Skip to content

Commit 4b65870

Browse files
Merge pull request #217385 from v-amallick/Nov-7-2022-IV
MUA RSV updates
2 parents 785095e + fc5a791 commit 4b65870

File tree

1 file changed

+99
-5
lines changed

1 file changed

+99
-5
lines changed

articles/backup/multi-user-authorization.md

Lines changed: 99 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Configure Multi-user authorization using Resource Guard
33
description: This article explains how to configure Multi-user authorization using Resource Guard.
44
ms.topic: how-to
55
zone_pivot_groups: backup-vaults-recovery-services-vault-backup-vault
6-
ms.date: 09/15/2022
6+
ms.date: 11/08/2022
77
author: v-amallick
88
ms.service: backup
99
ms.author: v-amallick
@@ -45,7 +45,12 @@ Learn about various [MUA usage scenarios](./multi-user-authorization-concept.md?
4545

4646
The **Security admin** creates the Resource Guard. We recommend that you create it in a **different subscription** or a **different tenant** as the vault. However, it should be in the **same region** as the vault. The Backup admin must **NOT** have *contributor* access on the Resource Guard or the subscription that contains it.
4747

48-
For the following example, create the Resource Guard in a tenant different from the vault tenant.
48+
**Choose a client**
49+
50+
# [Azure portal](#tab/azure-portal)
51+
52+
To create the Resource Guard in a tenant different from the vault tenant, follow these steps:
53+
4954
1. In the Azure portal, go to the directory under which you want to create the Resource Guard.
5055

5156
:::image type="content" source="./media/multi-user-authorization/portal-settings-directories-subscriptions.png" alt-text="Screenshot showing the portal settings.":::
@@ -68,9 +73,25 @@ For the following example, create the Resource Guard in a tenant different from
6873

6974
Follow notifications for status and successful creation of the Resource Guard.
7075

76+
# [PowerShell](#tab/powershell)
77+
78+
Use the following command to create a resource guard:
79+
80+
```azurepowershell-interactive
81+
New-AzDataProtectionResourceGuard -Location “Location” -Name “ResourceGuardName” -ResourceGroupName “rgName”
82+
```
83+
84+
---
85+
7186
### Select operations to protect using Resource Guard
7287

73-
Choose the operations you want to protect using the Resource Guard out of all supported critical operations. By default, all supported critical operations are enabled. However, you can exempt certain operations from falling under the purview of MUA using Resource Guard. The security admin can perform the following steps:
88+
Choose the operations you want to protect using the Resource Guard out of all supported critical operations. By default, all supported critical operations are enabled. However, you (as the security admin) can exempt certain operations from falling under the purview of MUA using Resource Guard.
89+
90+
**Choose a client**
91+
92+
# [Azure portal](#tab/azure-portal)
93+
94+
To exempt operations, follow these steps:
7495

7596
1. In the Resource Guard created above, go to **Properties**.
7697
2. Select **Disable** for operations that you want to exclude from being authorized using the Resource Guard.
@@ -82,6 +103,27 @@ Choose the operations you want to protect using the Resource Guard out of all su
82103

83104
:::image type="content" source="./media/multi-user-authorization/demo-resource-guard-properties.png" alt-text="Screenshot showing demo resource guard properties.":::
84105

106+
# [PowerShell](#tab/powershell)
107+
108+
Use the following commands to update the operations. These exclude operations from protection by the resource guard.
109+
110+
```azurepowershell-interactive
111+
$resourceGuard = Get-AzDataProtectionResourceGuard -SubscriptionId "xxxxxxxx-xxxx-xxxx-xxxxxxxxxxxx" -ResourceGroupName "rgName" -Name "resGuardName"
112+
$criticalOperations = $resourceGuard.ResourceGuardOperation.VaultCriticalOperation
113+
$operationsToBeExcluded = $criticalOperations | Where-Object { $_ -match "backupSecurityPIN/action" -or $_ -match "backupInstances/delete" }
114+
115+
116+
Update-AzDataProtectionResourceGuard -SubscriptionId "xxxxxxxx-xxxx-xxxx-xxxxxxxxxxxx" -ResourceGroupName "rgName" -Name $resourceGuard.Name -CriticalOperationExclusionList $operationsToBeExcluded
117+
```
118+
119+
- The first command fetches the resource guard that needs to be updated.
120+
- The second and third commands fetch the critical operations that you want to update.
121+
- The fourth command excludes some critical operations from the resource guard.
122+
123+
---
124+
125+
126+
85127
## Assign permissions to the Backup admin on the Resource Guard to enable MUA
86128

