Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Brief description of Microsoft RMS operation

2025-02-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/02 Report--

1. Notes:

An inactive Office system cannot use authorization features or documents to which permissions have been granted

Measured for Office 2007 (unstable), 2010, 2013

Due to Microsoft's technical limitations, such encryption is irreversible. It is recommended to keep an unencrypted copy of the authorized file locally, otherwise once the password is lost or the encryption server is abnormal, the encrypted file will not be used permanently.

2. permission settings

Office 2010 and 2013 Licensing Settings

If you want to perform permission operations on Word, Excel, and Office, the host that performs authorized operations needs to join the contoso domain environment (you can ask the IT department for assistance in joining the domain environment).

The file to be assigned can be operated according to the number of the red information prompt box

There will be a prompt to select an authorization server, please select the second option to select "Microsoft Windows Account" mode to authorize the operation

Enter the creator's domain account and password for authentication (complete document creation on RMS server)

Owner's ownership certificate)

After successful authentication, the user authorization interface will pop up. Please follow the number of the red prompt box. Unnumbered is comment content

Note: Domain account number, Chinese name, full spelling of name and Exchange email address can be used when adding users.

Click "Other Options" and the following figure pops up. This interface provides the function of adding, deleting and modifying authorization objects and the function of requesting authorization.

After permission is set, you will see the contents as shown in the figure in the information under the File menu of the document and in the editing interface, which means that the authorization has been completed and takes effect.

Thus, the permission setting is completed.

The Office 2007 user authorization settings menu can be found in the figure below (the rest of the settings are the same as 2010 and 2013)

Note: Office 2007 performs document authorization operations, but various problems may occur.

How to view authorized documents

End user pre-read settings

IE Settings:

Add trust website, as shown in the figure

Please close the windows in sequence after operation (configure if it cannot be used normally)

Document Open Environment

Successfully licensed files can only be used in environments where effective communication with RMS servers is possible.

When the document attempts to be opened, the application will ask the user for a valid username and password

What users can do after successfully opening a document depends on the permissions they are granted.

Request additional authorization

Please follow the instructions below.

The file owner will be notified of the final application for right recovery through the Netcom mailbox. However, after the file owner modifies the permission, the file needs to be re-sent to the user. Please delete the original file.

Question answer:

Enter username password invalid

Solution: Please enter the username in the format "contoso\test"(letters are case-insensitive); the password is a domain password. Please confirm that the password is correct.

Unable to open the document after entering the wrong username and password: (After entering the wrong password for many times, entering the correct account password again is still invalid)

Solution: Please check "Show hidden files, folders and drives", the specific operation is as follows (clear RMS cache,), in addition, depending on the operating system, the cache file location may also be different (see figure, respectively, Windows 7 and Windows 10 cache path)

That is, delete all files under the specified folder, but there may be individual files that cannot be deleted due to occupancy problems, so ignore it.

Swordsmithing Team Signature:

[Director] Twelve Spring and Autumn, 3483099@qq.com;

[Master] Ge Daobucang, han169@126.com;

[Java Development] Yu Si, 343691194@qq.com; Si Qi Jun Hui, qiangzhang1227@163.com; Xiao Wang Zi, 545106057@qq.com; Xun Shan Xiao Zuan Feng, 840260821@qq.com;

[VS Development] Doudian, 2268800211@qq.com;

[System Test] Earth Mirror Ask, 847071279@qq.com; Dust and Freedom, 695187655@qq.com;

[Big Data] Desert Oasis, caozhipan@126.com; Zhang Sansheng, 570417591@qq.com;

[Internet] Ye Guxing, 11297761@qq.com;

[System Operation] Three Stones, 261453882@qq.com; Ordinary Weird, 591169003@qq.com;

[Disaster Recovery Backup] Autumn Rain, 18568921@qq.com;

Confidentiality, you know.

Original Title: Autumn Rain

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report