AD RMS Step-by-Step Guide
Applies To: Windows Server 2008
About This Guide
This step-by-step walks you through the process of setting up a working Active Directory Rights Management Services (AD RMS) infrastructure in a test environment. During this process you create an Active Directory® domain, install a database server, install the AD RMS server role, configure the AD RMS cluster, and configure the AD RMS-enabled client computer.
Once complete, you can use the test lab environment to learn about AD RMS technology on Windows Server® 2008 and assess how it might be deployed in your organization.
As you complete the steps in this guide, you will:
Prepare the AD RMS infrastructure.
Install and configure AD RMS.
Verify AD RMS functionality after you complete the configuration.
The goal of an AD RMS deployment is to be able to protect information, no matter where it goes. Once AD RMS protection is added to a digital file, the protection stays with the file. By default, only the content owner is able to remove the protection from the file. The owner grants rights to other users to perform actions on the content, such as the ability to view, copy, or print the file. For more information about the business reasons behind an AD RMS deployment, see the white paper "Windows Rights Management Services: Helping Organizations Safeguard Digital Information from Unauthorized Use" (https://go.microsoft.com/fwlink/?LinkId=64636).
Note
This guide is considered the basic AD RMS step-by-step guide. All other step-by-step guides developed for AD RMS will assume that this guide has been completed first.
What This Guide Does Not Provide
This guide does not provide the following:
An overview of AD RMS. For more information about the advantages that AD RMS can bring to your organization, see https://go.microsoft.com/fwlink/?LinkId=84726.
Guidance for setting up and configuring AD RMS in a production environment
Complete technical reference for AD RMS
Deploying AD RMS in a Test Environment
We recommend that you first use the steps provided in this guide in a test lab environment. Step-by-step guides are not necessarily meant to be used to deploy Windows Server features without additional deployment documentation and should be used with discretion as a stand-alone document.
Upon completion of this step-by-step guide, you will have a working AD RMS infrastructure. You can then test and verify AD RMS functionality as follows:
Restrict permissions on a Microsoft Office Word 2007 document
Have an authorized user open and work with the document.
Have an unauthorized user attempt to open and work with the document.
The test environment described in this guide includes four computers connected to a private network and using the following operating systems, applications, and services:
Computer Name | Operating System | Applications and Services | ||
---|---|---|---|---|
ADRMS-SRV |
Windows Server 2008 |
AD RMS, Internet Information Services (IIS) 7.0, World Wide Web Publishing Service, and Message Queuing |
||
CPANDL-DC |
Windows Server 2008 or Windows Server 2003 with Service Pack 2 (SP2)
|
Active Directory, Domain Name System (DNS) |
||
ADRMS-DB |
Windows Server 2003 with SP2 Note Service Pack 2 for Windows Server 2003 is not required but will be used for the purposes of this guide.
|
Microsoft SQL Server® 2005 Standard Edition with Service Pack 2 (SP2) Note Service Pack 2 for SQL Server 2005 Standard Edition is not required but will be used for the purposes of this guide.
|
||
ADRMS-CLNT |
Windows Vista® |
Microsoft Office Word 2007 Enterprise Edition |
Note
For more information about the system requirements for installing AD RMS, see https://go.microsoft.com/fwlink/?LinkId=84733.
The computers form a private intranet and are connected through a common hub or Layer 2 switch. This configuration can be emulated in a virtual server environment if desired. This step-by-step exercise uses private addresses throughout the test lab configuration. The private network ID 10.0.0.0/24 is used for the intranet. The domain controller is named CPANDL-DC for the domain named cpandl.com. The following figure shows the configuration of the test environment:
Step 1: Setting Up the Infrastructure
To prepare your AD RMS test environment in the CPANDL domain, you must complete the following tasks:
Configure the domain controller (CPANDL-DC)
Configure the AD RMS database computer (ADRMS-DB)
Configure the AD RMS root cluster computer (ADRMS-SRV)
Configure AD RMS client computer (ADRMS-CLNT)
Use the following table as a reference when setting up the appropriate computer names, operating systems, and network settings that are required to complete the steps in this guide.
