The IRM Client for Open Office is designed and certified for EMC Documentum. It is a client plug-in for OpenOffice.org Writer, Calc and Impress.
Once installed, it will protect the documents dynamically in different ways
1) Requires logon in order to read the document
2) Prevent screen capture
4) Prevent copy
5) Expiry when reading of X days or exact day
6) Access document offline
7) Create watermark
The protected document’s extension is remain intact and it can be opened by native applications.
Here is a quick look at the IRM product suite. IRM can be deployed either stand-alone, or integrated with yourDocumentum Content Server or eRoom installation. We offer client plug-ins for Microsoft Office, Open Office, Adobe Acrobat, Outlook and Lotus Notes email, RIM BlackBerry and html. {Note : “clients” are plug-ins and not a full separate client. Users still use the native business applications to view their content. }
- ECM Documentum IRM Server (Policy Server)
- Master Concept Documentum IRM Client for OpenOffice
- ECM Documentum IRM Client for Adobe Acrobat
- ECM Documentum IRM Client for Lotus Notes
- ECM Documentum IRM Client for RIM BlackBerry
- ECM Documentum IRM Client for E-mail
ECM Documentum IRM Services for Documentum - ECM Documentum IRM Client Bundle
(For Microsoft Office and Adobe Acrobat)
ECM Documentum IRM Services for eRoom - ECM Documentum IRM Client Bundle
(For Microsoft Office and Adobe Acrobat) ECM Documentum IRM SDK Products with embedded IRM - EMC Infoscape
- EMC Documentum Records Manager
IRM Server Key and Policy Management
At it’s simplest, here is how IRM works.
- When IRM is applied, the document is encrypted and the encryption key, along with the rights policy, is stored on the IRM Policy Server.
- The document may be shared with another user, or checked into a repository, such as a File Share, Documentum Content Server or eRoom.
- When a user tries to open the protected document, the IRM plug-in retrieves the policy and encryption key from the Policy Server and allows the user to open the document (assuming they have permission) with what ever privileges have been assigned.
- It’s important to note that content is never stored on the Policy Server, so keys and content are always stored separately, and local keys are always destroyed immediately after use. No encryption key is ever stored locally.
IRM Architecture
1. The IRM Server manages encryption, auditing, policy management etc.
2. Authentication can be handled externally through, say an LDAP integration with Directory Services or your existing Documentum or RSA infrastructure. This allows you to more quickly deploy IRM and reduce impact to administration.
3. And finally, we have our client layer. Documentum IRM works with numerous different types of business content, such as MS Office docs and PDFs, and is also integrated with a number of different Documentum products.
HKMCI IRM OOo Plugin - Datasheet
Contact Sales