Skip to content

Commit 7fba7c9

Browse files
authored
Merge pull request #277653 from AbhishekMallick-MS/Jun-7-2024-MUA
MUA updates
2 parents ec98f13 + 892f786 commit 7fba7c9

File tree

4 files changed

+73
-58
lines changed

4 files changed

+73
-58
lines changed

articles/backup/enable-multi-user-authorization-quickstart.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Quickstart - Multi-user authorization using Resource Guard
33
description: In this quickstart, learn how to use Multi-user authorization to protect against unauthorized operation.
44
ms.topic: quickstart
5-
ms.date: 09/25/2023
5+
ms.date: 06/11/2024
66
ms.service: backup
77
author: AbhishekMallick-MS
88
ms.author: v-abhmallick
@@ -28,15 +28,15 @@ Before you start:
2828
# [Recovery Services vault](#tab/recovery-services-vault)
2929

3030
- Ensure the Resource Guard and the Recovery Services vault are in the same Azure region.
31-
- Ensure the Backup admin does **not** have **Contributor** permissions on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
31+
- Ensure the **Backup admin** doesn't have **Contributor**, **Backup MUA Admin**, or **Backup MUA Operator** roles added on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
3232
- Ensure that your subscriptions containing the Recovery Services vault as well as the Resource Guard (in different subscriptions or tenants) are registered to use the **Microsoft.RecoveryServices** provider. For more details, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider-1).
3333
- Ensure that you [create a Resource Guard](multi-user-authorization.md#create-a-resource-guard) in a different subsctiption/tenant as that of the vault located in the same region.
3434
- Ensure to [assign permissions to the Backup admin on the Resource Guard to enable MUA](multi-user-authorization.md#assign-permissions-to-the-backup-admin-on-the-resource-guard-to-enable-mua).
3535

3636
# [Backup vault](#tab/backup-vault)
3737

3838
- Ensure the Resource Guard and the Backup vault are in the same Azure region.
39-
- Ensure the Backup admin does **not** have **Contributor** permissions on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
39+
- Ensure the **Backup admin** doesn't have **Contributor**, **Backup MUA Admin**, or **Backup MUA Operator** roles added on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
4040
- Ensure that your subscriptions contain the Backup vault as well as the Resource Guard (in different subscriptions or tenants) are registered to use the provider - **Microsoft.DataProtection**4. For more information, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider-1).
4141

4242
---
-136 KB
Loading

articles/backup/multi-user-authorization-concept.md

Lines changed: 25 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Multi-user authorization using Resource Guard
33
description: An overview of Multi-user authorization using Resource Guard.
44
ms.topic: conceptual
5-
ms.date: 03/26/2024
5+
ms.date: 06/11/2024
66
ms.service: backup
77
author: AbhishekMallick-MS
88
ms.author: v-abhmallick
@@ -19,7 +19,7 @@ Multi-user authorization (MUA) for Azure Backup allows you to add an additional
1919
Azure Backup uses the Resource Guard as an additional authorization mechanism for a Recovery Services vault or a Backup vault. Therefore, to perform a critical operation (described below) successfully, you must have sufficient permissions on the associated Resource Guard as well.
2020

2121
> [!Important]
22-
> To function as intended, the Resource Guard must be owned by a different user, and the vault admin must not have Contributor permissions. You can place Resource Guard in a subscription or tenant different from the one containing the vaults to provide better protection.
22+
> To function as intended, the Resource Guard must be owned by a different user, and the **vault admin** mustn't have **Contributor**, **Backup MUA Admin**, or **Backup MUA Operator** permissions on the Resource Guard. You can place Resource Guard in a subscription or tenant different from the one containing the vaults to provide better protection.
2323
2424
## Critical operations
2525

@@ -32,21 +32,29 @@ The following table lists the operations defined as critical operations and can
3232

