![]() Microsoft provides a free SDK (software development kit), which allows developers of third-party software programs to ensure compatibility with the system. Rights for a Word document that have been granted in Office 365 in a Windows environment, for example, will continue to apply after the document has been sent by Gmail and opened on an Apple system. This interoperability and portability makes a considerable contribution to the success of the Microsoft solution. Alternative operating systems such as Linux and Apple OS X are just as well-supported as the Android, iOS and Blackberry mobile platforms. The company’s philosophy has changed somewhat since then, a good example being the portability of Microsoft RMS. It fought against open source solutions – Linux in particular – on both an ideological and economic front. In the 1990s, Microsoft was not seen as a particularly open company. Integration is largely transparent and therefore fairly convenient. These include Office, Exchange, SharePoint, Skype for Business and XPS. Many of the components used in the business domain now support RMS. However, with the help of a dedicated template, initially conflicting requirements can be met. For example, sorting and filtering is not possible in read-only Excel documents. The following example illustrates the different requirements that could be applied to an Excel spreadsheet:ĭepending on the document type and the client software, this check can open up even more possibilities. RMS introduces a number of granular configuration options, which also allow rights to be revoked after a document has been shared, for example. With Windows 10 and the 2016 range of Microsoft products, the possibilities are being promoted quite aggressively. However, administrators and companies have only started taking it seriously in terms of maturity and stability since Windows 8 and Server 2012. The earlier versions Windows XP, 2000 and Server 2003 can be upgraded. The RMS client has actually been part of the operating system since Windows Vista and Server 2008. It is now referred to as AD RMS (Active Directory Rights Management Services). One of the biggest and most promising RMS implementations is provided by Microsoft. RMS is a framework that makes the additional features offered by DRM available in an operating system. The aim is to be able to define the file rights for all possible actions and all systems. sticky bit) have provided a little more flexibility, they have not managed to address the current needs. The available possibilities are clearly limited. Below is an example of this granular rights assignment within the context of a software development project, in the form typically seen in Unix-like environments: The three possible actions are read, write and execute. A distinction is usually made between owner, member of the same user group, and other users. A file or directory is assigned an owner, who can then set the access rights for it. In the past, rights management has focused on file objects. In the area of applied computer security, the aim of DRM is to minimize misuse of data and software among legitimate and illegitimate users. The main field of application for digital rights management has changed in recent years. The music industry has since come to the realization that, instead of restricting the user, the best way to prevent piracy is by offering high-quality, technologically convenient products at fair prices. A similar effect was seen with downloadable music, which is also being offered increasingly without DRM. ![]() Much to the annoyance of customers, however, this copy protection mechanism was incompatible with older playback devices. The public first became aware of DRM when the music industry used it in an attempt to restrict the ability to copy audio CDs. It describes a way to define the usage rights for a digital component and implement them in a technical sense. This article discusses the current implementations and the possibilities that they present.ĭRM stands for digital rights management. DRM/RMS is beginning to assert a new generation of access rights management capable of revolutionizing the field of information security. Yet they have been somewhat neglected in the past two decades – almost completely forgotten at times – as a result of new attack vectors that had to be addressed with other security mechanisms. The implementation demands a solid conceptįile access rights are an important aspect of applied computer security.Microsoft provides RMS which is the best and most universal solution.DRM adds further possibilities like preventing copy & paste or forwarding by email.File access rights an an important aspect of computer security. ![]()
0 Comments
Leave a Reply. |