Skip to content

Commit f0d0051

Browse files
authored
Merge pull request #253117 from MicrosoftDocs/release-mua-for-backup-vault
Release mua for backup vault --Scheduled release at 4am of 9/29
2 parents 389a31b + 0b2fae6 commit f0d0051

13 files changed

+252
-125
lines changed

articles/backup/backup-azure-delete-vault.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ To delete a vault, follow these steps:
5151

5252
Alternately, go to the blades manually by following the steps below.
5353

54-
- <a id="portal-mua">**Step 2:**</a> If Multi-User Authorization (MUA) is enabled, seek necessary permissions from the security administrator before vault deletion. [Learn more](./multi-user-authorization.md#authorize-critical-protected-operations-using-azure-ad-privileged-identity-management)
54+
- <a id="portal-mua">**Step 2:**</a> If Multi-User Authorization (MUA) is enabled, seek necessary permissions from the security administrator before vault deletion. [Learn more](./multi-user-authorization.md#authorize-critical-protected-operations-using-azure-active-directory-privileged-identity-management)
5555

5656
- <a id="portal-disable-soft-delete">**Step 3:**</a> Disable the soft delete and Security features
5757

@@ -279,7 +279,7 @@ If you're sure that all the items backed up in the vault are no longer required
279279

280280
Follow these steps:
281281

282-
- **Step 1:** Seek the necessary permissions from the security administrator to delete the vault if Multi-User Authorization has been enabled against the vault. [Learn more](./multi-user-authorization.md#authorize-critical-protected-operations-using-azure-ad-privileged-identity-management)
282+
- **Step 1:** Seek the necessary permissions from the security administrator to delete the vault if Multi-User Authorization has been enabled against the vault. [Learn more](./multi-user-authorization.md#authorize-critical-protected-operations-using-azure-active-directory-privileged-identity-management)
283283

284284
- <a id="powershell-install-az-module">**Step 2:**</a> Upgrade to PowerShell 7 version by performing these steps:
285285

Lines changed: 61 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,53 +1,97 @@
11
---
22
title: Quickstart - Multi-user authorization using Resource Guard
33
description: In this quickstart, learn how to use Multi-user authorization to protect against unauthorized operation.
4-
ms.topic: tutorial
5-
ms.date: 05/05/2022
4+
ms.topic: quickstart
5+
ms.date: 09/25/2023
66
ms.service: backup
77
author: AbhishekMallick-MS
88
ms.author: v-abhmallick
99
---
1010

11-
# Quickstart: Enable protection using Multi-user authorization on Recovery Services vault in Azure Backup
12-
13-
Multi-user authorization (MUA) for Azure Backup allows you to add an additional layer of protection to critical operations on your Recovery Services vaults. For MUA, Azure Backup uses another Azure resource called the Resource Guard to ensure critical operations are performed only with applicable authorization. Learn about [MUA concepts](multi-user-authorization-concept.md).
11+
# Quickstart: Enable protection using Multi-user authorization in Azure Backup
1412

1513
This quickstart describes how to enable Multi-user authorization (MUA) for Azure Backup.
1614

15+
Multi-user authorization (MUA) for Azure Backup allows you to add an additional layer of protection to critical operations on your Recovery Services vaults and Backup vaults. For MUA, Azure Backup uses another Azure resource called the Resource Guard to ensure critical operations are performed only with applicable authorization.
16+
17+
>[!Note]
18+
>MUA is now generally available for both Recovery Services vaults and Backup vaults.
19+
20+
Learn about [MUA concepts](multi-user-authorization-concept.md).
21+
1722
## Prerequisites
1823

1924
Before you start:
2025

26+
**Choose a vault**
27+
28+
# [Recovery Services vault](#tab/recovery-services-vault)
29+
2130
- Ensure the Resource Guard and the Recovery Services vault are in the same Azure region.
2231
- Ensure the Backup admin does **not** have **Contributor** permissions on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
2332
- Ensure that your subscriptions containing the Recovery Services vault as well as the Resource Guard (in different subscriptions or tenants) are registered to use the **Microsoft.RecoveryServices** provider. For more details, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider-1).
2433
- Ensure that you [create a Resource Guard](multi-user-authorization.md#create-a-resource-guard) in a different subsctiption/tenant as that of the vault located in the same region.
2534
- Ensure to [assign permissions to the Backup admin on the Resource Guard to enable MUA](multi-user-authorization.md#assign-permissions-to-the-backup-admin-on-the-resource-guard-to-enable-mua).
2635

