In this chapter, you received all the necessary information to map your requirements to the correct key-deployment model. We looked at the pros and cons of using HYOK. With the provided configuration examples, we gathered practical experience, which you can now share or use in your next project or workshop. We learned about the main Azure RMS flows, which are helpful in understanding how Azure RMS works under the hood. You can use this knowledge to support deployments or troubleshoot common issues because many errors happen on the environment-initialization (bootstrapping) process or in the deployment.
In the next chapter, we'll finish configuring the example Azure Information Protection solution, and then you'll be fully prepared for your journey with this nice technology.