Information Rights Management and Managed Code Extensions Overview

Microsoft Office Word and Microsoft Office Excel provide Information Rights Management (IRM), a feature that can help you prevent unauthorized people from viewing or altering sensitive information. For details about how Information Rights Management works, see Help in the specific Office application.

Applies to: The information in this topic applies to document-level projects for the following applications: Excel 2013 and Excel 2010; Word 2013 and Word 2010. For more information, see Features Available by Office Application and Project Type.

Running Code Behind Documents with Restricted Permissions

If your solution contains a document or workbook that uses IRM, by default, Word and Excel do not permit any code to run. If you are the author of the document or have Full Control access, you can change the default so that your solution works. For more information, see How to: Permit Code to Run Behind Documents with Restricted Permissions.

IRM prevents use of ServerDocument to retrieve or manipulate data that is cached in the document.

End Users Restricting Permissions to Documents That Use Managed Code Extensions

Anyone who has Full Control access to the document or workbook in your solution can use IRM to restrict permissions. For example, if an end user in the accounting department uses a solution that automatically populates a worksheet with data from a database, that user might want to allow Change access only to people in his or her department and Read access to others. When the user adds the restricted permissions, by default, the code behind the worksheet cannot run, and the worksheet will not be populated with data.

To fix the problem, someone with Full Control access to the document or workbook must change the default permission settings to allow programmatic access to the object model. For more information, see How to: Permit Code to Run Behind Documents with Restricted Permissions.

See Also

Concepts

Document Protection in Document-Level Solutions

Password Protection on Office Documents

Other Resources

Securing Office Solutions

Deploying an Office Solution

Designing and Creating Office Solutions