Important
Before you configure your computers with static Internet Protocol (IP) addresses, we recommend that you first complete Windows product activation while each of your computers still has Internet connectivity. You should also install any available critical security updates from Windows Update (https://go.microsoft.com/fwlink/?LinkID=47370).
Computer name | Operating system requirement | IP settings | DNS settings |
---|---|---|---|
CPANDL-DC |
Windows Server 2003 with Service Pack 2 (SP2) or Windows Server® 2008 |
IP address: 10.0.0.1 Subnet mask: 255.255.255.0 |
Configured by DNS server role. |
ADRMS-SRV |
Windows Server 2008 |
IP address: 10.0.0.2 Subnet mask: 255.255.255.0 |
Preferred: 10.0.0.1 |
ADRMS-DB |
Windows Server 2003 with SP2 |
IP address: 10.0.0.3 Subnet mask: 255.255.255.0 |
Preferred: 10.0.0.1 |
ADRMS-CLNT |
Windows Vista |
IP address 10.0.0.4 Subnet mask: 255.255.255.0 |
Preferred: 10.0.0.1 |
Configure the domain controller (CPANDL-DC)
Depending on your environment, you may evaluate AD RMS in Windows Server 2008 or Windows Server 2003 domain. Use the appropriate section to configure the domain controller, depending on the type of domain to be used, and then configure user accounts and groups.
Configure a Windows Server 2003–based domain controller
To configure the domain controller CPANDL-DC using Windows Server 2003, you must:
Install Windows Server 2003 with SP2.
Configure TCP/IP properties.
Install Active Directory.
Raise the Active Directory domain functional level to Windows Server 2003.
Create user accounts.
Create groups for the user accounts.
For each user account and group that you configure with AD RMS, you need to add an e-mail address and then assign the users to groups.
First, install Windows Server 2003 with SP2 on a stand-alone server.
To install Windows Server 2003 Standard Edition
Start your computer by using the Windows Server 2003 product CD. (You can use any edition of Windows Server 2003 except the Web Edition to establish the domain.)
Follow the instructions that appear on your computer screen, and when prompted for a computer name, type CPANDL-DC.
Next, configure TCP/IP properties so that CPANDL-DC has a static IP address of 10.0.0.1. In addition, configure 10.0.0.1 as the IP address for the DNS server.
To configure TCP/IP properties on CPANDL-DC
Log on to CPANDL-DC as a member of the local Administrators group.
Click Start, point to Control Panel, point to Network Connections, click Local Area Connection, and then click Properties.
On the General tab, click Internet Protocol (TCP/IP), and then click Properties.
Click the Use the following IP address option. In the IP address box, type 10.0.0.1. In the Subnet mask box, type 255.255.255.0.
Click OK, and then click Close to close the Local Area Connection Properties dialog box.
Next, configure the computer as a domain controller.
To configure CPANDL-DC as a domain controller
Click Start, and then click Run. In the Open box, type dcpromo, and then click OK.
On the Welcome page of the Active Directory Installation Wizard, click Next.
Click the Domain controller for a new domain option, and then click Next.
Click the Domain in a new forest option, and then click Next.
Click the No, just install and configure DNS on this computer option, and then click Next.
In the Full DNS name for new domain box, type cpandl.com, and then click Next.
In the Domain NetBIOS name box, type CPANDL, and then click Next three times.
Select the Permissions compatible only with Windows 2000 or Windows Server 2003 operating systems option, and then click Next.
In the Restore Mode Password and Confirm password boxes, type a strong password. Click Next.
Click Next again.
When the Active Directory Installation Wizard is done, click Finish.
Click Restart Now.
Note
You must restart the computer after you complete this procedure.
Next, you must raise the domain functional level to Windows Server 2003 so that Active Directory Universal groups can be used.
To raise the domain functional level to Windows Server 2003
Log on to CPANDL-DC with the CPANDL\Administrator account.
Click Start, point to Administrative Tools, and then click Active Directory Users and Computers.
Right-click cpandl.com, and then click Raise domain functional level.
