Azure Information Protection is being adopted by Azure customers as an add-on layer of authorization at the document level. Applications reading protected documents (eg MS Excel worksheets) need to be AIP-aware.
Current behavior from Spotfire: Spotfire may see the Excel document as encrypted or password protected, failing to open the document.
AIP is part of the Microsoft Information Protection (MIP) solution, and extends the labeling and classification functionality provided by Microsoft 365.
More information
What is Azure Information Protection (AIP)? | Microsoft Docs
Azure Information Protection also known as | Microsoft Docs
https://docs.microsoft.com/en-us/information-protection/develop/
We are looking for a way to track the exports from visualizations/Spotfire dxp. Current action types (https://docs.tibco.com/pub/spotfire_server/7.13.0/doc/html/TIB_sfire_server_tsas_admin_help/GUID-67B1DBFC-B1DB-49B1-A492-4B684FAADB72.html) don't appear to track if files (Excel, PDF, etc.) are exported by user or if data is copied from dxp.
Please consider implementing the logging of data export/copy actions
Our organization is implementing the AIP and would like for labels and permissions to be retained from the source to the Spotfire report if possible. At minimum we'd like to import AIP protected Excel files.