In this chapter, you'll learn to use the three different key deployment models to address different compliance requirements and understand what role the Azure Key Vault service plays in this. We'll discuss the three Azure Rights Management Services flows for a better understanding of how keys are used in the complete Azure Information Protection (AIP) solution to address the correct implementation and to help you troubleshooting the solution. This chapter will be divided into the following sections:
- Azure Information Protection key basics:
- Key deployment models
- What is a hardware security module (HSM)?
- What is the Azure Key Vault?
- How Azure RMS works under the hood:
- Algorithms and key lengths
- User environment-initialization flow
- Content protection flow
- Content consumption flow
Let's start with...