You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/multi-user-authorization-concept.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,10 @@ Azure Backup uses the Resource Guard as an additional authorization mechanism fo
23
23
24
24
## Critical operations
25
25
26
-
The following table lists the operations defined as critical operations and can be protected by a Resource Guard. You can choose to exclude certain operations from being protected using the Resource Guard when associating vaults with it. Note that operations denoted as Mandatory can't be excluded from being protected using the Resource Guard for vaults associated with it. Also, the excluded critical operations would apply to all vaults associated with a Resource Guard.
26
+
The following table lists the operations defined as critical operations and can be protected by a Resource Guard. You can choose to exclude certain operations from being protected using the Resource Guard when associating vaults with it.
27
+
28
+
>[!Note]
29
+
>You can't excluded the operations denoted as Mandatory from being protected using the Resource Guard for vaults associated with it. Also, the excluded critical operations would apply to all vaults associated with a Resource Guard.
Copy file name to clipboardExpand all lines: articles/backup/multi-user-authorization.md
+9-4Lines changed: 9 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,9 +73,12 @@ For the following example, create the Resource Guard in a tenant different from
73
73
Choose the operations you want to protect using the Resource Guard out of all supported critical operations. By default, all supported critical operations are enabled. However, you can exempt certain operations from falling under the purview of MUA using Resource Guard. The security admin can perform the following steps:
74
74
75
75
1. In the Resource Guard created above, go to **Properties**.
76
-
2. Select **Disable** for operations that you want to exclude from being authorized using the Resource Guard. Note that the operations **Disable soft delete** and **Remove MUA protection** can't be disabled.
77
-
3. Optionally, you can also update the description for the Resource Guard using this blade.
78
-
4. Select **Save**.
76
+
2. Select **Disable** for operations that you want to exclude from being authorized using the Resource Guard.
77
+
78
+
>[!Note]
79
+
> You can't disable the protected operations - **Disable soft delete** and **Remove MUA protection**.
80
+
1. Optionally, you can also update the description for the Resource Guard using this blade.
@@ -177,7 +180,9 @@ The Security admin can use PIM to create an eligible assignment for the Backup a
177
180
### Set up approvers for activating Contributor role
178
181
179
182
By default, the setup above may not have an approver (and an approval flow requirement) configured in PIM. To ensure that approvers are required for allowing only authorized requests to go through, the security admin must perform the following steps.
180
-
Note if this isn't configured, any requests will be automatically approved without going through the security admins or a designated approver’s review. More details on this can be found [here](../active-directory/privileged-identity-management/pim-resource-roles-configure-role-settings.md)
183
+
184
+
> [!Note]
185
+
> If this isn't configured, any requests will be automatically approved without going through the security admins or a designated approver’s review. More details on this can be found [here](../active-directory/privileged-identity-management/pim-resource-roles-configure-role-settings.md)
181
186
182
187
1. In Azure AD PIM, select **Azure Resources** on the left navigation bar and select your Resource Guard.
0 commit comments