In the list under Select an available domain functional level, click Windows Server 2003, and then click Raise.
Click OK to confirm the selection.
Note
You cannot change the domain functional level once you have raised it.
- Close the Active Directory Users and Computers console.
Configure a Windows Server 2008–based domain controller
To configure the domain controller CPANDL-DC using Windows Server 2008, you must:
Install Windows Server 2008.
Configure TCP/IP properties.
Install Active Directory Domain Services (AD DS).
First, install Windows Server 2008 on a stand-alone server.
To install Windows Server 2008
Start your computer by using the Windows Server 2008 product CD.
When prompted for a computer name, type CPANDL-DC.
Follow the rest of the instructions that appear on your screen to finish the installation.
Next, configure TCP/IP properties so that CPANDL-DB has a IPv4 static IP address of 10.0.0.1 and a IPv6 static IP address of FEC0:0:0:1::.
To configure TCP/IP properties
Log on to CPANDL-DC with the CPANDL-DC\Administrator account.
Click Start, click Control Panel, click Network and Internet, click Network and Sharing Center, click Manage Network Connections, right-click Local Area Connection, and then click Properties.
On the Networking tab, click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.
Click the Use the following IP address option. In the IP address box, type 10.0.0.1. In the Subnet mask box, type 255.255.255.0, and then click OK.
On the Networking tab, clear the Internet Protocol Version 6 (TCP/IPv6) check box, and then click OK.
Click OK to close the Local Area Connection Properties dialog box.
Next, configure the computer as a domain controller using Windows Server 2008.
To configure CPANDL-DC as a domain controller using Windows Server 2008
Click Start, and then click Run. In the Open box, type dcpromo, and then click OK.
On the Welcome to the Active Directory Domain Services Installation Wizard page, click Next.
Click the Domain controller for a new domain option, and then click Next.
Click the Create a new domain in anew forest option, and then click Next.
In the FQDN of the forest root domain box, type cpandl.com, and then click Next.
In the Forest functional level box, select Windows Server 2003, and then click Next.
In the Domain functional level box, select Windows Server 2003, and then click Next.
Ensure that the DNS server check box is selected, and then click Next.
Click Yes, confirming that you want to create a delegation for this DNS server.
On the Location for Database, Log Files, and SYSVOL page, click Next.
In the Password and Confirm password boxes, type a strong password, and then click Next.
On the Summary page, click Next to start the installation.
When the installation is complete, click Finish, and then click Restart Now.
Note
You must restart the computer after you complete this procedure.
Configure user accounts and groups
In this section you create the user accounts and groups in the CPANDL domain.
First, add the user accounts shown in the following table to Active Directory or AD DS. Use the procedure following the table to create the user accounts.
Account Name | User Logon Name | E-mail address | Group |
---|---|---|---|
ADRMSSRVC |
ADRMSSRVC |
|
|
ADRMSADMIN |
ADRMSADMIN |
|
Enterprise Admins |
Nicole Holliday |
NHOLLIDA |
nhollida@cpandl.com |
Employees, Finance |
Limor Henig |
LHENIG |
lhenig@cpandl.com |
Employees, Marketing |
Stuart Railson |
SRAILSON |
srailson@cpandl.com |
Employees, Engineering |
To add new user accounts
Click Start, point to Administrative Tools, and then click Active Directory Users and Computers.
In the console tree, expand cpandl.com.
Right-click Users, point to New, and then click User.
In the New Object – User dialog box, type ADRMSSRVC in the Full name and User logon name boxes, and then click Next.
In the New Object – User dialog box, type a password of your choice in the Password and Confirm password boxes. Clear the User must change password at next logon check box, click Next, and then click Finish.
Perform steps 3-6 for each of the following users: ADRMSADMIN, Nicole Holliday, Limor Henig, and Stuart Railson.
Next, add e-mail addresses to all user accounts.
To add e-mail addresses to user accounts
In the Active Directory Users and Computers console, right-click Nicole Holliday, click Properties, type nhollida@cpandl.com in the E-mail box, and then click OK.
Repeat step 1 for Limor Henig and Stuart Railson, using the e-mail addresses for each account from the table.
