You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/enable-multi-user-authorization-quickstart.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Quickstart - Multi-user authorization using Resource Guard
3
3
description: In this quickstart, learn how to use Multi-user authorization to protect against unauthorized operation.
4
4
ms.topic: quickstart
5
-
ms.date: 06/11/2024
5
+
ms.date: 06/09/2025
6
6
ms.service: azure-backup
7
7
author: jyothisuri
8
8
ms.author: jsuri
@@ -93,5 +93,5 @@ Once the Backup admin has the Reader role on the Resource Guard, they can enable
93
93
94
94
-[Protected operations using MUA](multi-user-authorization.md?pivots=vaults-recovery-services-vault#protected-operations-using-mua)
95
95
-[Authorize critical (protected) operations using Microsoft Entra Privileged Identity Management](multi-user-authorization.md#authorize-critical-protected-operations-using-azure-active-directory-privileged-identity-management)
96
-
-[Performing a protected operation after approval](multi-user-authorization.md#performing-a-protected-operation-after-approval)
96
+
-[Perform a protected operation after approval](multi-user-authorization.md#perform-a-protected-operation-after-approval)
97
97
- Disable MUA on a [Recovery Services vault](multi-user-authorization.md?tabs=azure-portal&pivots=vaults-recovery-services-vault#disable-mua-on-a-recovery-services-vault) or a [Backup vault](multi-user-authorization.md?tabs=azure-portal&pivots=vaults-backup-vault#disable-mua-on-a-backup-vault).
Copy file name to clipboardExpand all lines: articles/backup/multi-user-authorization-tutorial.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Tutorial - Enable Multi-user authorization using Resource Guard
3
3
description: In this tutorial, you'll learn about how create a resource guard and enable Multi-user authorization on Recovery Services vault and Backup vault for Azure Backup.
4
4
ms.topic: tutorial
5
-
ms.date: 09/25/2023
5
+
ms.date: 06/09/2025
6
6
ms.service: azure-backup
7
7
author: jyothisuri
8
8
ms.author: jsuri
@@ -206,5 +206,5 @@ Once the Backup admin has the Reader role on the Resource Guard, they can enable
206
206
207
207
-[Protected operations using MUA](multi-user-authorization.md?pivots=vaults-recovery-services-vault#protected-operations-using-mua)
208
208
-[Authorize critical (protected) operations using Microsoft Entra Privileged Identity Management](multi-user-authorization.md#authorize-critical-protected-operations-using-azure-active-directory-privileged-identity-management)
209
-
-[Performing a protected operation after approval](multi-user-authorization.md#performing-a-protected-operation-after-approval)
209
+
-[Perform a protected operation after approval](multi-user-authorization.md#perform-a-protected-operation-after-approval)
210
210
- Disable MUA on a [Recovery Services vault](multi-user-authorization.md?tabs=azure-portal&pivots=vaults-recovery-services-vault#disable-mua-on-a-recovery-services-vault) or a [Backup vault](multi-user-authorization.md?tabs=azure-portal&pivots=vaults-backup-vault#disable-mua-on-a-backup-vault).
This article describes how to configure Multi-user authorization (MUA) for Azure Backup to add an additional layer of protection to critical operations on your Recovery Services vaults.
20
-
21
-
This article demonstrates Resource Guard creation in a different tenant that offers maximum protection. It also demonstrates how to request and approve requests for performing critical operations using [Microsoft Entra Privileged Identity Management](../active-directory/privileged-identity-management/pim-configure.md) in the tenant housing the Resource Guard. You can optionally use other mechanisms to manage JIT permissions on the Resource Guard as per your setup.
19
+
This article describes how to configure Multi-User Authorization (MUA) for Azure Backup to enhance the security of critical operations on Recovery Services vaults. It covers the creation of a Resource Guard in a separate tenant for maximum protection and demonstrates how to request and approve critical operation access using [Microsoft Entra Privileged Identity Management](../active-directory/privileged-identity-management/pim-configure.md) within the tenant hosting the Resource Guard. Alternatively, you can use other methods to manage just-in-time (JIT) permissions based on your organizational setup.