36+
# [Backup vault](#tab/backup-vault)
37+
38+
- Ensure the Resource Guard and the Backup vault are in the same Azure region.
39+
- Ensure the Backup admin does **not** have **Contributor** permissions on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
40+
- Ensure that your subscriptions contain the Backup vault as well as the Resource Guard (in different subscriptions or tenants) are registered to use the provider - **Microsoft.DataProtection**4. For more information, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider-1).
41+
42+
---
43+
2744
## Enable MUA
2845

29-
The Backup admin now has the Reader role on the Resource Guard and can easily enable multi-user authorization on vaults managed by them.
46+
Once the Backup admin has the Reader role on the Resource Guard, they can enable multi-user authorization on vaults managed by following these steps:
47+
48+
**Choose a vault**
3049

31-
Follow these steps:
50+
# [Recovery Services vault](#tab/recovery-services-vault)
3251

33-
1. Go to the Recovery Services vault.
34-
1. Go to **Properties** on the left navigation panel, then to **Multi-User Authorization** and click **Update**.
35-
1. The option to enable MUA appears. Choose a Resource Guard using one of the following ways:
52+
1. Go to the Recovery Services vault for which you want to configure MUA.
3653

37-
1. You can either specify the URI of the Resource Guard, make sure you specify the URI of a Resource Guard you have **Reader** access to and that is the same regions as the vault. You can find the URI (Resource Guard ID) of the Resource Guard in its **Overview** screen:
54+
1. On the left pane, select **Properties**.
3855

39-
1. Or, you can select the Resource Guard from the list of Resource Guards you have **Reader** access to, and those available in the region.
56+
1. Go to **Multi-User Authorization** and select **Update**.
57+
58+
1. To enable MUA and choose a Resource Guard, perform one of the following actions:
59+
60+
- You can either specify the URI of the Resource Guard, make sure you specify the URI of a Resource Guard you have **Reader** access to and that is the same regions as the vault. You can find the URI (Resource Guard ID) of the Resource Guard in its **Overview** screen:
61+
62+
- Or, you can select the Resource Guard from the list of Resource Guards you have **Reader** access to, and those available in the region.
4063

4164
1. Click **Select Resource Guard**
42-
1. Click on the dropdown and select the directory the Resource Guard is in.
43-
1. Click **Authenticate** to validate your identity and access.
65+
1. Select the dropdown list and choose the directory the Resource Guard is in.
66+
1. Select **Authenticate** to validate your identity and access.
4467
1. After authentication, choose the **Resource Guard** from the list displayed.
4568

46-
1. Click **Save** once done to enable MUA.
69+
1. Select **Save** to enable MUA.
70+
71+
# [Backup vault](#tab/backup-vault)
72+
73+
1. Go to the Backup vault for which you want to configure MUA.
74+
1. On the left panel, select **Properties**.
75+
1. Go to **Multi-User Authorization** and select **Update**.
76+
77+
1. To enable MUA and choose a Resource Guard, perform one of the following actions:
78+
79+
- You can either specify the URI of the Resource Guard. Ensure that you specify the URI of a Resource Guard you have **Reader** access to and it's in the same regions as the vault. You can find the URI (Resource Guard ID) of the Resource Guard on its **Overview** page.
80+
81+
- Or, you can select the Resource Guard from the list of Resource Guards you have **Reader** access to, and those available in the region.
82+
83+
1. Click **Select Resource Guard**.
84+
1. Select the drop-down and select the directory the Resource Guard is in.
85+
1. Select **Authenticate** to validate your identity and access.
86+
1. After authentication, choose the **Resource Guard** from the list displayed.
87+
88+
1. Select **Save** to enable MUA.
89+
90+
---
4791

4892
## Next steps
4993

5094
- [Protected operations using MUA](multi-user-authorization.md?pivots=vaults-recovery-services-vault#protected-operations-using-mua)
51-
- [Authorize critical (protected) operations using Azure AD Privileged Identity Management](multi-user-authorization.md#authorize-critical-protected-operations-using-azure-ad-privileged-identity-management)
95+
- [Authorize critical (protected) operations using Azure Active Directory Privileged Identity Management](multi-user-authorization.md#authorize-critical-protected-operations-using-azure-active-directory-privileged-identity-management)
5296
- [Performing a protected operation after approval](multi-user-authorization.md#performing-a-protected-operation-after-approval)
53-
- [Disable MUA on a Recovery Services vault](multi-user-authorization.md#disable-mua-on-a-recovery-services-vault)
97+
- Disable MUA on a [Recovery Services vault](multi-user-authorization.md?tabs=azure-portal&pivots=vaults-recovery-services-vault#disable-mua-on-a-recovery-services-vault) or a [Backup vault](multi-user-authorization.md?tabs=azure-portal&pivots=vaults-backup-vault#disable-mua-on-a-backup-vault).

