AD RMS Trusted Publishing Domain Considerations
Applies To: Windows Server 2008, Windows Server 2008 R2
You can add trust policies so that AD RMS can process licensing requests for content that was rights-protected by a different AD RMS cluster. One such policy is a trusted publishing domain (TPD).
By default, an AD RMS Licensing Server can issue use licenses for only content where it originally issued the publishing license. It some situations, this may not be acceptable. The following are examples of when this may be less than desirable.
In the event when one cluster running AD RMS is to be discontinued, users may still want to access previously protected content that was issued a publishing license by that computer. Servers in other clusters can then add the to-be-discontinued server as a trusted publishing domain.
One company acquires another company.
A trusted publishing domain allows for one AD RMS cluster to issue use licenses against publishing licenses that were issued by a different AD RMS cluster. You add a trusted publishing domain by importing the server licensor certificate and private key of the server to trust.
In order to specify a cluster that can issue use licenses for content protected by a different cluster, the first cluster must be defined as a trusted publishing domain. If content was published by another licensing cluster either in your organization; for example, a subsidiary organization in another forest, or in a separate organization, your AD RMS cluster can grant use licenses to users for this content by configuring a TPD on your AD RMS cluster. By adding a TPD, you set up a trust relationship between your AD RMS cluster and the other certification cluster by importing the trusted publishing certificate of the other cluster. The following diagram shows the steps involved in using a TPD, followed by an explanation of the interactions.
The following example describes how a trusted publishing domain works:
Fabrikam exports and sends an SLC file and password to Contoso.
Contoso provides the password and imports the SLC file.
Alice@Fabrikam.com sends Bob@Contoso.com an item of RMS-protected content.
Bob receives the content and sends his RAC and the publishing license to the issuing licensing server at Contoso.
The licensing server at Contoso can decrypt the publishing license issued by Fabrikam and confirms that Bob is a named principal in the publishing license. It then issues the use license to Bob.
Trusted Publishing Domain Requirements
The following table presents the requirements to implement a solution to allow a trusted publishing domain between Company A and Company B.
Solution Component | Detail | Description | Detail Options |
---|---|---|---|
Active Directory Rights Management Services Server Components |
RMS Domain in each Forest |
|
|
AD RMS Client Components |
Users protecting and consuming AD RMS documents |
|
|
Active Directory Components |
Active Directory Forest |
|
|
ISA Server 2006 (Optional) |
Integrated Edge Security Gateway |
|
|
Hardware Security Module (HSM) (Optional) |
HSM for AD RMS Key Storage |
|
|
Windows Trusts between Forests |
Allow authentication and group lookup queries between forests. |
|
|
DNS Configuration for intranet and extranet pipelines |
Define extranet or intranet server or cluster URLs and create DNS records |
|
|
DNS Configuration for Revocation pipelines (optional) |
Define revocation pipelines and create DNS records |
|
|
SSL Certificates (optional – highly recommended) |
SSL Certificates are not required but are highly recommended for each AD RMS Pipeline. They are required when you deploy with AD FS. |
|
|
Configuration of Trusted User Domain Trust |
Required to allow information exchange between companies. |
|
|
High Availability (recommended) |
Because AD RMS is a service that will protect critical information, you should provide high availability in all components. |
|
|