Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The Azure Rights Management tenant key is your organization's root key for the main encryption service for Microsoft Purview Information Protection. Other keys can be derived from this root key, including user keys, computer keys, or document encryption keys. Whenever the Azure Rights Management service uses these keys for your organization, they cryptographically chain to your tenant's root key for the Azure Rights Management service.
In addition to your tenant root key, your organization may require on-premises security for specific documents. On-premises key encryption is typically required only for a small amount of content, and therefore is configured together with a tenant root key.
Use the following sections to understand the options for your Azure Rights Management tenant key, and how to manage it.
If you're migrating across tenants, such as after a company merger, we recommend that you read our blog post on mergers and spin-offs for more information.
Key types for the service
The root key for your Azure Rights Management service can either be:
- Generated by Microsoft
- Generated by customers with Bring Your Own Key (BYOK)
If you have highly sensitive content that requires additional, on-premises protection, we recommend using Double Key Encryption (DKE).
Tenant root key generated by Microsoft
The default root key, automatically generated by Microsoft, is the default key used exclusively for the Azure Rights Management service to manage most aspects of your tenant key life cycle.
Continue using the default Microsoft key when you want to use the Azure Rights Management service quickly and without special hardware, software, or an Azure subscription. Examples include testing environments or organizations without regulatory requirements for key management.
For the default key, no configration steps are required.
Note
The default root key generated by Microsoft is the simplest option with the lowest administrative overheads.
In most cases, you may not even know that you have a tenant key, as you can configure encryption settings for Microsoft Purview Information Protection and the key management process is handled by Microsoft.
Bring Your Own Key (BYOK) option
BYOK uses keys that are created by customers, either in the Azure Key Vault or on-premises in the customer organization. These keys are then transferred to Azure Key Vault for further management.
Use BYOK when your organization has compliance regulations for key generation, including control over all life-cycle operations. For example, when your key must be protected by a hardware security module.
For more information, see Configure BYOK.
Double Key Encryption (DKE)
DKE provides additional security for your content by using two root keys that work together: one created and held by Microsoft in Azure, and another created and held on-premises by the customer.
DKE requires both keys to access encrypted content, which ensures that Microsoft and other third parties never have access to encrypted data on their own.
DKE can be deployed either in the cloud or on-premises, providing full flexibility for storage locations.
For more information, see Double key encryption.
Operations for your tenant key
Depending on your Azure Rights Management service key type, you have different levels of control and responsibility for your Azure Rights Management tenant key.
Terminology for key management operations:
- When you use a tenant key that's generated by Microsoft, the key is Microsoft-managed.
- When you use a key in Azure Key Vault that you generated with BYOK, the key is customer-managed.
Use the following table to identify the management operations that you can do, depending on whether your Azure Rights Management tenant key is Microsoft-managed or customer-managed:
Life cycle operation | Microsoft-managed (default) | Customer-managed (BYOK) |
---|---|---|
Revoke your tenant key | ✕ (automatic) | ✓ |
Rekey your tenant key | ✓ | ✓ |
Backup and recover your tenant key | ✕ | ✓ |
Export your tenant key | ✓ | ✕ |
Respond to a breach | ✓ | ✓ |
For more information about each of these operations, use the relevant tab for your tenant key type.
However, if you want to create an Azure Rights Management tenant key by importing a trusted publishing ___domain (TPD) from Active Directory Rights Management Services, this import operation is part of the migration from AD RMS to Azure Information Protection. As part of the design, an AD RMS TPD can only be imported to one tenant.
Revoke your tenant key
When you cancel the only or last subscription that includes the Azure Rights Management service, the service stops using your Azure Rights Management tenant key and no action is needed from you.
Rekey your tenant key
Rekeying is also known as rolling your key. When you do this operation, the Azure Rights Management service stops using the existing tenant key to encrypt items, and starts to use a different key. Policies and rights management templates are immediately resigned but this changeover is gradual for existing clients and services using the Azure Rights Management service. So for some time, some new content continues to be encrypted with the old Azure Rights Management tenant key.
To rekey, you must configure the Azure Rights Management tenant key object and specify the alternative key to use. Then, the previously used key is automatically marked as archived for the Azure Rights Management service. This configuration ensures that content that was encrypted by using this key remains accessible.
Examples of when you might need to rekey for the Azure Rights Management service:
You have migrated from Active Directory Rights Management Services (AD RMS) with a cryptographic mode 1 key. When the migration is complete, you want to change to using a key that uses cryptographic mode 2.
Your company has split into two or more companies. When you rekey your Azure Rights Management tenant key, the new company won't have access to new content that your employees encrypt. They can access the old content if they have a copy of the old Azure Rights Management tenant key.
You want to move from one key management topology to another.
You believe the master copy of your Azure Rights Management tenant key is compromised.
To rekey, you can select a different Microsoft-managed key to become your Azure Rights Management tenant key, but you can't create a new Microsoft-managed key. To create a new key, you must change your key topology to be customer-managed (BYOK).