Close the Active Directory Users and Computers console.
Once the user accounts have been created, Active Directory Universal groups should be created and these users added to them. The following table lists the Universal groups that should be added to Active Directory. Use the procedure following the table to create the Universal groups.
Group Name | E-mail address |
---|---|
Finance |
finance@cpandl.com |
Marketing |
marketing@cpandl.com |
Engineering |
engineering@cpandl.com |
Employees |
employees@cpandl.com |
To add new group objects to Active Directory
In the Active Directory Users and Computers console, right-click Users, point to New, and then click Group.
In the New Object – Group dialog box, type Finance in Group name, select the Universal option for the Group Scope, and then click OK.
Perform the above steps 1-2 for each of the remaining groups: Marketing, Engineering, and Employees.
Next, add e-mail addresses to group objects:
To add e-mail addresses to group objects
In the Active Directory Users and Computers console, double-click Users, right-click Finance, and then click Properties.
Type finance@cpandl.com in the E-mail box, and then click OK.
Perform the above steps 1-2 for each of the remaining groups: Marketing, Engineering, and Employees.
Finally, add the user accounts to their appropriate groups. In this guide, we will add Nicole Holliday, Limor Henig, and Stuart Railson to the Employees group. Then, we will add Nicole Holliday to the Finance group, Limor Henig to the Marketing group, and finally add Stuart Railson to the Engineering group. To add the user accounts to their respective groups, you should follow these steps:
To add user accounts to groups
In the Active Directory Users and Computers console, double-click Users, and then double-click Employees.
Click Members, and then click Add.
Type nhollida@cpandl.com;lhenig@cpandl.com;srailson@cpandl.com, and then click OK.
Perform the above steps 2-4 to add one member to each of the remaining groups as follows:
Nicole Holliday—Finance
Limor Henig—Marketing
Stuart Railson—Engineering
Double-click Enterprise Admins
Click Members, and then click Add.
Type adrmsadmin@cpandl.com, and then click OK.
Close the Active Directory Users and Computers console.
Configure the AD RMS database computer (ADRMS-DB)
First, install Windows Server 2003 on the computer that will be hosting the AD RMS databases.
To install Windows Server 2003 Standard Edition
Start your computer using the Windows Server 2003 product CD. (You can use any edition of Windows Server 2003 except the Web Edition to establish the domain.)
Follow the instructions that appear on your computer screen, and when prompted for a computer name, type ADRMS-DB.
In this step, configure TCP/IP properties so that ADRMS-DB has a static IP address of 10.0.0.3.
To configure TCP/IP properties on ADRMS-DB
Log on to ADRMS-DB with the ADRMS-DB\Administrator account or another user account in the local Administrators group.
Click Start, point to Control Panel, point to Network Connections, click Local Area Connection, and then click Properties.
On the General tab, click Internet Protocol (TCP/IP), and then click Properties.
Click the Use the following IP address option. In the IP address box, type 10.0.0.3. In the Subnet mask box, type 255.255.255.0. In the Preferred DNS server box, type 10.0.0.1.
Click OK, and then click Close to close the Local Area Connection Properties dialog box.
Next, join the AD RMS database server (ADRMS-DB) computer to the CPANDL domain:
To join ADRMS-DB to the CPANDL domain
Click Start, right-click My Computer, and then click Properties.
Click Computer Name tab, and then click Change.
In the Computer Name Changes dialog box, select the Domain option, and then type cpandl.com.
Click More, and then type cpandl.com in the Primary DNS suffix of this computer box.
Click OK twice.
When a Computer Name Changes dialog box appears prompting you for administrative credentials, provide the credentials for CPANDL\Administrator, and then click OK.
When a Computer Name Changes dialog box appears welcoming you to the cpandl.com domain, click OK.
When a Computer Name Changes dialog box appears telling you that the computer must be restarted, click OK, and then click OK again.
Click Yes to restart the computer.
Next, install Microsoft SQL Server 2005 Standard Edition:
To install Microsoft SQL Server 2005
Log on to ADRMS-DB with the CPANDL\Administrator account or another user account in the local Administrators group.