22
20
23
21
>[!NOTE]
24
22
>- Multi-user authorization for Azure Backup is available in all public Azure regions.
25
23
>- Multi-user authorization using Resource Guard for Backup vault is now generally available. [Learn more](multi-user-authorization.md?pivots=vaults-backup-vault).
26
24
27
-
## Before you start
25
+
## Prerequisites
26
+
27
+
Before you configure Multi-user authorization for a Recovery Services vault, ensure that the following prerequisites are met:
28
28
29
-
-Ensure the Resource Guard and the Recovery Services vault are in the same Azure region.
30
-
-Ensure the Backup admin does**not** have **Contributor**, **Backup MUA Admin**, or **Backup MUA Operator** permissions on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
31
-
-Ensure that your subscriptions containing the Recovery Services vault as well as the Resource Guard (in different subscriptions or tenants) are registered to use the providers - **Microsoft.RecoveryServices** and **Microsoft.DataProtection** . For more information, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider-1).
29
+
-The Resource Guard and the Recovery Services vault must be in the same Azure region.
30
+
-The Backup admin must**not** have **Contributor**, **Backup MUA Admin**, or **Backup MUA Operator** permissions on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
31
+
-The subscriptions containing the Recovery Services vault as well as the Resource Guard (in different subscriptions or tenants) must be registered to use the providers - **Microsoft.RecoveryServices** and **Microsoft.DataProtection** . For more information, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider-1).
32
32
33
33
Learn about various [MUA usage scenarios](./multi-user-authorization-concept.md?tabs=recovery-services-vault#usage-scenarios).
34
34
@@ -51,7 +51,7 @@ To create the Resource Guard in a tenant different from the vault tenant, follow
51
51
:::image type="content" source="./media/multi-user-authorization/resource-guards.png" alt-text="Screenshot shows how to search resource guards." lightbox="./media/multi-user-authorization/resource-guards.png":::
52
52
53
53
- Select **Create** to start creating a Resource Guard.
54
-
- In the create blade, fill in the required details for this Resource Guard.
54
+
- In the create pane, fill in the required details for this Resource Guard.
55
55
- Make sure the Resource Guard is in the same Azure regions as the Recovery Services vault.
56
56
- Also, it's helpful to add a description of how to get or request access to perform actions on associated vaults when needed. This description would also appear in the associated vaults to guide the backup admin on getting the required permissions. You can edit the description later if needed, but having a well-defined description at all times is encouraged.
57
57
@@ -95,7 +95,7 @@ To exempt operations, follow these steps:
95
95
96
96
>[!Note]
97
97
> You can't disable the protected operations - **Disable soft delete** and **Remove MUA protection**.
98
-
1. Optionally, you can also update the description for the Resource Guard using this blade.
98
+
1. Optionally, you can also update the description for the Resource Guard using this pane.
@@ -146,7 +146,7 @@ To update the operations that are to be excluded from being protected by the res
146
146
147
147
To enable MUA on a vault, the admin of the vault must have **Reader** role on the Resource Guard or subscription containing the Resource Guard. To assign the **Reader** role on the Resource Guard:
148
148
149
-
1. In the Resource Guard created above, go to the **Access Control (IAM)**blade, and then go to **Add role assignment**.
149
+
1. In the Resource Guard created above, go to the **Access Control (IAM)**pane, and then go to **Add role assignment**.
@@ -335,9 +335,9 @@ Once the Backup admin raises a request for activating the **Backup MUA Operator*
335
335
1. The Backup admin is informed by email (or other organizational alerting mechanisms) that their request is now approved.
336
336
1. Once approved, the Backup admin can perform protected operations for the requested period.
337
337
338
-
## Performing a protected operation after approval
338
+
## Perform a protected operation after approval
339
339
340
-
Once the Backup admin’s request for the **Backup MUA Operator** role on the Resource Guard is approved, they can perform protected operations on the associated vault. If the Resource Guard is in another directory, the Backup admin would need to authenticate themselves.
340
+
After the Backup admin’s request for the **Backup MUA Operator** role on the Resource Guard is approved, they can perform protected operations on the associated vault. If the Resource Guard is in another directory, the Backup admin would need to authenticate themselves.