You have more than one Microsoft-managed key if you migrated from Active Directory Rights Management Services (AD RMS) and chose the Microsoft-managed key topology for the Azure Rights Management service. In this scenario, you have at least two Microsoft-managed keys for your tenant. One key, or more, is the key or keys that you imported from AD RMS. You'll also have the default key that was automatically created for your Azure Rights Management tenant.
To select a different key to be your active tenant key for the Azure Rights Management service, use the Set-AipServiceKeyProperties cmdlet from the AIPService module. To help you identify which key to use, use the Get-AipServiceKeys cmdlet. You can identify the default key that was automatically created for your Azure Rights Management tenant by running the following command:
(Get-AipServiceKeys) | Sort-Object CreationTime | Select-Object -First 1
To change your key topology to be customer-managed (BYOK), see Bring your own key for the Azure Rights Management service root key.
Backup and recover your tenant key
Microsoft is responsible for backing up your Azure Rights Management tenant key and no action is required from you.
Export your tenant key
You can export your Azure Rights Management service configuration and corresponding tenant key by following the instructions in the following three steps:
Step 1: Initiate export
- Contact Microsoft Support to open an Microsoft Purview Information Protection support case with a request for an Azure Rights Management key export. You must prove you're a global administrator for your tenant, and understand that this process takes several days to confirm. Standard support charges apply; exporting your tenant key is not a free-of-charge support service.
Step 2: Wait for verification
- Microsoft verifies that your request to release your Azure Rights Management tenant key is legitimate. This process can take up to three weeks.
Step 3: Receive key instructions from CSS
Microsoft Customer Support Services sends you your Azure Rights Management service configuration and tenant key encrypted in a password-protected file. This file has a .tpd file name extension. To do this, a Microsoft support engineer first sends you (as the person who initiated the export) a tool by email. You must run the tool from a command prompt as follows:
AadrmTpd.exe -createkey
This generates an RSA key pair and saves the public and private halves as files in the current folder. For example: PublicKey-FA29D0FE-5049-4C8E-931B-96C6152B0441.txt and PrivateKey-FA29D0FE-5049-4C8E-931B-96C6152B0441.txt.
Respond to the email from the support engineer, attaching the file that has a name that starts with PublicKey. Microsoft Support next sends you a TPD file as an .xml file that is encrypted with your RSA key. Copy this file to the same folder as you ran the AadrmTpd tool originally, and run the tool again, using your file that starts with PrivateKey and the file from Microsoft Support. For example:
AadrmTpd.exe -key PrivateKey-FA29D0FE-5049-4C8E-931B-96C6152B0441.txt -target TPD-77172C7B-8E21-48B7-9854-7A4CEAC474D0.xml
The output of this command should be two files: One contains the plain text password for the password-protected TPD, and the other is the password-protected TPD itself. The files have a new GUID, for example:
Password-5E4C2018-8C8C-4548-8705-E3218AA1544E.txt
ExportedTPD-5E4C2018-8C8C-4548-8705-E3218AA1544E.xml
Back up these files and store them safely to ensure that you can continue to decrypt content that is encrypted with this tenant key. In addition, if you're migrating to AD RMS, you can import this TPD file (the file that starts with ExportedTDP) to your AD RMS server.
Step 4: Ongoing: Protect your tenant key
After you receive your tenant key, keep it well-guarded, because if somebody gets access to it, they can decrypt all items that are encrypted by using that key.
If the reason to export your tenant key is because you no longer want to use the Azure Rights Management service, as a best practice, now deactivate the Azure Rights Management service in your tenant. Don'tdelay doing this after you receive your tenant key because this precaution helps to minimize the consequences if your tenant key is accessed by somebody who shouldn't have it. For instructions, see Decommission and deactivate the Azure Rights Management service.
Respond to a breach
No security system, no matter how strong, is complete without a breach response process. Your Azure Rights Management tenant key might be compromised or stolen. Even when it’s protected well, vulnerabilities might be found in current generation key technology or in current key lengths and algorithms.
Microsoft has a dedicated team to respond to security incidents in its products and services. As soon as there's credible report of an incident, this team engages to investigate the scope, root cause, and mitigations. If this incident affects your assets, Microsoft will notify the global administrators for your tenant by email.
If you have a breach, the best action that you or Microsoft can take depends on the scope of the breach; Microsoft works with you through this process. The following table shows some typical situations and the likely response, although the exact response depends on all the information that is revealed during the investigation.
Incident description | Likely response |
---|---|
Your Azure Rights Management tenant key is leaked. | Rekey your tenant key. See the Rekey your tenant key section in this article. |
An unauthorized individual or malware got rights to use your Azure Rights Management tenant key but the key itself didn't leak. | Rekeying your tenant key doesn't help here and requires root-cause analysis. If a process or software bug was responsible for the unauthorized individual to get access, that situation must be resolved. |
Vulnerability discovered in the RSA algorithm, or key length, or brute-force attacks become computationally feasible. | Microsoft must update the Azure Rights Management service to support new algorithms and longer key lengths that are resilient, and instruct all customers to rekey their Azure Rights Management tenant key. |