Mobility Experts: Step-by-step instructions for activating WorxMail with RMS

2:08 PM
Mobility Experts: Step-by-step instructions for activating WorxMail with RMS -

With the release of new version of WorxApps comes additional features. One of the long-awaited was that support for IRM (Information Rights Management) on iOS WorxMail. Earlier version of WorxMail had with the release of 10.0.7 and higher WorxMail support for IRM on Android devices, and iOS platforms is now supported.

to the following Citrix eDocs link go to find out more about IRM support in WorxMail and also the list of attributes that are currently supported.

http://support.citrix.com/proddocs/topic/worx-mobile-apps/xmob-worx-mail.html

There are several blogs that talks about how RMS to set up and configure, I will in this blog, although it does not go, but if you have any specific question on RMS installation have in the comments please ask.

[1945001StellenSiesicher] that has been configured as follows in the Active Directory and Exchange Server

1) Rights Management Server role on the Active Directory.

2) AD RMS administrator group on Active Directory.

3) Federated Delivery mailbox account user added to this Administrators group on the Exchange server.

4) Super Users group function enables the AD RMS management tool in Active Directory.

it is necessary to test the IRM configuration after the above four points are met. Points 3 and 4 has been covered in this blog.

How IRM configuration

Use to validate Get and Test cmdlets to validate RMS, use to under cmdlets in Exchange Management Shell IRM config address:

Get-IRMConfiguration


I f the InternalLicensingEnabled is false cmdlet in Exchange management Shell are executed

Set-IRMConfiguration -InternalLicensingEnabled $ true

and start the Get-IRMConfiguration

the test IRMConfiguration cmdlets information Rights management (IRM) configuration and functionality.

[testing Test IRMConfiguration transmitter smith@bklab.local

overall result should show as pASS

Okay, after the IRM configuration is successfully validated, let us needed to go through other configurations:

  1. MDX-policy configuration for WorxMail in XMS server
  2. create RMS templates ..
  3. End User Experience during IRM with WorxMail on iOS enabled.

1) WorxMail MDX policy for IRM.

Assuming that you have done XMS initial and WorxMail 10.0.x added in XMS server as an App, IRM configuration is pretty straight forward in iOS app.

Sign up for XMS Admin Portal. Go to Configure -> apps> iOS> WorxMail-> Edit scroll down until you see Information Rights Management option. Slide the IRM to ON as shown in the figure below.

Click Next after the changes.Click Next again on the Approvals (Optional) . want

on the next screen delivery groups in AD you choose to access the WorxMail make applications available and Save it. I have the option All users , because I wanted it to be implemented for all users XMS configured with.

This is all you need to do to. XMS server

Before using the template, make sure that you have already performed with the following two steps:

1. Federated Delivery Mailbox user account added to this Administrators group on the Exchange server.

, the Federated Delivery Mailbox Add The Exchange Management Shell account of the superuser group

to Exchange Server. -> Open Exchnage Management Shell -> Enter

Add distribution -member FederatedEmail.4c1f4d8b-8179-4148-93bf-00a95fa1e042 -Identity RMS_SUPER_USER .

2. Super-User Group function activates the AD RMS management tool in Active Directory with

Enabling superuser go to guidelines securities in cluster -> Super users -> Enable super user under Actions in the right pane. The pop-up window, enter the email address of the superuser group in AD. I've created

RMS_SUPER_USER distribution group in AD with an email address. The e-mail address is used herein to allow the user group.

2) Preparation of RMS templates.

create below Follow a template on Rights Management Server (RMS). Screenshot have installed below assume you RMS on a Windows 08 R2 system

Read Active Directory Rights Management Service. -> expand cluster -> Select Rights Policy Template -> on the right plate select template create marketing rights

Click have I created on in

in the screenshot below a template named "Do Not forward"

, enter the name and description and hit Next

browser to a group or a user, you want rights to grant, with the protected content.

on the next screen you can

to work the content select drain, I left it as never expires .

Click Next on the Extended Policy.

put on the revocation Done.

3) End User Experience

Suppose that end users have been enrolled. Added the WorxMail app from the WorxStore on the device and is already ITHE app with your Exchange settings to configure.

IRM enabled user appears IRM symbol, shown during an e-mail, as shown below in shot.Click screen on the icon displays the list of constraints profile in AD RMS server configured.

below is another screenshot showing the details of restrictions. In this screenshot you can see the recipient of this e-mail are seeing this message can read, but can not forward, print or copy content.

In the next screenshot you can see at the bottom that the Forward option for the recipient will be dimmed.

Here is a screenshot of Android WorxMail where users limited forward and pressure take the e-mail messages

Disclaimer: strictly for demonstration purposes the environment that I have used is, make sure that you keep track of third licenses and copyrights when using a third product.

Previous
Next Post »
0 Komentar