A requirements management plan template is designed to promote consistent analysis, documentation and management of the project requirements.
For more information about the requirements for user and group accounts for authorization, see Preparing users and groups for Azure Information Protection.
Client devices Users must Requirements management plan client devices computer or mobile device that run an operating system that supports Azure Information Protection. The following devices support the Azure Information Protection client, which lets users classify and label their documents and emails: Check whether the software vendor for the virtual desktop solution has additional configuration that might be required to run the Azure Information Protection client.
When the Azure Information Protection client protects the data by using the Azure Rights Management service, the data can be consumed by the same devices that support the Azure Rights Management service.
The Azure Information Protection client has additional prerequisites that are listed in the admin guide. Applications The Azure Information Protection client can label and protect documents and emails by using the Office applications Word, Excel, PowerPoint, and Outlook from any of the following Office editions: Office with Office apps minimum versionbuild For these editions, Azure Information Protection is supported for classification only.
Consequently, labels that apply protection do not display to users on the Azure Information Protection bar or from the Protect button on the Office ribbon.
The Azure Information Protection client does not support multiple versions of Office on the same computer. This client also does not support switching user accounts in Office.
For information about which Office editions support the protection service, see Applications that support Azure Rights Management data protection. Firewalls and network infrastructure If you have a firewall or similar intervening network devices that are configured to allow specific connections, the network connectivity requirements are included in the Office article, Office URLs and IP address ranges.
See the Microsoft Common and Office Online section. In addition to the information in the Office article, specific to Azure Information Protection: If you use a web proxy that requires authentication, you must configure it to use integrated Windows authentication with the user's Active Directory logon credentials.
Do not terminate the TLS client-to-service connection for example, to do packet-level inspection to the aadrm. Because of how Chrome displays secure connections in the address bar, you can use this browser to quickly check whether your client connection is terminated before it reaches the Azure Rights Management service.
Enter the following URL into the browser address bar: Instead, click the padlock in the address bar to view the site information.
The site information lets you see the issuing certification authority CA. If the certificate is not issued by a Microsoft CA, it is very likely your secure client-to-service connection is being terminated and needs reconfiguration on your firewall.
The following picture shows an example of a Microsoft issuing CA. If you see an internal CA issued the certificate, this configuration is not compatible with Azure Information Protection.
On-premises servers If you want to use the Azure Rights Management service from Azure Information Protection with on-premises servers, the following products are supported: Exchange Server SharePoint Server Windows Server file servers that support File Classification Infrastructure For information about the additional requirements for this scenario, see On-premises servers that support Azure Rights Management data protection.
If you deploy Azure Information Protection and then decide that you no longer want to use this cloud service, see Decommissioning and deactivating Azure Information Protection.The Requirements Management Plan is primarily used for communications, giving all stakeholders a view on how this process is managed for your project.
It completely answers the very common question. Requirements management is the process of documenting, analyzing, tracing, prioritizing and agreeing on requirements and then controlling change and communicating to relevant stakeholders.
It is a continuous process throughout a project. A requirement is a capability to which a project outcome (product or service) should conform. The RM plan is a component of the project management plan. Generally, the purpose of RM is to ensure customer and developer have a common understanding of what the requirements .
The requirements management plan will begin with an Introduction. The Introduction section of the plan defines why the plan is being used and why the requirements are important to manage.
The deliverable of Requirements Planning is a Requirements Management Plan that is reviewed and approved by the project sponsor and key stakeholders. The deliverable of Requirements Development is a common understanding of the requirements.
How to use a requirements management plan to develop a powerful scope statement. The four parts - Identification, Analysis, Prioritization, and Control.