articles/backup/index.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ metadata:
1111
ms.topic: landing-page
1212
author: AbhishekMallick-MS
1313
ms.author: v-abhmallick
14-
ms.date: 09/11/2023
14+
ms.date: 09/29/2023
1515

1616
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
1717

@@ -62,6 +62,10 @@ landingContent:
6262
linkLists:
6363
- linkListType: whats-new
6464
links:
65+
- text: Multiple backups per day for Azure VMs
66+
url: backup-azure-vms-enhanced-policy.md
67+
- text: Multi-user authorization for Backup vault
68+
url: multi-user-authorization-concept.md?tabs=backup-vault
6569
- text: Enhanced soft delete
6670
url: backup-azure-enhanced-soft-delete-about.md
6771
- text: Azure Kubernetes Service backup (preview)
62.9 KB
Loading
Binary file not shown.
89.2 KB
Loading

articles/backup/multi-user-authorization-concept.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,17 +2,17 @@
22
title: Multi-user authorization using Resource Guard
33
description: An overview of Multi-user authorization using Resource Guard.
44
ms.topic: conceptual
5-
ms.date: 09/15/2022
5+
ms.date: 09/25/2023
66
ms.service: backup
77
author: AbhishekMallick-MS
88
ms.author: v-abhmallick
99
---
10-
# Multi-user authorization using Resource Guard
10+
# About Multi-user authorization using Resource Guard
1111

1212
Multi-user authorization (MUA) for Azure Backup allows you to add an additional layer of protection to critical operations on your Recovery Services vaults and Backup vaults. For MUA, Azure Backup uses another Azure resource called the Resource Guard to ensure critical operations are performed only with applicable authorization.
1313

1414
>[!Note]
15-
>Multi-user authorization using Resource Guard for Backup vault is in preview.
15+
>Multi-user authorization using Resource Guard for Backup vault is now generally available.
1616
1717
## How does MUA for Backup work?
1818

@@ -41,7 +41,7 @@ Modify protection (reduced retention) | Optional
4141
Stop protection with delete data | Optional
4242
Change MARS security PIN | Optional
4343

44-
# [Backup vault (preview)](#tab/backup-vault)
44+
# [Backup vault](#tab/backup-vault)
4545

4646
**Operation** | **Mandatory/ Optional**
4747
--- | ---
@@ -91,7 +91,7 @@ The following table lists the scenarios for creating your Resource Guard and vau
9191
9292
**Usage scenario** | **Protection due to MUA** | **Ease of implementation** | **Notes**
9393
--- | --- |--- |--- |
94-
Vault and Resource Guard are **in the same subscription.** </br> The Backup admin does't have access to the Resource Guard. | Least isolation between the Backup admin and the Security admin. | Relatively easy to implement since only one subscription is required. | Resource level permissions/ roles need to be ensured are correctly assigned.
94+
Vault and Resource Guard are **in the same subscription.** </br> The Backup admin doesn't have access to the Resource Guard. | Least isolation between the Backup admin and the Security admin. | Relatively easy to implement since only one subscription is required. | Resource level permissions/ roles need to be ensured are correctly assigned.
9595
Vault and Resource Guard are **in different subscriptions but the same tenant.** </br> The Backup admin doesn't have access to the Resource Guard or the corresponding subscription. | Medium isolation between the Backup admin and the Security admin. | Relatively medium ease of implementation since two subscriptions (but a single tenant) are required. | Ensure that that permissions/ roles are correctly assigned for the resource or the subscription.
9696
Vault and Resource Guard are **in different tenants.** </br> The Backup admin doesn't have access to the Resource Guard, the corresponding subscription, or the corresponding tenant.| Maximum isolation between the Backup admin and the Security admin, hence, maximum security. | Relatively difficult to test since requires two tenants or directories to test. | Ensure that permissions/ roles are correctly assigned for the resource, the subscription or the directory.
9797

0 commit comments

Comments
 (0)