You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Ensure the Resource Guard and the Recovery Services vault are in the same Azure region.
31
-
-Ensure the Backup admin does **not** have **Contributor** permissions on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
31
+
- Ensure the **Backup admin** doesn't have **Contributor**, **Backup MUA Admin**, or **Backup MUA Operator** roles added on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
32
32
- Ensure that your subscriptions containing the Recovery Services vault as well as the Resource Guard (in different subscriptions or tenants) are registered to use the **Microsoft.RecoveryServices** provider. For more details, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider-1).
33
33
- Ensure that you [create a Resource Guard](multi-user-authorization.md#create-a-resource-guard) in a different subsctiption/tenant as that of the vault located in the same region.
34
34
- Ensure to [assign permissions to the Backup admin on the Resource Guard to enable MUA](multi-user-authorization.md#assign-permissions-to-the-backup-admin-on-the-resource-guard-to-enable-mua).
35
35
36
36
# [Backup vault](#tab/backup-vault)
37
37
38
38
- Ensure the Resource Guard and the Backup vault are in the same Azure region.
39
-
-Ensure the Backup admin does **not** have **Contributor** permissions on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
39
+
- Ensure the **Backup admin** doesn't have **Contributor**, **Backup MUA Admin**, or **Backup MUA Operator** roles added on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
40
40
- Ensure that your subscriptions contain the Backup vault as well as the Resource Guard (in different subscriptions or tenants) are registered to use the provider - **Microsoft.DataProtection**4. For more information, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider-1).
Copy file name to clipboardExpand all lines: articles/backup/multi-user-authorization-concept.md
+25-17Lines changed: 25 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Multi-user authorization using Resource Guard
3
3
description: An overview of Multi-user authorization using Resource Guard.
4
4
ms.topic: conceptual
5
-
ms.date: 03/26/2024
5
+
ms.date: 06/11/2024
6
6
ms.service: backup
7
7
author: AbhishekMallick-MS
8
8
ms.author: v-abhmallick
@@ -19,7 +19,7 @@ Multi-user authorization (MUA) for Azure Backup allows you to add an additional
19
19
Azure Backup uses the Resource Guard as an additional authorization mechanism for a Recovery Services vault or a Backup vault. Therefore, to perform a critical operation (described below) successfully, you must have sufficient permissions on the associated Resource Guard as well.
20
20
21
21
> [!Important]
22
-
> To function as intended, the Resource Guard must be owned by a different user, and the vault admin must not have Contributorpermissions. You can place Resource Guard in a subscription or tenant different from the one containing the vaults to provide better protection.
22
+
> To function as intended, the Resource Guard must be owned by a different user, and the **vault admin** mustn't have **Contributor**, **Backup MUA Admin**, or **Backup MUA Operator**permissions on the Resource Guard. You can place Resource Guard in a subscription or tenant different from the one containing the vaults to provide better protection.
23
23
24
24
## Critical operations
25
25
@@ -32,21 +32,29 @@ The following table lists the operations defined as critical operations and can
|**Disable soft delete or security features**| Mandatory | Disable soft delete setting on a vault. |
38
+
|**Remove MUA protection**| Mandatory | Disable MUA protection on a vault. |
39
+
|**Delete protection**| Optional | Delete protection by stopping backups and performing delete data. |
40
+
|**Modify protection**| Optional | Add a new backup policy with reduced retention or change policy frequency to increase [RPO](azure-backup-glossary.md#recovery-point-objective-rpo). |
41
+
|**Modify policy**| Optional | Modify backup policy to reduce retention or change policy frequency to increase [RPO](azure-backup-glossary.md#recovery-point-objective-rpo). |
|**Stop backup and retain data**| Optional | Delete protection by stopping backups and performing retain data forever or retain as per policy. |
44
+
|**Disable immutability**| Optional | Disable immutability setting on a vault. |
45
+
43
46
44
47
# [Backup vault](#tab/backup-vault)
45
48
46
-
**Operation** | **Mandatory/ Optional**
47
-
--- | ---
48
-
Disable MUA protection | Mandatory
49
-
Delete backup instance | Optional
49
+
| Operation | Mandatory/ Optional | Description |
50
+
| --- | --- | --- |
51
+
|**Disable soft delete**| Mandatory | Disable soft delete setting on a vault. |
52
+
|**Remove MUA protection**| Mandatory | Disable MUA protection on a vault. |
53
+
|**Delete Backup Instance**| Optional | Delete protection by stopping backups and performing delete data. |
54
+
|**Stop backup and retain forever**| Optional | Delete protection by stopping backups and performing retain data forever. |
55
+
|**Stop backup and retain as per policy**| Optional | Delete protection by stopping backups and performing retain data as per policy. |
56
+
|**Disable immutability**| Optional | Disable immutability setting on a vault. |
57
+
50
58
51
59
---
52
60
@@ -69,7 +77,7 @@ Here's the flow of events in a typical scenario:
69
77
1. The Backup admin creates the Recovery Services vault or the Backup vault.
70
78
2. The Security admin creates the Resource Guard.
71
79
72
-
The Resource Guard can be in a different subscription or a different tenant with respect to the vault. Ensure that the Backup admin doesn't have Contributor permissions on the Resource Guard.
80
+
The Resource Guard can be in a different subscription or a different tenant with respect to the vault. Ensure that the Backup admin doesn't have **Contributor**, **Backup MUA Admin**, or **Backup MUA Operator** permissions on the Resource Guard.
73
81
74
82
3. The Security admin grants the Reader role to the Backup Admin for the Resource Guard (or a relevant scope). The Backup admin requires the reader role to enable MUA on the vault.
75
83
4. The Backup admin now configures the vault to be protected by MUA via the Resource Guard.
@@ -81,15 +89,15 @@ Here's the flow of events in a typical scenario:
81
89
82
90
83
91
>[!Note]
84
-
>- If you grant the **Contributor** role on the Resource Guard access temporarily to the Backup Admin, it also provides the delete permissions on the Resource Guard. We recommend you to provide **Backup MUA Operator** permissions only.
92
+
>- If you grant the **Contributor**or **Backup MUA Admin**role on the Resource Guard access temporarily to the Backup Admin, it also provides the delete permissions on the Resource Guard. We recommend you to provide **Backup MUA Operator** permissions only.
85
93
>- MUA provides protection on the above listed operations performed on the vaulted backups only. Any operations performed directly on the data source (that is, the Azure resource/workload that is protected) are beyond the scope of the Resource Guard.
86
94
87
95
## Usage scenarios
88
96
89
97
The following table lists the scenarios for creating your Resource Guard and vaults (Recovery Services vault and Backup vault), along with the relative protection offered by each.
90
98
91
99
>[!Important]
92
-
> The Backup admin must not have Contributorpermissions to the Resource Guard in any scenario.
100
+
> The **Backup admin** must not have **Contributor**, **Backup MUA Admin**, or **Backup MUA Operator**permissions to the Resource Guard in any scenario as this overrides adding MUA protection on the vault.
93
101
94
102
**Usage scenario** | **Protection due to MUA** | **Ease of implementation** | **Notes**
0 commit comments