Why User Defined Permissions (UDP) for content and Encrypt-Only Email Behave Differently Part 2

We discussed about Scenario 1 and Scenario 2 in part 1 of this blog. Here we are going to discuss on Scenario 3 where User A (Tenant A) applies a User‑Defined Permissions (UDP) label to a document Grants Owner permission to User X (Tenant B), User X forwards the document to User Y (Tenant C) without applying any labels from the Tenant

User Y cannot open the document, Why User Y cannot access the document ?

The document remains encrypted using Azure Rights Management (RMS) with a fixed access control list created by User A. When a document is encrypted, access is restricted so that it can be decrypted only by users authorized by the label’s encryption settings (Refer – Apply encryption using sensitivity labels | Microsoft Learn). User Y is not listed in the RMS policy as a result authorization fails.

Forwarding alone does not modify the embedded RMS policy, does not evaluate email recipients. Even though user X is an owner which allows him/her access, allows re-sharing, but does not allow implicit delegation of rights.

In Scenario 2 why it worked is User X applied Encrypt‑Only to the email and as a result Attachments inherited email encryption, RMS dynamically authorized email recipients. When an Office attachment inherits encryption from an email message, recipients are authorized based on the email’s protection policy

In Scenario 3, No email encryption from User X, no new RMS policy, no inheritance and original protection remains intact.

Azure RMS enforcement depends on Identity authentication, Authorization in the RMS policy not on whether the recipient uses or applies labels themselves. In Scenario 3, User Y is authenticated, but not authorized and that’s why access denied.

Key Principles behind all scenarios,

  • RMS evaluates access based on the encryption boundary, not the sharing method.
  • UDP document uses static authorization
  • Encrypt only email uses dynamic authorization
  • Forwarding will not explicitly give permission delegation
  • Scenario 3 behaves exactly like Scenario 1, not Scenario 2. The deciding factor is email encryption, not tenant, domain, or label usage. Without email‑level encryption, no new users are ever authorized unless given permission by original owner (User A)

Azure RMS / Microsoft Purview – Three Scenario Comparison

AspectScenario 1
Internal UDP Document
Scenario 2
External + Encrypt-Only Email
Scenario 3
External, No Email Label
Initial Protection Applied AtDocument level (UDP)Email level (Encrypt Only)Document level (UDP)
Encryption BoundaryFileMessageFile
RMS Policy Created WhenAt document protection timeAt email send timeAt document protection time
Policy TypeStatic ACL (explicit users only)Recipient-based dynamic policyStatic ACL (explicit users only)
Forwarding ImpactNo re-encryptionRe-encryption occursNo re-encryption
Attachment InheritanceNot applicableInherits email encryptionNot applicable
RMS Policy Regenerated on Forward?NoYesNo
Transitive Permission ExpansionNot supportedSupported (via email policy)Not supported
Cross-Tenant SupportIf explicitly listed in ACLAutomatic (if allowed by org policy)If explicitly listed in ACL
Authorization ModelIdentity must exist in embedded ACLIdentity must exist in email recipient listIdentity must exist in embedded ACL
Expected ResultAccess BlockedLimited Access GrantedAccess Blocked

ACL – Access Control List

If encryption stays at the document, authorization stays static. If encryption moves to the email, authorization becomes dynamic.

Hope the above helps in understanding this distinction which is essential when designing Microsoft Purview sensitivity label strategies, cross-tenant collaboration models, and secure sharing workflows.

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *