Skip to content

Commit 1662c15

Browse files
Merge pull request #209432 from v-amallick/Aug-28-2022-MUA
MUA for Backup vault - Doc for pub-preview release
2 parents 831444e + a996895 commit 1662c15

15 files changed

+422
-87
lines changed

articles/backup/enable-multi-user-authorization-quickstart.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Follow these steps:
4747

4848
## Next steps
4949

50-
- [Protect against unauthorized (protected) operations](multi-user-authorization.md#protect-against-unauthorized-protected-operations)
50+
- [Protected operations using MUA](multi-user-authorization.md?pivots=vaults-recovery-services-vault#protected-operations-using-mua)
5151
- [Authorize critical (protected) operations using Azure AD Privileged Identity Management](multi-user-authorization.md#authorize-critical-protected-operations-using-azure-ad-privileged-identity-management)
5252
- [Performing a protected operation after approval](multi-user-authorization.md#performing-a-protected-operation-after-approval)
5353
- [Disable MUA on a Recovery Services vault](multi-user-authorization.md#disable-mua-on-a-recovery-services-vault)

articles/backup/index.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,8 +69,10 @@ landingContent:
6969
url: backup-azure-security-feature-cloud.md
7070
- text: Enhanced soft delete for Azure Backup (preview)
7171
url: backup-azure-enhanced-soft-delete-about.md
72-
- text: Multi-user authorization (MUA)
73-
url: multi-user-authorization.md
72+
- text: Multi-user authorization (MUA) for Recovery Services vault
73+
url: ./multi-user-authorization-concept.md?tabs=recovery-services-vault
74+
- text: Multi-user authorization (MUA) for Backup vault
75+
url: ./multi-user-authorization-concept.md?tabs=backup-vault
7476
- text: Immutable vault (preview)
7577
url: backup-azure-immutable-vault-concept.md
7678
# Card
109 KB
Loading
Loading
218 KB
Loading
218 KB
Loading
161 KB
Loading
128 KB
Loading

articles/backup/multi-user-authorization-concept.md

Lines changed: 46 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -2,82 +2,99 @@
22
title: Multi-user authorization using Resource Guard
33
description: An overview of Multi-user authorization using Resource Guard.
44
ms.topic: conceptual
5-
ms.date: 06/08/2022
5+
ms.date: 09/15/2022
66
author: v-amallick
77
ms.service: backup
88
ms.author: v-amallick
99
---
1010
# Multi-user authorization using Resource Guard
1111

12-
Multi-user authorization (MUA) for Azure Backup allows you to add an additional layer of protection to critical operations on your Recovery Services vaults. For MUA, Azure Backup uses another Azure resource called the Resource Guard to ensure critical operations are performed only with applicable authorization.
12+
Multi-user authorization (MUA) for Azure Backup allows you to add an additional layer of protection to critical operations on your Recovery Services vaults and Backup vaults. For MUA, Azure Backup uses another Azure resource called the Resource Guard to ensure critical operations are performed only with applicable authorization.
13+
14+
>[!Note]
15+
>Multi-user authorization using Resource Guard for Backup vault is in preview.
1316
1417
## How does MUA for Backup work?
1518

16-
Azure Backup uses the Resource Guard as an authorization service for a Recovery Services vault. Therefore, to perform a critical operation (described below) successfully, you must have sufficient permissions on the associated Resource Guard as well.
19+
Azure Backup uses the Resource Guard as an additional authorization mechanism for a Recovery Services vault or a Backup vault. Therefore, to perform a critical operation (described below) successfully, you must have sufficient permissions on the associated Resource Guard as well.
1720

1821
> [!Important]
19-
> To function as intended, the Resource Guard must be owned by a different user, and the vault admin must not have Contributor permissions. You can place Resource Guard in a subscription or tenant different from the one containing the Recovery Services vault to provide better protection.
22+
> To function as intended, the Resource Guard must be owned by a different user, and the vault admin must not have Contributor permissions. You can place Resource Guard in a subscription or tenant different from the one containing the vaults to provide better protection.
2023
2124
## Critical operations
2225

