Active Directory Rights Management Services (RMS) and Exchange 2016 (Part 1)

The Active Directory Rights Management Services (AD RMS) is basically a DRM system. DRM is often used by streaming services to ensure that a piece of music can only be played if there is a corresponding subscription. AD RMS uses a very similar concept, files are provided with a license and encrypted. The license controls what a user is allowed to do with a file (Word, Excel) or an e-mail (read, print, forward). The author of an e-mail or document can determine which license is to be used. The license can also be withdrawn at a later date.

AD RMS can also be integrated into Exchange, the next articles will focus on installation, configuration and integration in Exchange Server 2016.

Surroundings

.he environment in which the Active Directory rights management services are installed is as follows:

RMS

There are a few users with Outlook 2016, a domain controller, 3 Exchange servers (one DAG), a file server for the quorum and a Windows Server 2012 R2 which is currently only configured as a member server and is to be given the RMS role.

The Active Directory is called frankysweb.de, the users use Windows 10 with Outlook 2016.

Preparation

Only a few preparations are required to install the rights management services. A service account can be created in advance, which is used for RMS. The service account is a normal Active Directory user account:

image

The only important thing is that the password must not expire:

image

A DNS entry is also required if the RMS address is different from the server name. In my case, the RMS server is simply called "RMS" and my Active Directory is called "frankysweb.de". I therefore do not need to create a DNS entry, as the DNS entry is created automatically when the server is added to the AD:

image

For example, if the AD listens to "frankysweb.local", split DNS can be used. In concrete terms, this means that if the server name is rms.frankysweb.local, a DNS entry must be created with rms.frankysweb.de and the IP of the RMS server. A DNS name should be used here that can later also be accessed from the Internet.

A certificate is also required for the rights management services. During installation, a self-signed certificate can be installed for test environments. A valid certificate should be used for productive environments. A valid certificate is configured in the section "Intermediate step certificate for RMS". If you are only installing a test environment, you can also use a self-signed certificate at this point and skip this step.

Now the installation can begin.

Installation of Active Directory rights management services

The installation of the rights management services can now be started via the Server Manager. The necessary additional features can also be installed directly:

image

The Server Manager then automatically selects the required IIS services:

image

In the next dialog, only the "Active Directory rights management server" is selected.

image

The final step is to install the roller:

image

Similar to a domain controller, the basic configuration must first be carried out after installing the role:

image

After clicking on "Configure additional settings", the wizard for AD RMS opens:

image

As the first AD RMS server is installed in this case, an AD RMS root cluster must be created:

image

You can now select whether an SQL server should be used for the database or whether the Windows Internal Database should be used. In productive environments, an SQL database with the highest possible availability would be used at this point instead of the Windows Internal Database:

image

The user that was previously created during the preparations is specified for the service account. In this case "ADRMSServiceAccount":

image

Once the user has been specified, you can continue:

image

Cryptographic mode 2 (SHA256) is now selected. SHA1 should no longer be used:

image

The "Use centrally managed AD RMS keystore" item is selected under "Cluster keystore":

image

A password must be assigned for the cluster key:

image

As the IIS has already been installed by the Server Manager, the "Default Web Site" can now be selected:

image

The address for RMS can now be defined. This should not be an internal server name, but an FQDN that can also be reached from the Internet. In my case, it is rms.frankysweb.de on port 443 (HTTPS). The DNS entry has already been created internally under the preparations:

image

As a certificate is required for HTTPS, either a self-signed certificate can be created in the next dialog or an intermediate step can be taken to configure a valid certificate. The next section can be skipped for test environments.

Intermediate step Certificate for RMS

As the IIS has already been installed by the Server Manager, a certificate request can be generated using the IIS Manager:

image

Important: All public CAs now use 2048-bit keys, 1024-bit keys are considered insecure:

image

The CSR can now be saved and submitted to a CA of your choice. In my case, I used StartSSL. StartSSL issues a corresponding certificate with a term of 1 year free of charge:

image

Once the certificate has been issued by the CA, the certificate request can be completed:

image

The certificate only needs to contain the name of the cluster address. The installation can now be continued.

Complete RMS installation

A certificate is required for client communication with the RMS server. I use a free certificate from StartSSL at this point. A self-signed certificate can also be used for test environments:

image

In addition, a licensing certificate is created, here only the name must be specified:

image

The SCP can be created automatically:

image

A summary is displayed in the last step. The installation can begin:

image

It takes a little while until RMS is installed:

image

Finally, the installation result is displayed:

Rights management services

The installation is now complete. The next article is about the configuration.

1 thought on “Active Directory Rechteverwaltungsdienste (RMS) und Exchange 2016 (Teil 1)”

  1. Hallo Frank,
    Danke für diesen Step by Step Guide.
    Versuche die AD RMS Installation auf einem Domain Controller inkl. einer PKI und bereits installierten und konfigurierten AD FS Service.
    Beim Punkt Serverauthentifizierungszertifikat auswählen erhalte ich folgende Warnung:
    Für die ausgewählte Cluster-Url ist bereits eine SSL-Zertifikatanbindung vorhanden
    IIS Bindung Default Website ist für Port 80 ohne Hostnamen und IP-Adresse mit *
    Für https bestehen folgende Bindungen: adfs.xy.com mit IP-Adresse * ,sowie adrms.xy.com mit IP-Adresse *. Die entsprechenden öffentlichen Zertifikate sind jeweils hinterlegt.

    Frage mich nun natürlich ob ich hier ohne zukünftige Probleme die Installation abschliessen kann?

    Besten Dank für den Feedback.
    Gruss, Markus

    Reply

Leave a Comment