You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/multi-user-authorization.md
+11-1Lines changed: 11 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -158,6 +158,8 @@ Now that the Backup admin has the Reader role on the Resource Guard, they can ea
158
158
159
159
1. Go to the Recovery Services vault. Navigate to **Properties** on the left navigation panel, then to **Multi-User Authorization** and click **Update**.
160
160
161
+
:::image type="content" source="./media/multi-user-authorization/test-vault-properties.png" alt-text="Screenshot showing the Recovery services vault-properties.":::
162
+
161
163
1. Now you are presented with the option to enable MUA and choose a Resource Guard using one of the following ways:
162
164
163
165
1. You can either specify the URI of the Resource Guard, make sure you specify the URI of a Resource Guard you have **Reader** access to and that is the same regions as the vault. You can find the URI (Resource Guard ID) of the Resource Guard in its **Overview** screen:
@@ -191,6 +193,8 @@ Depicted below is an illustration of what happens when the Backup admin tries to
191
193
1. Select the directory containing the Resource Guard and Authenticate yourself. This step may not be required if the Resource Guard is in the same directory as the vault.
192
194
1. Proceed to click **Save**. The request fails with an error informing them about not having sufficient permissions on the Resource Guard to let you perform this operation.
193
195
196
+
:::image type="content" source="./media/multi-user-authorization/test-vault-properties-security-settings-inline.png" alt-text="Screenshot showing the Test Vault properties security settings." lightbox="./media/multi-user-authorization/test-vault-properties-security-settings-expanded.png":::
197
+
194
198
## Authorize critical (protected) operations using Azure AD Privileged Identity Management
195
199
196
200
The following sub-sections discuss authorizing these requests using PIM. There are cases where you may need to perform critical operations on your backups and MUA can help you ensure that these are performed only when the right approvals or permissions exist. As discussed earlier, the Backup admin needs to have a Contributor role on the Resource Guard to perform critical operations that are in the Resource Guard scope. One of the ways to allow just-in-time for such operations is through the use of [Azure Active Directory (Azure AD) Privileged Identity Management](../active-directory/privileged-identity-management/pim-configure.md).
@@ -272,6 +276,10 @@ Once the Backup admin’s request for the Contributor role on the Resource Guard
272
276
>[!NOTE]
273
277
> If the access was assigned using a JIT mechanism, the Contributor role is retracted at the end of the approved period. Else, the Security admin manually removes the **Contributor** role assigned to the Backup admin to perform the critical operation.
274
278
279
+
The following screenshot shows an example of disabling soft delete for an MUA-enabled vault.
280
+
281
+
:::image type="content" source="./media/multi-user-authorization/disable-soft-delete-inline.png" alt-text="Screenshot showing to disable soft delete." lightbox="./media/multi-user-authorization/disable-soft-delete-expanded.png":::
282
+
275
283
## Disable MUA on a Recovery Services vault
276
284
277
285
Disabling MUA is a protected operation, and hence, is protected using MUA. This means that the Backup admin must have the required Contributor role in the Resource Guard. Details on obtaining this role are described here. Following is a summary of steps to disable MUA on a vault.
@@ -281,4 +289,6 @@ Disabling MUA is a protected operation, and hence, is protected using MUA. This
281
289
1. Click **Update**
282
290
1. Uncheck the Protect with Resource Guard check box
283
291
1. Choose the Directory that contains the Resource Guard and verify access using the Authenticate button (if applicable).
284
-
1. After **authentication**, click **Save**. With the right access, the request should be successfully completed.
292
+
1. After **authentication**, click **Save**. With the right access, the request should be successfully completed.
293
+
294
+
:::image type="content" source="./media/multi-user-authorization/disable-mua.png" alt-text="Screenshot showing to disable multi-user authentication.":::
0 commit comments