23-
The following table lists the operations defined as critical operations and can be protected by a Resource Guard. You can choose to exclude certain operations from being protected using the Resource Guard when associating vaults with it. Note that operations denoted as Mandatory cannot be excluded from being protected using the Resource Guard for vaults associated with it. Also, the excluded critical operations would apply to all vaults associated with a Resource Guard.
26+
The following table lists the operations defined as critical operations and can be protected by a Resource Guard. You can choose to exclude certain operations from being protected using the Resource Guard when associating vaults with it.
27+
28+
>[!Note]
29+
>You can't excluded the operations denoted as Mandatory from being protected using the Resource Guard for vaults associated with it. Also, the excluded critical operations would apply to all vaults associated with a Resource Guard.
30+
31+
**Choose a vault**
32+
33+
# [Recovery Services vault](#tab/recovery-services-vault)
2434

25-
**Operation** | **Mandatory/Optional**
35+
**Operation** | **Mandatory/ Optional**
2636
--- | ---
2737
Disable soft delete | Mandatory
2838
Disable MUA protection | Mandatory
29-
Modify backup policy (reduced retention) | Optional: Can be excluded
30-
Modify protection (reduced retention) | Optional: Can be excluded
31-
Stop protection with delete data | Optional: Can be excluded
32-
Change MARS security PIN | Optional: Can be excluded
39+
Modify backup policy (reduced retention) | Optional
40+
Modify protection (reduced retention) | Optional
41+
Stop protection with delete data | Optional
42+
Change MARS security PIN | Optional
43+
44+
# [Backup vault (preview)](#tab/backup-vault)
45+
46+
**Operation** | **Mandatory/ Optional**
47+
--- | ---
48+
Disable MUA protection | Mandatory
49+
Delete backup instance | Optional
50+
51+
---
3352

3453
### Concepts and process
35-
The concepts and the processes involved when using MUA for Backup are explained below.
54+
55+
The concepts and the processes involved when using MUA for Azure Backup are explained below.
3656

3757
Let’s consider the following two users for a clear understanding of the process and responsibilities. These two roles are referenced throughout this article.
3858

39-
**Backup admin**: Owner of the Recovery Services vault and performs management operations on the vault. To begin with, the Backup admin must not have any permissions on the Resource Guard.
59+
**Backup admin**: Owner of the Recovery Services vault or the Backup vault who performs management operations on the vault. To begin with, the Backup admin must not have any permissions on the Resource Guard.
4060

4161
**Security admin**: Owner of the Resource Guard and serves as the gatekeeper of critical operations on the vault. Hence, the Security admin controls permissions that the Backup admin needs to perform critical operations on the vault.
4262

4363
Following is a diagrammatic representation for performing a critical operation on a vault that has MUA configured using a Resource Guard.
4464

45-
:::image type="content" source="./media/multi-user-authorization/configure-mua-using-resource-card-diagram.png" alt-text="Diagrammatic representation on configuring M U A using a Resource Guard.":::
65+
:::image type="content" source="./media/multi-user-authorization/configure-multi-user-authorization-using-resource-guard-diagram.png" alt-text="Diagrammatic representation on configuring MUA using a Resource Guard.":::
4666

47-
Here is the flow of events in a typical scenario:
67+
Here's the flow of events in a typical scenario:
4868

49-
1. The Backup admin creates the Recovery Services vault.
50-
1. The Security admin creates the Resource Guard. The Resource Guard can be in a different subscription or a different tenant with respect to the Recovery Services vault. It must be ensured that the Backup admin does not have Contributor permissions on the Resource Guard.
69+
1. The Backup admin creates the Recovery Services vault or the Backup vault.
70+
1. The Security admin creates the Resource Guard. The Resource Guard can be in a different subscription or a different tenant with respect to the vault. It must be ensured that the Backup admin doesn't have Contributor permissions on the Resource Guard.
5171
1. The Security admin grants the **Reader** role to the Backup Admin for the Resource Guard (or a relevant scope). The Backup admin requires the reader role to enable MUA on the vault.
52-
1. The Backup admin now configures the Recovery Services vault to be protected by MUA via the Resource Guard.
72+
1. The Backup admin now configures the vault to be protected by MUA via the Resource Guard.
5373
1. Now, if the Backup admin wants to perform a critical operation on the vault, they need to request access to the Resource Guard. The Backup admin can contact the Security admin for details on gaining access to perform such operations. They can do this using Privileged Identity Management (PIM) or other processes as mandated by the organization.
5474
1. The Security admin temporarily grants the **Contributor** role on the Resource Guard to the Backup admin to perform critical operations.
5575
1. Now, the Backup admin initiates the critical operation.
5676
1. The Azure Resource Manager checks if the Backup admin has sufficient permissions or not. Since the Backup admin now has Contributor role on the Resource Guard, the request is completed.
57-
- If the Backup admin did not have the required permissions/roles, the request would have failed.
77+
78+
If the Backup admin didn't have the required permissions/roles, the request would have failed.
79+
5880
1. The security admin ensures that the privileges to perform critical operations are revoked after authorized actions are performed or after a defined duration. Using JIT tools [Azure Active Directory Privileged Identity Management](../active-directory/privileged-identity-management/pim-configure.md) may be useful in ensuring this.
5981