Insert the Microsoft SQL Server 2005 product CD. The installation will start automatically.
Click the I accept the licensing terms and conditions check box, and then click Next.
On the Installing Prerequisites page, click Install.
Click Next.
On the Welcome to theMicrosoft SQL Server Installation Wizard page, click Next, and then click Next again.
In the Name box, type your name. In the Company box, type the name of your organization, and then type in the appropriate product key. Click Next.
Select the SQL Server Database Services, and Workstation components, Books Online, and development tools check boxes, and then click Next.
Select the Default instance option, and then click Next.
Click the Use the built-in System account option, and then click Next.
Click the Windows Authentication Mode option, and then click Next.
Click Next, accepting the default Collation Settings, and then click Next again.
Click Install. When the status of all the selected components is finished, click Next.
Click Finish.
Next, add ADRMSADMIN to the local Administrators group on ADRMS-DB. The AD RMS installing user account needs this membership in order to create the AD RMS databases. After AD RMS installed, ADRMSADMIN can be removed from this group.
To add ADRMSADMIN to local Administrators group
Click Start, point to Administrative Tools, and then click Computer Management.
Expand System Tools, expand Local Users and Groups, and then click Groups.
Right-click Administrators, click Add to Group, click Add, type ADRMSADMIN in Enter the object names to select (examples) box, and then click OK.
Click OK, and then close Computer Management.
Finally, create a shared folder on ADRMS-DB so that other users can find documents saved to the network.
To create a shared network folder that can be modified by CP&L employees
Click Start, click MyComputer, and then double-click Local Disk (C:).
Click File, point to New, and then click Folder.
Type Public for the new folder, and then press ENTER.
Right-click Public, and then click Sharing and Security.
On the Sharing tab click the Share this folder option, and ensure that Public is in the Share name box.
Click Permissions.
In the Group or user name box click Everyone.
Select the Full Control check box in the Allow column of the Permissions for Everyone box.
Click OK.
Click the Security tab, and then click Users (ADRMS-DB\Users) in the Group or user name box.
In the Permissions for Users box select the Full Control check box in the Allow column.
Click OK.
Configure the AD RMS root cluster computer (ADRMS-SRV)
To configure the member server, ADRMS-SRV, you must install Windows Server 2008, configure TCP/IP properties, and then join ADRMS-SRV to the domain cpandl.com. You must also add the account ADRMSADMIN as a member to the local administrators group. This is needed for ADRMSADMIN to install AD RMS on ADRMS-SRV.
Installing the AD RMS server role will also install Internet Information Services (IIS) 7.0 and Message Queuing.
First, install Windows Server 2008 as a stand-alone server.
To install Windows Server 2008
Start your computer by using the Windows Server 2008 product CD.
When prompted for a computer name, type ADRMS-SRV.
Follow the rest of the instructions that appear on your screen to finish the installation.
Next, configure TCP/IP properties so that ADRMS-SRV has a static IP address of 10.0.0.2. In addition, configure the DNS server by using the IP address of CPANDL-DC (10.0.0.1).
To configure TCP/IP Properties
Log on to ADRMS-SRV with the ADRMS-SRV\Administrator account or another user account in the local Administrators group.
Click Start, click Control Panel, double-click Network and Sharing Center, click Manage Network Connections, right-click Local Area Connection, and then click Properties.
On the Networking tab, click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.
Click the Use the following IP address option. In IP address, type 10.0.0.2, in Subnet mask, type 255.255.255.0.
Click the Use the following DNS server addresses option. In Preferred DNS server, type 10.0.0.1.
Click OK, and then click Close to close the Local Area Connection Properties dialog box.
Next, join ADRMS-SRV to the cpandl.com domain.
To join ADRMS-SRV to the cpandl.com domain
Click Start, right-click Computer, and then click Properties.
Click Change settings (at the right side under Computer name, domain, and workgroup settings), and then click Change.
In the Computer Name/Domain Changes dialog box, select the Domain option, and then type cpandl.com.
Click More, and type cpandl.com in Primary DNS suffix of this computer box.