341
341
342
342
>[!NOTE]
343
343
> If the access was assigned using a JIT mechanism, the **Backup MUA Operator** role is retracted at the end of the approved period. Else, the Security admin manually removes the **Backup MUA Operator** role assigned to the Backup admin to perform the critical operation.
@@ -412,19 +412,19 @@ The tenant ID is required if the resource guard exists in a different tenant.
412
412
413
413
::: zone pivot="vaults-backup-vault"
414
414
415
-
This article describes how to configure Multi-user authorization (MUA) for Azure Backup to add an additional layer of protection to critical operations on your Backup vault.
416
-
417
-
This article demonstrates Resource Guard creation in a different tenant that offers maximum protection. It also demonstrates how to request and approve requests for performing critical operations using [Microsoft Entra Privileged Identity Management](../active-directory/privileged-identity-management/pim-configure.md) in the tenant housing the Resource Guard. You can optionally use other mechanisms to manage JIT permissions on the Resource Guard as per your setup.
415
+
This article describes how to configure Multi-User Authorization (MUA) for Azure Backup to enhance the security of critical operations on Backup vaults. It covers the creation of a Resource Guard in a separate tenant for maximum protection and demonstrates how to request and approve critical operation access using [Microsoft Entra Privileged Identity Management](../active-directory/privileged-identity-management/pim-configure.md) within the tenant hosting the Resource Guard. Alternatively, you can use other methods to manage just-in-time (JIT) permissions based on your organizational setup.
418
416
419
417
>[!NOTE]
420
418
>- Multi-user authorization using Resource Guard for Backup vault is now generally available.
421
419
>- Multi-user authorization for Azure Backup is available in all public Azure regions.
422
420
423
-
## Before you start
421
+
## Prerequisites
422
+
423
+
Before you configure Multi-user authorization for a Backup vault, ensure that the following prerequisites are met:
424
424
425
-
-Ensure the Resource Guard and the Backup vault are in the same Azure region.
426
-
-Ensure the Backup admin does**not** have **Contributor**, **Backup MUA Admin**, or **Backup MUA Operator** permissions on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
427
-
-Ensure that your subscriptions contain the Backup vault as well as the Resource Guard (in different subscriptions or tenants) are registered to use the provider - **Microsoft.DataProtection**4. For more information, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider-1).
425
+
-The Resource Guard and the Backup vault must be in the same Azure region.
426
+
-The Backup admin must**not** have **Contributor**, **Backup MUA Admin**, or **Backup MUA Operator** permissions on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
427
+
-The subscriptions contain the Backup vault as well as the Resource Guard (in different subscriptions or tenants) must be registered to use the provider - **Microsoft.DataProtection**4. For more information, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider-1).
428
428
429
429
Learn about various [MUA usage scenarios](./multi-user-authorization-concept.md?tabs=backup-vault#usage-scenarios).
430
430
@@ -445,7 +445,7 @@ To create the Resource Guard in a tenant different from the vault tenant as a Se
1. In the Create blade, fill in the required details for this Resource Guard.
448
+
1. In the Create pane, fill in the required details for this Resource Guard.
449
449
- Ensure that the Resource Guard is in the same Azure region as the Backup vault.
450
450
- Add a description on how to request access to perform actions on associated vaults when needed. This description appears in the associated vaults to guide the Backup admin on how to get the required permissions.
451
451
@@ -482,7 +482,7 @@ The Backup admin must have **Reader** role on the Resource Guard or subscription
482
482
483
483
To assign the **Reader** role on the Resource Guard, follow these steps:
484
484
485
-
1. In the Resource Guard created above, go to the **Access Control (IAM)**blade, and then go to **Add role assignment**.
485
+
1. In the Resource Guard created above, go to the **Access Control (IAM)**pane, and then go to **Add role assignment**.
486
486
487
487
:::image type="content" source="./media/multi-user-authorization/demo-resource-guard-access-control.png" alt-text="Screenshot showing demo resource guard-access control for Backup vault.":::
Copy file name to clipboardExpand all lines: articles/backup/quick-backup-hana-cli.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Quickstart - Back up an SAP HANA database with Azure CLI
3
3
description: In this quickstart, learn how to create a Recovery Services vault, enable protection on an SAP HANA System Replication database, and create the initial recovery point with Azure CLI.
