MIP Step 3: Creating an MIP credential profile for agents and on-premises detection servers
search cancel

MIP Step 3: Creating an MIP credential profile for agents and on-premises detection servers

book

Article ID: 276044

calendar_today

Updated On:

Products

Data Loss Prevention Data Loss Prevention API Detection for Developer Apps Virtual Appliance Data Loss Prevention API Detection Virtual Appliance Data Loss Prevention Cloud Detection Service Data Loss Prevention Cloud Detection Service for ICAP Data Loss Prevention Cloud Detection Service for REST Data Loss Prevention Cloud Package Data Loss Prevention Cloud Prevent for Microsoft Office 365 Data Loss Prevention Cloud Service for Discovery/Connector Data Loss Prevention Cloud Service for Email Data Loss Prevention Cloud Storage Data Loss Prevention Core Package Data Loss Prevention Data Access Governance Data Loss Prevention Discover Suite Data Loss Prevention Endpoint Discover Data Loss Prevention Endpoint Prevent Data Loss Prevention Endpoint Suite Data Loss Prevention Enforce Data Loss Prevention Enterprise Suite Data Loss Prevention for Mobile Data Loss Prevention for Office 365 Email and Gmail with Email Safeguard Data Loss Prevention Form Recognition Data Loss Prevention Network Discover Data Loss Prevention Network Email Data Loss Prevention Network Monitor Data Loss Prevention Network Monitor and Prevent for Email Data Loss Prevention Network Monitor and Prevent for Email and Web Data Loss Prevention Network Monitor and Prevent for Web Data Loss Prevention Network Prevent for Email Data Loss Prevention Network Prevent for Email Virtual Appliance Data Loss Prevention Network Prevent for Web Virtual Appliance Data Loss Prevention Network Protect Data Loss Prevention Network Web Data Loss Prevention Oracle Standard Edition 2 Data Loss Prevention Plus Suite Data Loss Prevention Sensitive Image Recognition

Issue/Introduction

On the System > Settings > MIP Credential Profiles page of the Enforce Server administration console, you can configure two types of MIP credential profiles for agents and on-premises detection servers:

  1. An MIP classification credential profile – Used by the Enforce Server and DLP Agents to synchronize classification labels with the MIP service. You can configure only one MIP classification credential profile at a time.
  2. MIP decryption credential profiles – Used by detection servers to inspect documents and emails that have been encrypted by MIP. You can configure multiple MIP decryption credential profiles.

Resolution

In the Enforce Server administration console

Navigate to System > Settings > MIP Credential Profiles

Adding the Microsoft Information Protection Classification Credential Profile:

  1. Under “Microsoft Information Protection Classification Credential Profile” select “Add Profile”
  2. In the dialog box, type a name for the profile in the Profile Name field.
  3. Fill the Tenant ID, Application ID, and Application Secret (client secret) fields using the information that you copied when you registered an application on the Azure portal.
  4. Credentials are verified on save

Adding the Microsoft Information Protection Decryption Credential Profile:

  1. Under “Microsoft Information Protection Decryption Credential Profile” select “Add Profile” 
  2. In the dialog box, type a name for the profile in the Profile Name field.
  3. Fill the Tenant ID, Application ID, and Application Secret (client secret) fields using the information that you copied when you registered an application on the Azure portal.
  4. Credentials are verified on save

Additional Information