Click OK, and then click OK again.
When a Computer Name/Domain Changes dialog box appears prompting you for administrative credentials, provide the credentials for CPANDL\Administrator, and then click OK.
When a Computer Name/Domain Changes dialog box appears welcoming you to the cpandl.com domain, click OK.
When a Computer Name/Domain Changes dialog box appears telling you that the computer must be restarted, click OK, and then click Close.
Click Restart Now.
After the computer has restarted, add ADRMSADMIN to the local administrators group on ADRMS-SRV.
To add ADRMSADMIN to the local administrators group
Log on to ADRMS-SRV with the CPANDL\Administrator account.
Click Start, click Administrative Tools, and then click Computer Management.
Expand System Tools, expand Local User and Groups, and then click Groups.
Right-click Administrators, click Add to Group, click Add, type ADRMSADMIN in Enter the object names to select (examples) box, and then click OK.
Click OK, and then close Computer Management.
Configure AD RMS client computer (ADRMS-CLNT)
To configure ADRMS-CLNT, you must install Windows Vista, configure TCP/IP properties, and then join ADRMS-CLNT to the domain cpandl.com. You must also install an AD RMS-enabled application. In this example, Microsoft Office Word 2007 Enterprise Edition is installed on ADRMS-CLNT.
To install Windows Vista
Start your computer by using the Windows Vista product CD.
Follow the instructions that appear on your screen, and when prompted for a computer name, type ADRMS-CLNT.
Next, configure TCP/IP properties so that ADRMS-CLNT has a static IP address of 10.0.0.4. In addition, configure the DNS server of CPANDL-DC (10.0.0.1).
To configure TCP/IP properties
Log on to ADRMS-CLNT with the ADRMS-CLNT\Administrator account or another user account in the local Administrators group.
Click Start, click Control Panel, click Network and Internet, and then click Network and Sharing Center.
Click Manage Network Connections, right-click Local Area Connection, and then click Properties.
If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
On the Networking tab, click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.
Click the Use the following IP address option. In IP address, type 10.0.0.4, in Subnet mask, type 255.255.255.0.
Click the Use the following DNS server addresses option. In Preferred DNS server, type 10.0.0.1.
Click OK, and then click Close to close the Local Area Connection Properties dialog box.
Next, join ADRMS-CLNT to the cpandl.com domain.
To join ADRMS-CLNT to the cpandl.com domain
Click Start, right-click Computer, and then click Properties.
Under Computer name, domain, and workgroup settings, click Change settings.
If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
On the Computer Name tab, click Change.
In the Computer Name/Domain Changes dialog box, select the Domain option, and then type cpandl.com.
Click More, and in the Primary DNS suffix of this computer box, type cpandl.com.
Click OK, and then click OK again.
When a Computer Name/Domain Changes dialog box appears prompting you for administrative credentials, provide the credentials, and then click OK.
When a Computer Name/Domain Changes dialog box appears welcoming you to the cpandl.com domain, click OK.
When a Computer Name/Domain Changes dialog box appears telling you that the computer must be restarted, click OK, and then click Close.
In the System Settings Change dialog box, click Yes to restart the computer.
Finally, install Microsoft Office Word 2007 Enterprise.
To install Microsoft Office Word 2007 Enterprise
Log on to ADRMS-CLNT with the CPANDL\Administrator account or another user account in the local Administrators group.
Double-click setup.exe from the Microsoft Office 2007 Enterprise product disc.
Click Customize as the installation type, set the installation type to Not Available for all applications except Microsoft Office Word 2007 Enterprise, and then click Install Now. This might take several minutes to complete.
Important
Only the Ultimate, Professional Plus, and Enterprise editions of Microsoft Office 2007 allow you to create rights-protected content. All editions will allow you to consume rights-protected content.
Step 2: Installing and Configuring AD RMS ADRMS-SRV
To install and configure AD RMS, you must add the AD RMS server role.
