12.07.2015 Views

IRM - EMC Community Network

IRM - EMC Community Network

IRM - EMC Community Network

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>IRM</strong> Server Extension APIThe API provides an events-based interface allowing software engineers to extend or override the <strong>IRM</strong> Server'spolicy-handling logic or enable authentication for users in unsupported authentication systems. For example, the<strong>IRM</strong> Services are applications that use the <strong>IRM</strong> Server Extension API.A Group Policy Server Extension is provided as an example with the <strong>IRM</strong> SDK kit. It uses the <strong>IRM</strong> ServerExtension API to provide extra granularity over the assignment of print and edit rights for users who are members ofmultiple user groups.<strong>IRM</strong> Client Integration APIThis API allows software engineers to build applications that use the <strong>IRM</strong> Server to protect content in differentformats, such as CAD. It supports GUI applications on Windows using the same dialogs as the <strong>IRM</strong> clients and alsosupports batch applications on Windows. The <strong>IRM</strong> SDK includes a sample <strong>IRM</strong>-enabled imaging application thatallows developers to learn more about the extensibility framework.The features of this API include:•Enables protection of additional file formats.•Provides a consistent user experience and feature set with <strong>EMC</strong> <strong>IRM</strong> clients.•Provides high-level calls for encryption and decryption.<strong>IRM</strong> Client Decryption APIThe <strong>IRM</strong> Client Decryption API allows programmers to develop applications that can programmatically decrypt<strong>IRM</strong> protected content. This is especially useful when protected content is stored in a repository, where full indexingis desired or required.The API enables decryption capabilities without interfering with compliance rules, enables eDiscovery (searchingencrypted content), allows full-text indexing of protected content, and supports integration with Content/InformationManagement applications.Additional InformationAn application developed using the Client Integration or Content Decryption API is considered to be an <strong>IRM</strong>enabledapplication. Each <strong>IRM</strong>-enabled application must be registered with an <strong>IRM</strong> Server. To do this, theapplication developer must generate an XML file that contains the application name, a certificate chain, types ofcontent, any custom permission, and any language support. Afterwards, the XML file must be registered with the<strong>IRM</strong> Server in order for <strong>IRM</strong> users to protect or decrypt content with the application.In addition, the <strong>IRM</strong> Server administrator can allow or prevent content protected by the <strong>IRM</strong> Server to be decryptedby a registered application. This setting resides in a document policy. If allowed, the information owner can alsoconfigure this setting.We recommend that you visit the <strong>EMC</strong> <strong>IRM</strong> community network at the following web site:https://community.emc.com/docs/DOC-3503This is a place where partners and customers can share information and helpful tips, collaborate on issues, downloadthe latest version of the <strong>IRM</strong> SDK, and more. It also has the newer <strong>IRM</strong>-enabled applications, developed bypartners, which protect content in formats such as Auto-CAD and Open Office.DatabaseThe <strong>IRM</strong> Server requires tablespace in a database. Depending on the OS platform where the <strong>IRM</strong> Server is installed,the database could be Oracle, MS SQL Server, or MS SQL Express. The database is used to store such informationas the various keys, some configuration settings, policies, and groups. A single tablespace can be used for multipleinstances of the <strong>IRM</strong> Server that are working together.AuthenticationCentral to any access control system is the ability to reliably determine the identity of the access requestor.Enterprises have invested heavily in establishing authentication infrastructures. In order for a new access controlproduct to be effective, it must integrate cleanly with and leverage the existing authentication infrastructure. The<strong>IRM</strong> Server has been designed to do just that. In addition to using shared secret, the <strong>IRM</strong> Server can easily beOverview of Technical Architecture Page 12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!