You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -45,7 +45,12 @@ Learn about various [MUA usage scenarios](./multi-user-authorization-concept.md?
45
45
46
46
The **Security admin** creates the Resource Guard. We recommend that you create it in a **different subscription** or a **different tenant** as the vault. However, it should be in the **same region** as the vault. The Backup admin must **NOT** have *contributor* access on the Resource Guard or the subscription that contains it.
47
47
48
-
For the following example, create the Resource Guard in a tenant different from the vault tenant.
48
+
**Choose a client**
49
+
50
+
# [Azure portal](#tab/azure-portal)
51
+
52
+
To create the Resource Guard in a tenant different from the vault tenant, follow these steps:
53
+
49
54
1. In the Azure portal, go to the directory under which you want to create the Resource Guard.
50
55
51
56
:::image type="content" source="./media/multi-user-authorization/portal-settings-directories-subscriptions.png" alt-text="Screenshot showing the portal settings.":::
@@ -68,9 +73,25 @@ For the following example, create the Resource Guard in a tenant different from
68
73
69
74
Follow notifications for status and successful creation of the Resource Guard.
70
75
76
+
# [PowerShell](#tab/powershell)
77
+
78
+
Use the following command to create a resource guard:
### Select operations to protect using Resource Guard
72
87
73
-
Choose the operations you want to protect using the Resource Guard out of all supported critical operations. By default, all supported critical operations are enabled. However, you can exempt certain operations from falling under the purview of MUA using Resource Guard. The security admin can perform the following steps:
88
+
Choose the operations you want to protect using the Resource Guard out of all supported critical operations. By default, all supported critical operations are enabled. However, you (as the security admin) can exempt certain operations from falling under the purview of MUA using Resource Guard.
89
+
90
+
**Choose a client**
91
+
92
+
# [Azure portal](#tab/azure-portal)
93
+
94
+
To exempt operations, follow these steps:
74
95
75
96
1. In the Resource Guard created above, go to **Properties**.
76
97
2. Select **Disable** for operations that you want to exclude from being authorized using the Resource Guard.
@@ -82,6 +103,27 @@ Choose the operations you want to protect using the Resource Guard out of all su
- The first command fetches the resource guard that needs to be updated.
120
+
- The second and third commands fetch the critical operations that you want to update.
121
+
- The fourth command excludes some critical operations from the resource guard.
122
+
123
+
---
124
+
125
+
126
+
85
127
## Assign permissions to the Backup admin on the Resource Guard to enable MUA
86
128
87
129
To enable MUA on a vault, the admin of the vault must have **Reader** role on the Resource Guard or subscription containing the Resource Guard. To assign the **Reader** role on the Resource Guard:
@@ -102,7 +144,13 @@ To enable MUA on a vault, the admin of the vault must have **Reader** role on th
102
144
103
145
## Enable MUA on a Recovery Services vault
104
146
105
-
Now that the Backup admin has the Reader role on the Resource Guard, they can easily enable multi-user authorization on vaults managed by them. The following steps are performed by the **Backup admin**.
147
+
After the Reader role assignment on the Resource Guard is complete, enable multi-user authorization on vaults (as the **Backup admin**) that you manage.
148
+
149
+
**Choose a client**
150
+
151
+
# [Azure portal](#tab/azure-portal)
152
+
153
+
To enable MUA on the vaults, follow these steps.
106
154
107
155
1. Go to the Recovery Services vault. Go to **Properties** on the left navigation panel, then to **Multi-User Authorization** and click **Update**.
108
156
@@ -127,6 +175,24 @@ Now that the Backup admin has the Reader role on the Resource Guard, they can ea
127
175
128
176
:::image type="content" source="./media/multi-user-authorization/testvault1-enable-mua.png" alt-text="Screenshot showing how to enable Multi-user authentication.":::
129
177
178
+
# [PowerShell](#tab/powershell)
179
+
180
+
Use the following command to enable MUA on a Recovery Services vault:
- The first command fetches the access token for the resource guard tenant where the resource guard is present.
188
+
- The second command creates a mapping between the RSVault $vault and Resource guard.
189
+
190
+
>[!NOTE]
191
+
>The token parameter is optional and is only needed to authenticate cross tenant protected operations.
192
+
193
+
---
194
+
195
+
130
196
## Protected operations using MUA
131
197
132
198
Once you have enabled MUA, the operations in scope will be restricted on the vault, if the Backup admin tries to perform them without having the required role (that is, Contributor role) on the Resource Guard.
@@ -232,7 +298,14 @@ The following screenshot shows an example of disabling soft delete for an MUA-en
232
298
233
299
## Disable MUA on a Recovery Services vault
234
300
235
-
Disabling MUA is a protected operation, and hence, is protected using MUA. This means that the Backup admin must have the required Contributor role in the Resource Guard. Details on obtaining this role are described here. Following is a summary of steps to disable MUA on a vault.
301
+
Disabling MUA is a protected operation, so, so, vaults are protected using MUA. If you (the Backup admin) want to disable MUA, you must have the required Contributor role in the Resource Guard.
302
+
303
+
**Choose a client**
304
+
305
+
# [Azure portal](#tab/azure-portal)
306
+
307
+
To disable MUA on a vault, follow these steps:
308
+
236
309
1. The Backup admin requests the Security admin for **Contributor** role on the Resource Guard. They can request this to use the methods approved by the organization such as JIT procedures, like [Azure AD Privileged Identity Management](../active-directory/privileged-identity-management/pim-configure.md), or other internal tools and procedures.
237
310
1. The Security admin approves the request (if they find it worthy of being approved) and informs the Backup admin. Now the Backup admin has the ‘Contributor’ role on the Resource Guard.
238
311
1. The Backup admin goes to the vault > **Properties** > **Multi-user Authorization**.
@@ -243,6 +316,27 @@ Disabling MUA is a protected operation, and hence, is protected using MUA. This
243
316
244
317
:::image type="content" source="./media/multi-user-authorization/disable-mua.png" alt-text="Screenshot showing to disable multi-user authentication.":::
245
318
319
+
# [PowerShell](#tab/powershell)
320
+
321
+
Use the following command to disable MUA on a Recovery Services vault:
0 commit comments