Windows Server 2008 includes the option to install AD RMS as a server role through Server Manager. Both installation and configuration of AD RMS are handled through Server Manager. The first server in an AD RMS environment is the root cluster. An AD RMS root cluster is composed of one or more AD RMS servers configured in a load-balancing environment. This step-by-step guide will install and configure a single-server AD RMS root cluster.
Registering the AD RMS service connection point (SCP) requires that the installing user account be a member of the Active Directory Enterprise Admins group.
Important
Access to the Enterprise Admins group should be granted only while AD RMS is being installed. After installation is complete, the cpandl\ADRMSADMIN account should be removed from this group.
To add ADRMSADMIN to the Enterprise Admins group
Log on to CPANDL-DC with the cpandl\Administrator account or another user account in the Domain Admins group.
Click Start, point to Administrative Tools, and then click Active Directory Users and Computers.
In the console tree, expand cpandl.com, double-click Users, and then double-click Enterprise Admins.
Click the Members tab, and then click Add.
Type adrmsadmin@cpandl.com, and then click OK.
Install and configure AD RMS as a root cluster.
To add the AD RMS Server Role
Log on to ADRMS-SRV as cpandl\ADRMSADMIN.
Click Start, point to Administrative Tools, and then click Server Manager.
If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
In the Roles Summary box, click Add Roles. The Add Roles Wizard opens.
Read the Before You Begin section, and then click Next.
On the Select Server Roles page, select the Active Directory Rights Management Services check box.
The Role Services page appears informing you of the AD RMS dependent role services and features. Make sure that Web Server (IIS), Windows Process Activation Service (WPAS), and Message Queuing are listed, and then click Add Required Role Services. Click Next.
Read the AD RMS introduction page, and then click Next.
On the Select Role Services page, verify that the Active Directory Rights Management Server check box is selected, and then click Next.
Click the Create a new AD RMS cluster option, and then click Next.
Click the Use a different database server option.
Click Select, type ADRMS-DB in the Select Computer dialog box, and then click OK.
In Database Instance, click Default, and then click Validate.
Click Next.
Click Specify, type CPANDL\ADRMSSRVC, type the password for the account, click OK, and then click Next.
Ensure that the Use AD RMS centrally managed key storage option is selected, and then click Next.
Type a strong password in the Password box and in the Confirm password box, and then click Next.
Choose the Web site where AD RMS will be installed, and then click Next. In an installation that uses default settings, the only available Web site should be Default Web Site.
Click the Use an SSL-encrypted connection (https://) option.
In the Fully-Qualified Domain Name box, type adrms-srv.cpandl.com, and then click Validate. If validation succeeds, the Next button becomes available. Click Next.
Click the Create a self-signed certificate for SSL encryption option, and then click Next.
Type a name that will help you identify the AD RMS cluster in the Friendly name box, and then click Next.
Ensure that the Register the AD RMS service connection point now option is selected, and then click Next to register the AD RMS service connection point (SCP) in Active Directory during installation.
Read the Introduction to Web Server (IIS) page, and then click Next.
Keep the Web server default check box selections, and then click Next.
Click Install to provision AD RMS on the computer. It can take up to 60 minutes to complete the installation.
Click Close.
Log off the server, and then log on again to update the security token of the logged-on user account. The user account that is logged on when the AD RMS server role is installed is automatically made a member of the AD RMS Enterprise Administrators local group. A user must be a member of that group to administer AD RMS.
Note
At this point in the guide, you can remove cpandl\ADRMSADMIN from the local Administrators group on ADRMS-DB.
Your AD RMS root cluster is now installed and configured.
Further management of AD RMS is done by using the Active Directory Rights Management Services console.
To open the Active Directory Rights Management Services console
Click Start, point to Administrative Tools, and then click Active Directory Rights Management Services.
If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
From the console, you can configure trust policies, configure exclusion policies, and create rights policy templates.
Step 3: Verifying AD RMS Functionality
The AD RMS client is included in the default installation of Windows Vista and Windows Server 2008. Previous versions of the client are available for download for some earlier versions of the Windows operating system. For more information, see the Windows Server 2003 Rights Management Services page on the Microsoft Windows Server TechCenter (https://go.microsoft.com/fwlink/?LinkId=68637).
