|
1 | 1 | ---
|
2 | 2 | title: Quickstart - Multi-user authorization using Resource Guard
|
3 | 3 | description: In this quickstart, learn how to use Multi-user authorization to protect against unauthorized operation.
|
4 |
| -ms.topic: tutorial |
5 |
| -ms.date: 05/05/2022 |
| 4 | +ms.topic: quickstart |
| 5 | +ms.date: 09/25/2023 |
6 | 6 | ms.service: backup
|
7 | 7 | author: AbhishekMallick-MS
|
8 | 8 | ms.author: v-abhmallick
|
9 | 9 | ---
|
10 | 10 |
|
11 |
| -# Quickstart: Enable protection using Multi-user authorization on Recovery Services vault in Azure Backup |
12 |
| - |
13 |
| -Multi-user authorization (MUA) for Azure Backup allows you to add an additional layer of protection to critical operations on your Recovery Services vaults. For MUA, Azure Backup uses another Azure resource called the Resource Guard to ensure critical operations are performed only with applicable authorization. Learn about [MUA concepts](multi-user-authorization-concept.md). |
| 11 | +# Quickstart: Enable protection using Multi-user authorization in Azure Backup |
14 | 12 |
|
15 | 13 | This quickstart describes how to enable Multi-user authorization (MUA) for Azure Backup.
|
16 | 14 |
|
| 15 | +Multi-user authorization (MUA) for Azure Backup allows you to add an additional layer of protection to critical operations on your Recovery Services vaults and Backup vaults. For MUA, Azure Backup uses another Azure resource called the Resource Guard to ensure critical operations are performed only with applicable authorization. |
| 16 | + |
| 17 | +>[!Note] |
| 18 | +>MUA is now generally available for both Recovery Services vaults and Backup vaults. |
| 19 | +
|
| 20 | +Learn about [MUA concepts](multi-user-authorization-concept.md). |
| 21 | + |
17 | 22 | ## Prerequisites
|
18 | 23 |
|
19 | 24 | Before you start:
|
20 | 25 |
|
| 26 | +**Choose a vault** |
| 27 | + |
| 28 | +# [Recovery Services vault](#tab/recovery-services-vault) |
| 29 | + |
21 | 30 | - Ensure the Resource Guard and the Recovery Services vault are in the same Azure region.
|
22 | 31 | - Ensure the Backup admin does **not** have **Contributor** permissions on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
|
23 | 32 | - Ensure that your subscriptions containing the Recovery Services vault as well as the Resource Guard (in different subscriptions or tenants) are registered to use the **Microsoft.RecoveryServices** provider. For more details, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider-1).
|
24 | 33 | - Ensure that you [create a Resource Guard](multi-user-authorization.md#create-a-resource-guard) in a different subsctiption/tenant as that of the vault located in the same region.
|
25 | 34 | - Ensure to [assign permissions to the Backup admin on the Resource Guard to enable MUA](multi-user-authorization.md#assign-permissions-to-the-backup-admin-on-the-resource-guard-to-enable-mua).
|
26 | 35 |
|
| 36 | +# [Backup vault](#tab/backup-vault) |
| 37 | + |
| 38 | +- Ensure the Resource Guard and the Backup vault are in the same Azure region. |
| 39 | +- Ensure the Backup admin does **not** have **Contributor** permissions on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation. |
| 40 | +- Ensure that your subscriptions contain the Backup vault as well as the Resource Guard (in different subscriptions or tenants) are registered to use the provider - **Microsoft.DataProtection**4. For more information, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider-1). |
| 41 | + |
| 42 | +--- |
| 43 | + |
27 | 44 | ## Enable MUA
|
28 | 45 |
|
29 |
| -The Backup admin now has the Reader role on the Resource Guard and can easily enable multi-user authorization on vaults managed by them. |
| 46 | +Once the Backup admin has the Reader role on the Resource Guard, they can enable multi-user authorization on vaults managed by following these steps: |
| 47 | + |
| 48 | +**Choose a vault** |
30 | 49 |
|
31 |
| -Follow these steps: |
| 50 | +# [Recovery Services vault](#tab/recovery-services-vault) |
32 | 51 |
|
33 |
| -1. Go to the Recovery Services vault. |
34 |
| -1. Go to **Properties** on the left navigation panel, then to **Multi-User Authorization** and click **Update**. |
35 |
| -1. The option to enable MUA appears. Choose a Resource Guard using one of the following ways: |