87129
To enable MUA on a vault, the admin of the vault must have **Reader** role on the Resource Guard or subscription containing the Resource Guard. To assign the **Reader** role on the Resource Guard:
@@ -102,7 +144,13 @@ To enable MUA on a vault, the admin of the vault must have **Reader** role on th
102144

103145
## Enable MUA on a Recovery Services vault
104146

105-
Now that the Backup admin has the Reader role on the Resource Guard, they can easily enable multi-user authorization on vaults managed by them. The following steps are performed by the **Backup admin**.
147+
After the Reader role assignment on the Resource Guard is complete, enable multi-user authorization on vaults (as the **Backup admin**) that you manage.
148+
149+
**Choose a client**
150+
151+
# [Azure portal](#tab/azure-portal)
152+
153+
To enable MUA on the vaults, follow these steps.
106154

107155
1. Go to the Recovery Services vault. Go to **Properties** on the left navigation panel, then to **Multi-User Authorization** and click **Update**.
108156

@@ -127,6 +175,24 @@ Now that the Backup admin has the Reader role on the Resource Guard, they can ea
127175

128176
:::image type="content" source="./media/multi-user-authorization/testvault1-enable-mua.png" alt-text="Screenshot showing how to enable Multi-user authentication.":::
129177

178+
# [PowerShell](#tab/powershell)
179+
180+
Use the following command to enable MUA on a Recovery Services vault:
181+
182+
```azurepowershell-interactive
183+
$token = (Get-AzAccessToken -TenantId "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx").Token
184+
Set-AzRecoveryServicesResourceGuardMapping -VaultId “VaultArmId” -ResourceGuardId "ResourceGuardArmId" -Token $token
185+
```
186+
187+
- The first command fetches the access token for the resource guard tenant where the resource guard is present.
188+
- The second command creates a mapping between the RSVault $vault and Resource guard.
189+
190+
>[!NOTE]
191+
>The token parameter is optional and is only needed to authenticate cross tenant protected operations.
192+
193+
---
194+
195+
130196
## Protected operations using MUA
131197

132198
Once you have enabled MUA, the operations in scope will be restricted on the vault, if the Backup admin tries to perform them without having the required role (that is, Contributor role) on the Resource Guard.
@@ -232,7 +298,14 @@ The following screenshot shows an example of disabling soft delete for an MUA-en
232298

233299
## Disable MUA on a Recovery Services vault
234300

235-
Disabling MUA is a protected operation, and hence, is protected using MUA. This means that the Backup admin must have the required Contributor role in the Resource Guard. Details on obtaining this role are described here. Following is a summary of steps to disable MUA on a vault.
301+
Disabling MUA is a protected operation, so, so, vaults are protected using MUA. If you (the Backup admin) want to disable MUA, you must have the required Contributor role in the Resource Guard.
302+
303+
**Choose a client**
304+
305+
# [Azure portal](#tab/azure-portal)
306+
307+
To disable MUA on a vault, follow these steps:
308+
236309
1. The Backup admin requests the Security admin for **Contributor** role on the Resource Guard. They can request this to use the methods approved by the organization such as JIT procedures, like [Azure AD Privileged Identity Management](../active-directory/privileged-identity-management/pim-configure.md), or other internal tools and procedures.
237310
1. The Security admin approves the request (if they find it worthy of being approved) and informs the Backup admin. Now the Backup admin has the ‘Contributor’ role on the Resource Guard.
238311
1. The Backup admin goes to the vault > **Properties** > **Multi-user Authorization**.
@@ -243,6 +316,27 @@ Disabling MUA is a protected operation, and hence, is protected using MUA. This
243316

244317
:::image type="content" source="./media/multi-user-authorization/disable-mua.png" alt-text="Screenshot showing to disable multi-user authentication.":::
245318

319+
# [PowerShell](#tab/powershell)
320+
321+
Use the following command to disable MUA on a Recovery Services vault:
322+
323+
```azurepowershell-interactive
324+
$token = (Get-AzAccessToken -TenantId "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx").Token
325+
Remove-AzRecoveryServicesResourceGuardMapping -VaultId “VaultArmId” -Token $token
326+
```
327+
328+
- The first command fetches the access token for the resource guard tenant, where the resource guard is present.
329+
- The second command deletes the mapping between the Recovery Services vault and the resource guard.
330+
331+
>[!NOTE]
332+
>The token parameter is optional and is only needed to authenticate the cross tenant protected operations.
333+
334+
---
335+
336+
337+
338+
339+
246340
::: zone-end
247341

248342

0 commit comments

Comments
 (0)