Before you can consume rights-protected content, you must add the AD RMS cluster URL to the Local Intranet security zone.
Add the AD RMS cluster URL to the Local Intranet security zone for all users who will be consuming rights-protected content.
To add AD RMS cluster to Local Intranet security zone
Log on to ADRMS-CLNT as Nicole Holliday (cpandl\NHOLLIDA).
Click Start, click All Programs, and then click Internet Explorer.
Click Tools, and then click Internet Options.
Click the Security tab, click Local intranet, and then click Sites.
Click Advanced.
In the Add this website to the zone, type https://adrms-srv.cpandl.com, and then click Add.
Click Close.
Repeat steps 1–7 for Stuart Railson and Limor Henig.
To verify the functionality of the AD RMS deployment, you will log on as Nicole Holliday and then restrict permissions on a Microsoft Word 2007 document so that members of the CP&L Engineering group are able to read the document but unable to change, print, or copy. You will then log on as Stuart Railson, verifying that the proper permission to read the document has been granted, and nothing else. Then, you will log on as Limor Henig. Since Limor is not a member of the Engineering group, he should not be able to consume the rights-protected file.
Note
In this step-by-step guide, when a user restricts permissions on a document or attempts to open a restricted document, a warning appears that informs you that the certificate issuer for the AD RMS Web site is unknown or untrusted. This warning results from using a self-signed certificate instead of a certificate issued by a recognized certification authority. When you receive this warning, click Yes to continue.
To restrict permissions on a Microsoft Word document
Log on to ADRMS-CLNT as Nicole Holliday (cpandl\NHOLLIDA).
Click Start, point to All Programs, point to Microsoft Office, and then click Microsoft Office Word 2007.
Type CP&L engineering employees can read this document, but they cannot change, print, or copy it on the blank document page.
Click the Microsoft Office Button, click Prepare, click Restrict Permission, and then click Restricted Access.
Click the Restrict permission to this document check box.
In the Read box, type engineering@cpandl.com, and then click OK to close the Permission dialog box.
Click the Microsoft Office Button, click Save As, and then save the file as \\ADRMS-DB\Public\ADRMS-TST.docx.
Log off as Nicole Holliday.
Next, log on as Stuart Railson and open the document, ADRMS-TST.docx.
To view a rights-protected document
Log on to ADRMS-CLNT as Stuart Railson (cpandl\SRAILSON).
Click Start, point to All Programs, point to Microsoft Office, and then click Microsoft Office Word 2007.
Click the Microsoft Office Button, and then click Open.
In the File name box, type \\ADRMS-DB\Public\ADRMS-TST.docx, and then click Open.
The following message appears: "Permission to this document is currently restricted. Microsoft Office must connect to https://adrms-srv.cpandl.com:443/\_wmcs/licensing to verify your credentials and download your permission."
Click OK.
The following message appears: "Verifying your credentials for opening content with restricted permissions…".
When the document opens, click the Microsoft Office Button. Notice that the Print option is not available.
Close Microsoft Word.
Log off as Stuart Railson.
Finally, log on as Limor Henig and verify that he is not able to consume the rights-protected file.
To attempt to view a rights-protected document
Log on to ADRMS-CLNT as Limor Henig (cpandl\LHENIG).
Click Start, point to All Programs, point to Microsoft Office, and then click Microsoft Office Word 2007.
Click the Microsoft Office Button, click Open, and then double-click \\ADRMS-DB\Public\ADRMS-TST.docx.
The following message appears: "Permission to this document is currently restricted. Microsoft Office must connect to https://adrms-srv.cpandl.com:443/\_wmcs/licensing to verify your credentials and download your permission."
Click OK.
The following message appears: "You do not have credentials that allow you to open this document. You can request updated permission from nhollida@cpandl.com. Do you want to request updated permission?"
Click No, and then close Microsoft Word.
You have successfully deployed and demonstrated the functionality of AD RMS, using the simple scenario of applying restricted permissions to a Microsoft Word 2007 document. You can also use this deployment to explore some of the additional capabilities of AD RMS through additional configuration and testing.