is available for GCC, GCC High, and DoD customers.
The Azure Information Protection Premium Government Service Description is designed to serve as an overview of our offering in the GCC High and DoD environments, and will cover feature variations compared to Azure Information Protection Premium commercial offerings.
Azure Information Protection Premium Government and third-party services
Some Azure Information Protection Premium services provide the ability to work seamlessly with third-party applications and services.
These third-party applications and services may involve storing, transmitting, and processing your organization's customer content on third-party systems that are outside of the Azure Information Protection Premium infrastructure, and therefore not covered by our compliance and data protection commitments.
Make sure you review the privacy and compliance statements provided by the third parties when assessing the appropriate use of these services for your organization.
Parity with Azure Information Protection premium commercial offerings
Configuring Azure Information Protection for GCC High and DoD customers
The following configuration details are relevant for all Azure Information Protection solutions for GCC High and DoD customers, including unified labeling solutions.
As of the July 2020 update, all new GCC High customers of the Azure Information Protection unified labeling solution, can make use of both General menu and Scanner menu features only.
Enable Rights Management for the tenant
For the encryption to work correctly, the Rights Management Service must be enabled for the tenant.
Check if the Rights Management service is enabled
Launch PowerShell as an Administrator
Run Install-Module aadrm if the AADRM module is not installed
Connect to service using Connect-aadrmservice -environmentname azureusgovernment
Run (Get-AadrmConfiguration).FunctionalState and check if the state is Enabled
If the functional state is Disabled, run Enable-Aadrm
DNS configuration for encryption (Windows)
For encryption to work correctly, Office client applications must connect to the GCC, GCC High/DoD instance of the service and bootstrap from there. To redirect client applications to the right service instance, the tenant admin must configure a DNS SRV record with information about the Azure RMS URL. Without the DNS SRV record, the client application will attempt connect to the public cloud instance by default, and fail.
Also, the assumption is that users will log in with the username based off the tenant-owned-domain (for example: joe@contoso.us), and not the onmicrosoft username (for example: joe@contoso.onmicrosoft.us). The domain name from the username is used for DNS redirection to the right service instance.
Get the Rights Management Service ID
Launch PowerShell as an Administrator
If the AADRM module is not installed, run Install-Module aadrm
Connect to service using Connect-aadrmservice -environmentname azureusgovernment
Run (Get-aadrmconfiguration).RightsManagementServiceId to get the Rights Management Service ID
Sign in to your DNS provider, and navigate to the DNS settings for the domain to add a new SRV record
Service = _rmsredir
Protocol = _http
Name = _tcp
Target = [GUID].rms.aadrm.us (where GUID is the Rights Management Service ID)
Port = 80
Priority, Weight, Seconds, TTL = default values
Associate the custom domain with the tenant in the Azure portal. Associating the custom domain will add an entry in DNS, which may take a few minutes to verify after adding the value.
Sign in to the Office Admin Center and add the domain (example: contoso.us) for user creation. In the verification process, some more DNS changes might be required. Once verification is done, users can be created.
DNS configuration for encryption (Mac, iOS, Android)
Sign in to your DNS provider, and navigate to the DNS settings for the domain to add a new SRV record
Service = _rmsdisco
Protocol = _http
Name = _tcp
Target = api.aadrm.us
Port = 80
Priority, Weight, Seconds, TTL = default values
Label migration
GCC High and DoD customers need to migrate all existing labels using PowerShell. Traditional AIP migration methods are not applicable for GCC High and DoD customers.
When working with the Azure Information Protection client, you must configure one of the following registry keys to point your AIP apps on Windows to the correct sovereign cloud. Make sure to use the correct values for your setup.
If you have a firewall or similar intervening network devices that are configured to allow specific connections, use the following settings to ensure smooth communication for Azure Information Protection.
TLS client-to-service connection: Do not terminate the TLS client-to-service connection to the rms.aadrm.us URL (for example, to perform packet-level inspection).
You can use the following PowerShell commands to help you determine whether your client connection is terminated before it reaches the Azure Rights Management service:
The result should show that the issuing CA is from a Microsoft CA, for example: CN=Microsoft Secure Server CA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US. If you see an issuing CA name that is not from Microsoft, it is likely that your secure client-to-service connection is being terminated and needs to be reconfigured on your firewall.
Downloading labels and label policies (AIP classic client only): To enable the Azure Information Protection classic client to download labels and label policies, allow the URL api.informationprotection.azure.us over HTTPS.