6082
>[!NOTE]
61-
>- MUA provides protection on the above listed operations performed on the Recovery Services vaults only. Any operations performed directly on the data source (i.e., the Azure resource/workload that is protected) are beyond the scope of the Resource Guard.
62-
>- This feature is currently available via the Azure portal only.
63-
>- This feature is currently supported for Recovery Services vaults only and not available for Backup vaults.
83+
>MUA provides protection on the above listed operations performed on the vaulted backups only. Any operations performed directly on the data source (that is, the Azure resource/workload that is protected) are beyond the scope of the Resource Guard.
6484
6585
## Usage scenarios
6686

67-
The following table depicts scenarios for creating your Resource Guard and Recovery Services vault (RS vault), along with the relative protection offered by each.
87+
The following table lists the scenarios for creating your Resource Guard and vaults (Recovery Services vault and Backup vault), along with the relative protection offered by each.
6888

6989
>[!Important]
7090
> The Backup admin must not have Contributor permissions to the Resource Guard in any scenario.
7191
7292
**Usage scenario** | **Protection due to MUA** | **Ease of implementation** | **Notes**
7393
--- | --- |--- |--- |
74-
RS vault and Resource Guard are **in the same subscription.** </br> The Backup admin does not have access to the Resource Guard. | Least isolation between the Backup admin and the Security admin. | Relatively easy to implement since only one subscription is required. | Resource level permissions/ roles need to be ensured are correctly assigned.
75-
RS vault and Resource Guard are **in different subscriptions but the same tenant.** </br> The Backup admin does not have access to the Resource Guard or the corresponding subscription. | Medium isolation between the Backup admin and the Security admin. | Relatively medium ease of implementation since two subscriptions (but a single tenant) are required. | Ensure that that permissions/ roles are correctly assigned for the resource or the subscription.
76-
RS vault and Resource Guard are **in different tenants.** </br> The Backup admin does not have access to the Resource Guard, the corresponding subscription, or the corresponding tenant.| Maximum isolation between the Backup admin and the Security admin, hence, maximum security. | Relatively difficult to test since requires two tenants or directories to test. | Ensure that permissions/ roles are correctly assigned for the resource, the subscription or the directory.
77-
78-
>[!NOTE]
79-
> For this article, we will demonstrate creation of the Resource Guard in a different tenant that offers maximum protection. In terms of requesting and approving requests for performing critical operations, this article demonstrates the same using [Azure Active Directory Privileged Identity Management](../active-directory/privileged-identity-management/pim-configure.md) in the tenant housing the Resource Guard. You can optionally use other mechanisms to manage JIT permissions on the Resource Guard as per your setup.
94+
Vault and Resource Guard are **in the same subscription.** </br> The Backup admin does't have access to the Resource Guard. | Least isolation between the Backup admin and the Security admin. | Relatively easy to implement since only one subscription is required. | Resource level permissions/ roles need to be ensured are correctly assigned.
95+
Vault and Resource Guard are **in different subscriptions but the same tenant.** </br> The Backup admin doesn't have access to the Resource Guard or the corresponding subscription. | Medium isolation between the Backup admin and the Security admin. | Relatively medium ease of implementation since two subscriptions (but a single tenant) are required. | Ensure that that permissions/ roles are correctly assigned for the resource or the subscription.
96+
Vault and Resource Guard are **in different tenants.** </br> The Backup admin doesn't have access to the Resource Guard, the corresponding subscription, or the corresponding tenant.| Maximum isolation between the Backup admin and the Security admin, hence, maximum security. | Relatively difficult to test since requires two tenants or directories to test. | Ensure that permissions/ roles are correctly assigned for the resource, the subscription or the directory.
8097

8198
## Next steps
8299

83-
[Configure Multi-user authorization using Resource Guard](multi-user-authorization.md)
100+
[Configure Multi-user authorization using Resource Guard](multi-user-authorization.md).

0 commit comments

Comments
 (0)