Copy file name to clipboardExpand all lines: articles/business-process-tracking/create-business-process.md
+4-9Lines changed: 4 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,20 +1,15 @@
1
1
---
2
-
title: Create business processes
2
+
title: Create Business Processes
3
3
description: Model a business process to visualize and map transactions to Azure resources, such as Standard workflows in Azure Logic Apps.
4
4
ms.service: azure-business-process-tracking
5
5
ms.topic: how-to
6
6
ms.reviewer: estfan, azla
7
-
ms.date: 06/07/2024
7
+
ms.date: 06/09/2025
8
8
9
9
# CustomerIntent: As a business analyst or business SME, I want a way to visualize my organization's business processes so I can map them to the actual resources that implement these business use cases and scenarios.
10
10
---
11
11
12
-
# Create a business process to add business context about Azure resources using Azure Business Process Tracking (Preview)
13
-
14
-
> [!NOTE]
15
-
>
16
-
> This capability is in preview and is subject to the
17
-
> [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
12
+
# Create a business process to add business context about Azure resources using Azure Business Process Tracking
18
13
19
14
To add business context around the Azure resources in an integration solution, you can visualize business processes flows for the tasks implemented by these resources. In Azure Business Process Tracking, a business process is a series of stages that represent the tasks that flow through a real-world business scenario. This business process also specifies a single business identifier or *transaction ID*, such as a ticket number, order number, case number, and so on, to identify a transaction that exists across all the stages in the business process and to correlate those stages together.
20
15
@@ -56,7 +51,7 @@ After you define a business process, you can then map each stage to actual Azure
56
51
57
52
> [!NOTE]
58
53
>
59
-
> Although Azure Business Process Tracking doesn't incur charges during preview, Azure Data
54
+
> Although Azure Business Process Tracking doesn't incur charges at this time, Azure Data
60
55
> Explorer incurs charges, based on the selected pricing option. For more information, see
61
56
> [Azure Data Explorer pricing](https://azure.microsoft.com/pricing/details/data-explorer/#pricing).
Copy file name to clipboardExpand all lines: articles/business-process-tracking/deploy-business-process.md
+6-11Lines changed: 6 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,19 +1,14 @@
1
1
---
2
-
title: Deploy business process and tracking profile to Azure
2
+
title: Deploy Business Process and Tracking Profile to Azure
3
3
description: Deploy your business process and tracking profile to Standard logic app resources in Azure Logic Apps.
4
4
ms.service: azure-business-process-tracking
5
5
ms.topic: how-to
6
6
ms.reviewer: estfan, azla
7
-
ms.date: 06/07/2024
7
+
ms.date: 06/09/2025
8
8
# CustomerIntent: As an integration developer, I want to deploy previously created business processes and tracking profiles to deployed Standard logic app resources so I can capture and track key business data moving through my deployed resources.
9
9
---
10
10
11
-
# Deploy a business process and tracking profile to Azure (Preview)
12
-
13
-
> [!NOTE]
14
-
>
15
-
> This capability is in preview and is subject to the
16
-
> [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
11
+
# Deploy a business process and tracking profile to Azure
17
12
18
13
After you map your business process stages to the operations and outputs in Standard logic app workflows, you're ready to deploy your business process and tracking profile to Azure.
19
14
@@ -81,7 +76,7 @@ After the mapped Standard logic app workflows run and emit the data that you spe
81
76
82
77
1. To create custom experiences for the data provided here, check out [Azure Workbooks](/azure/azure-monitor/visualize/workbooks-overview) or [Azure Data Explorer with Power BI](/azure/data-explorer/power-bi-data-connector?tabs=web-ui).
83
78
84
-
## Next step
79
+
## Related content
85
80
86
-
> [!div class="nextstepaction"]
87
-
>[Manage business processes](manage-business-process.md)
81
+
-[Set up continuous integration and deployment](set-up-continuous-integration-deployment.md)
82
+
-[Manage business processes](manage-business-process.md)
0 commit comments