Skip to content

Commit 4dfff57

Browse files
authored
Merge pull request #185114 from v-amallick/Jan-14-2022-MUA
MUA - Image updates
2 parents e10fa6d + e5f99f1 commit 4dfff57

7 files changed

+11
-1
lines changed
255 KB
Loading
418 KB
Loading
418 KB
Loading
332 KB
Loading
332 KB
Loading
208 KB
Loading

articles/backup/multi-user-authorization.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -158,6 +158,8 @@ Now that the Backup admin has the Reader role on the Resource Guard, they can ea
158158

159159
1. Go to the Recovery Services vault. Navigate to **Properties** on the left navigation panel, then to **Multi-User Authorization** and click **Update**.
160160

161+
:::image type="content" source="./media/multi-user-authorization/test-vault-properties.png" alt-text="Screenshot showing the Recovery services vault-properties.":::
162+
161163
1. Now you are presented with the option to enable MUA and choose a Resource Guard using one of the following ways:
162164

163165
1. You can either specify the URI of the Resource Guard, make sure you specify the URI of a Resource Guard you have **Reader** access to and that is the same regions as the vault. You can find the URI (Resource Guard ID) of the Resource Guard in its **Overview** screen:
@@ -191,6 +193,8 @@ Depicted below is an illustration of what happens when the Backup admin tries to
191193
1. Select the directory containing the Resource Guard and Authenticate yourself. This step may not be required if the Resource Guard is in the same directory as the vault.
192194
1. Proceed to click **Save**. The request fails with an error informing them about not having sufficient permissions on the Resource Guard to let you perform this operation.
193195

196+
:::image type="content" source="./media/multi-user-authorization/test-vault-properties-security-settings-inline.png" alt-text="Screenshot showing the Test Vault properties security settings." lightbox="./media/multi-user-authorization/test-vault-properties-security-settings-expanded.png":::
197+
194198
## Authorize critical (protected) operations using Azure AD Privileged Identity Management
195199

196200
The following sub-sections discuss authorizing these requests using PIM. There are cases where you may need to perform critical operations on your backups and MUA can help you ensure that these are performed only when the right approvals or permissions exist. As discussed earlier, the Backup admin needs to have a Contributor role on the Resource Guard to perform critical operations that are in the Resource Guard scope. One of the ways to allow just-in-time for such operations is through the use of [Azure Active Directory (Azure AD) Privileged Identity Management](../active-directory/privileged-identity-management/pim-configure.md).
@@ -272,6 +276,10 @@ Once the Backup admin’s request for the Contributor role on the Resource Guard
272276
>[!NOTE]
273277
> If the access was assigned using a JIT mechanism, the Contributor role is retracted at the end of the approved period. Else, the Security admin manually removes the **Contributor** role assigned to the Backup admin to perform the critical operation.
274278
279+
The following screenshot shows an example of disabling soft delete for an MUA-enabled vault.
280+
281+
:::image type="content" source="./media/multi-user-authorization/disable-soft-delete-inline.png" alt-text="Screenshot showing to disable soft delete." lightbox="./media/multi-user-authorization/disable-soft-delete-expanded.png":::
282+
275283
## Disable MUA on a Recovery Services vault
276284

277285
Disabling MUA is a protected operation, and hence, is protected using MUA. This means that the Backup admin must have the required Contributor role in the Resource Guard. Details on obtaining this role are described here. Following is a summary of steps to disable MUA on a vault.
@@ -281,4 +289,6 @@ Disabling MUA is a protected operation, and hence, is protected using MUA. This
281289
1. Click **Update**
282290
1. Uncheck the Protect with Resource Guard check box
283291
1. Choose the Directory that contains the Resource Guard and verify access using the Authenticate button (if applicable).
284-
1. After **authentication**, click **Save**. With the right access, the request should be successfully completed.
292+
1. After **authentication**, click **Save**. With the right access, the request should be successfully completed.
293+
294+
:::image type="content" source="./media/multi-user-authorization/disable-mua.png" alt-text="Screenshot showing to disable multi-user authentication.":::

0 commit comments

Comments
 (0)