This section provides a series of examples illustrating the use of the RMS protocols. The examples are:
Protecting content using offline publishing.
Protecting content using online publishing.
Consuming protected content.
Each example is described in detail in the following sections as a set of conceptual actions interchanged between the system and participants. These actions correspond to the interfaces described in section 188.8.131.52.
Each example, where applicable, assumes the client is well-informed of the appropriate SCP, obtained by using service location discovery, a directory service, or pre-existing local configuration data.