3333
# [Recovery Services vault](#tab/recovery-services-vault)
3434

35-
**Operation** | **Mandatory/ Optional**
36-
--- | ---
37-
Disable soft delete | Mandatory
38-
Disable MUA protection | Mandatory
39-
Modify backup policy (reduced retention) | Optional
40-
Modify protection (reduced retention) | Optional
41-
Stop protection with delete data | Optional
42-
Change MARS security PIN | Optional
35+
| Operation | Mandatory/ Optional | Description |
36+
| --- | --- | --- |
37+
| **Disable soft delete or security features** | Mandatory | Disable soft delete setting on a vault. |
38+
| **Remove MUA protection** | Mandatory | Disable MUA protection on a vault. |
39+
| **Delete protection** | Optional | Delete protection by stopping backups and performing delete data. |
40+
| **Modify protection** | Optional | Add a new backup policy with reduced retention or change policy frequency to increase [RPO](azure-backup-glossary.md#recovery-point-objective-rpo). |
41+
| **Modify policy** | Optional | Modify backup policy to reduce retention or change policy frequency to increase [RPO](azure-backup-glossary.md#recovery-point-objective-rpo). |
42+
| **Get backup security PIN** | Optional | Change MARS security PIN. |
43+
| **Stop backup and retain data** | Optional | Delete protection by stopping backups and performing retain data forever or retain as per policy. |
44+
| **Disable immutability** | Optional | Disable immutability setting on a vault. |
45+
4346

4447
# [Backup vault](#tab/backup-vault)
4548

46-
**Operation** | **Mandatory/ Optional**
47-
--- | ---
48-
Disable MUA protection | Mandatory
49-
Delete backup instance | Optional
49+
| Operation | Mandatory/ Optional | Description |
50+
| --- | --- | --- |
51+
| **Disable soft delete** | Mandatory | Disable soft delete setting on a vault. |
52+
| **Remove MUA protection** | Mandatory | Disable MUA protection on a vault. |
53+
| **Delete Backup Instance** | Optional | Delete protection by stopping backups and performing delete data. |
54+
| **Stop backup and retain forever** | Optional | Delete protection by stopping backups and performing retain data forever. |
55+
| **Stop backup and retain as per policy** | Optional | Delete protection by stopping backups and performing retain data as per policy. |
56+
| **Disable immutability** | Optional | Disable immutability setting on a vault. |
57+
5058

5159
---
5260

@@ -69,7 +77,7 @@ Here's the flow of events in a typical scenario:
6977
1. The Backup admin creates the Recovery Services vault or the Backup vault.
7078
2. The Security admin creates the Resource Guard.
7179

72-
The Resource Guard can be in a different subscription or a different tenant with respect to the vault. Ensure that the Backup admin doesn't have Contributor permissions on the Resource Guard.
80+
The Resource Guard can be in a different subscription or a different tenant with respect to the vault. Ensure that the Backup admin doesn't have **Contributor**, **Backup MUA Admin**, or **Backup MUA Operator** permissions on the Resource Guard.
7381

7482
3. The Security admin grants the Reader role to the Backup Admin for the Resource Guard (or a relevant scope). The Backup admin requires the reader role to enable MUA on the vault.
7583
4. The Backup admin now configures the vault to be protected by MUA via the Resource Guard.
@@ -81,15 +89,15 @@ Here's the flow of events in a typical scenario:
8189

8290

8391
>[!Note]
84-
>- If you grant the **Contributor** role on the Resource Guard access temporarily to the Backup Admin, it also provides the delete permissions on the Resource Guard. We recommend you to provide **Backup MUA Operator** permissions only.
92+
>- If you grant the **Contributor** or **Backup MUA Admin** role on the Resource Guard access temporarily to the Backup Admin, it also provides the delete permissions on the Resource Guard. We recommend you to provide **Backup MUA Operator** permissions only.
8593
>- MUA provides protection on the above listed operations performed on the vaulted backups only. Any operations performed directly on the data source (that is, the Azure resource/workload that is protected) are beyond the scope of the Resource Guard.
8694
8795
## Usage scenarios
8896

8997
The following table lists the scenarios for creating your Resource Guard and vaults (Recovery Services vault and Backup vault), along with the relative protection offered by each.
9098

9199
>[!Important]
92-
> The Backup admin must not have Contributor permissions to the Resource Guard in any scenario.
100+
> The **Backup admin** must not have **Contributor**, **Backup MUA Admin**, or **Backup MUA Operator** permissions to the Resource Guard in any scenario as this overrides adding MUA protection on the vault.
93101
94102
**Usage scenario** | **Protection due to MUA** | **Ease of implementation** | **Notes**
95103
--- | --- |--- |--- |

0 commit comments

Comments
 (0)