| 52 | +1. Go to the Recovery Services vault for which you want to configure MUA. |
36 | 53 |
|
37 |
| - 1. You can either specify the URI of the Resource Guard, make sure you specify the URI of a Resource Guard you have **Reader** access to and that is the same regions as the vault. You can find the URI (Resource Guard ID) of the Resource Guard in its **Overview** screen: |
| 54 | +1. On the left pane, select **Properties**. |
38 | 55 |
|
39 |
| - 1. Or, you can select the Resource Guard from the list of Resource Guards you have **Reader** access to, and those available in the region. |
| 56 | +1. Go to **Multi-User Authorization** and select **Update**. |
| 57 | + |
| 58 | +1. To enable MUA and choose a Resource Guard, perform one of the following actions: |
| 59 | + |
| 60 | + - You can either specify the URI of the Resource Guard, make sure you specify the URI of a Resource Guard you have **Reader** access to and that is the same regions as the vault. You can find the URI (Resource Guard ID) of the Resource Guard in its **Overview** screen: |
| 61 | + |
| 62 | + - Or, you can select the Resource Guard from the list of Resource Guards you have **Reader** access to, and those available in the region. |
40 | 63 |
|
41 | 64 | 1. Click **Select Resource Guard**
|
42 |
| - 1. Click on the dropdown and select the directory the Resource Guard is in. |
43 |
| - 1. Click **Authenticate** to validate your identity and access. |
| 65 | + 1. Select the dropdown list and choose the directory the Resource Guard is in. |
| 66 | + 1. Select **Authenticate** to validate your identity and access. |
44 | 67 | 1. After authentication, choose the **Resource Guard** from the list displayed.
|
45 | 68 |
|
46 |
| -1. Click **Save** once done to enable MUA. |
| 69 | +1. Select **Save** to enable MUA. |
| 70 | + |
| 71 | +# [Backup vault](#tab/backup-vault) |
| 72 | + |
| 73 | +1. Go to the Backup vault for which you want to configure MUA. |
| 74 | +1. On the left panel, select **Properties**. |
| 75 | +1. Go to **Multi-User Authorization** and select **Update**. |
| 76 | + |
| 77 | +1. To enable MUA and choose a Resource Guard, perform one of the following actions: |
| 78 | + |
| 79 | + - You can either specify the URI of the Resource Guard. Ensure that you specify the URI of a Resource Guard you have **Reader** access to and it's in the same regions as the vault. You can find the URI (Resource Guard ID) of the Resource Guard on its **Overview** page. |
| 80 | + |
| 81 | + - Or, you can select the Resource Guard from the list of Resource Guards you have **Reader** access to, and those available in the region. |
| 82 | + |
| 83 | + 1. Click **Select Resource Guard**. |
| 84 | + 1. Select the drop-down and select the directory the Resource Guard is in. |
| 85 | + 1. Select **Authenticate** to validate your identity and access. |
| 86 | + 1. After authentication, choose the **Resource Guard** from the list displayed. |
| 87 | + |
| 88 | +1. Select **Save** to enable MUA. |
| 89 | + |
| 90 | +--- |
47 | 91 |
|
48 | 92 | ## Next steps
|
49 | 93 |
|
50 | 94 | - [Protected operations using MUA](multi-user-authorization.md?pivots=vaults-recovery-services-vault#protected-operations-using-mua)
|
51 |
| -- [Authorize critical (protected) operations using Azure AD Privileged Identity Management](multi-user-authorization.md#authorize-critical-protected-operations-using-azure-ad-privileged-identity-management) |
| 95 | +- [Authorize critical (protected) operations using Azure Active Directory Privileged Identity Management](multi-user-authorization.md#authorize-critical-protected-operations-using-azure-active-directory-privileged-identity-management) |
52 | 96 | - [Performing a protected operation after approval](multi-user-authorization.md#performing-a-protected-operation-after-approval)
|
53 |
| -- [Disable MUA on a Recovery Services vault](multi-user-authorization.md#disable-mua-on-a-recovery-services-vault) |
| 97 | +- Disable MUA on a [Recovery Services vault](multi-user-authorization.md?tabs=azure-portal&pivots=vaults-recovery-services-vault#disable-mua-on-a-recovery-services-vault) or a [Backup vault](multi-user-authorization.md?tabs=azure-portal&pivots=vaults-backup-vault#disable-mua-on-a-backup-vault). |
0 commit comments