Skip to content

Commit 9f49f34

Browse files
addressed pre-review comments
1 parent 975b5e5 commit 9f49f34

File tree

2 files changed

+13
-5
lines changed

2 files changed

+13
-5
lines changed

articles/backup/multi-user-authorization-concept.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,10 @@ Azure Backup uses the Resource Guard as an additional authorization mechanism fo
2323
2424
## Critical operations
2525

26-
The following table lists the operations defined as critical operations and can be protected by a Resource Guard. You can choose to exclude certain operations from being protected using the Resource Guard when associating vaults with it. Note that operations denoted as Mandatory can't be excluded from being protected using the Resource Guard for vaults associated with it. Also, the excluded critical operations would apply to all vaults associated with a Resource Guard.
26+
The following table lists the operations defined as critical operations and can be protected by a Resource Guard. You can choose to exclude certain operations from being protected using the Resource Guard when associating vaults with it.
27+
28+
>[!Note]
29+
>You can't excluded the operations denoted as Mandatory from being protected using the Resource Guard for vaults associated with it. Also, the excluded critical operations would apply to all vaults associated with a Resource Guard.
2730
2831
**Choose a vault**
2932

articles/backup/multi-user-authorization.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -73,9 +73,12 @@ For the following example, create the Resource Guard in a tenant different from
7373
Choose the operations you want to protect using the Resource Guard out of all supported critical operations. By default, all supported critical operations are enabled. However, you can exempt certain operations from falling under the purview of MUA using Resource Guard. The security admin can perform the following steps:
7474

7575
1. In the Resource Guard created above, go to **Properties**.
76-
2. Select **Disable** for operations that you want to exclude from being authorized using the Resource Guard. Note that the operations **Disable soft delete** and **Remove MUA protection** can't be disabled.
77-
3. Optionally, you can also update the description for the Resource Guard using this blade.
78-
4. Select **Save**.
76+
2. Select **Disable** for operations that you want to exclude from being authorized using the Resource Guard.
77+
78+
>[!Note]
79+
> You can't disable the protected operations - **Disable soft delete** and **Remove MUA protection**.
80+
1. Optionally, you can also update the description for the Resource Guard using this blade.
81+
1. Select **Save**.
7982

8083
:::image type="content" source="./media/multi-user-authorization/demo-resource-guard-properties.png" alt-text="Screenshot showing demo resource guard properties.":::
8184

@@ -177,7 +180,9 @@ The Security admin can use PIM to create an eligible assignment for the Backup a
177180
### Set up approvers for activating Contributor role
178181

179182
By default, the setup above may not have an approver (and an approval flow requirement) configured in PIM. To ensure that approvers are required for allowing only authorized requests to go through, the security admin must perform the following steps.
180-
Note if this isn't configured, any requests will be automatically approved without going through the security admins or a designated approver’s review. More details on this can be found [here](../active-directory/privileged-identity-management/pim-resource-roles-configure-role-settings.md)
183+
184+
> [!Note]
185+
> If this isn't configured, any requests will be automatically approved without going through the security admins or a designated approver’s review. More details on this can be found [here](../active-directory/privileged-identity-management/pim-resource-roles-configure-role-settings.md)
181186
182187
1. In Azure AD PIM, select **Azure Resources** on the left navigation bar and select your Resource Guard.
183188

0 commit comments

Comments
 (0)