Skip to content

Commit f15158b

Browse files
modified alt-text
1 parent 269b054 commit f15158b

File tree

1 file changed

+17
-17
lines changed

1 file changed

+17
-17
lines changed

articles/backup/multi-user-authentication.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -110,14 +110,14 @@ For the following example, create the Resource Guard in a tenant different from
110110

111111
1. Search for **Resource Guards** in the search bar and select the corresponding item from the drop-down.
112112

113-
:::image type="content" source="./media/multi-user-authentication/resource-guards-preview-inline.png" alt-text="Resource guards preview." lightbox="./media/multi-user-authentication/resource-guards-preview-expanded.png":::
113+
:::image type="content" source="./media/multi-user-authentication/resource-guards-preview-inline.png" alt-text="Screenshot showing resource guards in preview." lightbox="./media/multi-user-authentication/resource-guards-preview-expanded.png":::
114114

115115
- Click **Create** to start creating a Resource Guard.
116116
- In the create blade, fill in the required details for this Resource Guard.
117117
- Make sure the Resource Guard is in the same Azure regions as the Recovery Services vault.
118118
- Also, it is helpful to add a description of how to get or request access to perform actions on associated vaults when needed. This description would also appear in the associated vaults to guide the backup admin on getting the required permissions. You can edit the description later if needed, but having a well-defined description at all times is encouraged.
119119

120-
:::image type="content" source="./media/multi-user-authentication/create-resource-guard.png" alt-text="Create resource guard.":::
120+
:::image type="content" source="./media/multi-user-authentication/create-resource-guard.png" alt-text="Screenshot showing to create resource guard.":::
121121

122122
1. Optionally, add any tags to the Resource Guard as per the requirements
123123
1. Click **Review + Create**
@@ -132,25 +132,25 @@ Choose the operations you want to protect using the Resource Guard out of all su
132132
3. Optionally, you can also update the description for the Resource Guard using this blade.
133133
4. Click **Save**.
134134

135-
:::image type="content" source="./media/multi-user-authentication/demo-resource-guard-properties.png" alt-text="Demo resource guard properties.":::
135+
:::image type="content" source="./media/multi-user-authentication/demo-resource-guard-properties.png" alt-text="Screenshot showing demo resource guard properties.":::
136136

137137
## Assign permissions to the Backup admin on the Resource Guard to enable MUA
138138

139139
To enable MUA on a vault, the admin of the vault must have **Reader** role on the Resource Guard or subscription containing the Resource Guard. To assign the **Reader** role on the Resource Guard:
140140

141141
1. In the Resource Guard created above, navigate to the Access Control (IAM) blade, and then go to **Add role assignment**.
142142

143-
:::image type="content" source="./media/multi-user-authentication/demo-resource-guard-access-control.png" alt-text="Demo resource guard-access control.":::
143+
:::image type="content" source="./media/multi-user-authentication/demo-resource-guard-access-control.png" alt-text="Screenshot showing demo resource guard-access control.":::
144144

145145
1. Select **Reader** from the list of built-in roles and click **Next** on the bottom of the screen.
146146

147-
:::image type="content" source="./media/multi-user-authentication/demo-resource-guard-add-role-assignment-inline.png" alt-text="Demo resource guard-add role assignment." lightbox="./media/multi-user-authentication/demo-resource-guard-add-role-assignment-expanded.png":::
147+
:::image type="content" source="./media/multi-user-authentication/demo-resource-guard-add-role-assignment-inline.png" alt-text="Screenshot showing demo resource guard-add role assignment." lightbox="./media/multi-user-authentication/demo-resource-guard-add-role-assignment-expanded.png":::
148148

149149
1. Click **Select members** and add the Backup admin’s email ID to add them as the **Reader**. Since the Backup admin is in another tenant in this case, they will be added as guests to the tenant containing the Resource Guard.
150150

151151
1. Click **Select** and then proceed to **Review + assign** to complete the role assignment.
152152

153-
:::image type="content" source="./media/multi-user-authentication/demo-resource-guard-select-members-inline.png" alt-text="Demo resource guard-select members." lightbox="./media/multi-user-authentication/demo-resource-guard-select-members-expanded.png":::
153+
:::image type="content" source="./media/multi-user-authentication/demo-resource-guard-select-members-inline.png" alt-text="Screenshot showing demo resource guard-select members." lightbox="./media/multi-user-authentication/demo-resource-guard-select-members-expanded.png":::
154154

155155
## Enable MUA on a Recovery Services vault
156156

@@ -165,7 +165,7 @@ Now that the Backup admin has the Reader role on the Resource Guard, they can ea
165165

166166
1. You can either specify the URI of the Resource Guard, make sure you specify the URI of a Resource Guard you have **Reader** access to and that is the same regions as the vault. You can find the URI (Resource Guard ID) of the Resource Guard in its **Overview** screen:
167167

168-
:::image type="content" source="./media/multi-user-authentication/resource-guard-rg-inline.png" alt-text="Resource Guard." lightbox="./media/multi-user-authentication/resource-guard-rg-expanded.png":::
168+
:::image type="content" source="./media/multi-user-authentication/resource-guard-rg-inline.png" alt-text="Screenshot showing the Resource Guard." lightbox="./media/multi-user-authentication/resource-guard-rg-expanded.png":::
169169

170170
1. Or you can select the Resource Guard from the list of Resource Guards you have **Reader** access to, and those available in the region.
171171

@@ -174,11 +174,11 @@ Now that the Backup admin has the Reader role on the Resource Guard, they can ea
174174
1. Click **Authenticate** to validate your identity and access.
175175
1. After authentication, choose the **Resource Guard** from the list displayed.
176176

177-
:::image type="content" source="./media/multi-user-authentication/testvault1-multi-user-authorization-inline.png" alt-text="Multi user authorization" lightbox="./media/multi-user-authentication/testvault1-multi-user-authorization-expanded.png" :::
177+
:::image type="content" source="./media/multi-user-authentication/testvault1-multi-user-authorization-inline.png" alt-text="Screenshot showing multi-user authorization." lightbox="./media/multi-user-authentication/testvault1-multi-user-authorization-expanded.png" :::
178178

179179
1. Click **Save** once done to enable MUA
180180

181-
:::image type="content" source="./media/multi-user-authentication/testvault1-enable-mua.png" alt-text="Enable MUA.":::
181+
:::image type="content" source="./media/multi-user-authentication/testvault1-enable-mua.png" alt-text="Screenshot showing how to enable Multi-user authentication.":::
182182

183183
## Protect against unauthorized (protected) operations
184184

@@ -194,7 +194,7 @@ Depicted below is an illustration of what happens when the Backup admin tries to
194194
1. Select the directory containing the Resource Guard and Authenticate yourself. This step may not be required if the Resource Guard is in the same directory as the vault.
195195
1. Proceed to click **Save**. The request fails with an error informing them about not having sufficient permissions on the Resource Guard to let you perform this operation.
196196

197-
:::image type="content" source="./media/multi-user-authentication/testvault-properties-security-settings-inline.png" alt-text="TestVault1 properties-security settings." lightbox="./media/multi-user-authentication/testvault-properties-security-settings-expanded.png":::
197+
:::image type="content" source="./media/multi-user-authentication/testvault-properties-security-settings-inline.png" alt-text="Screenshot showing the TestVault1 properties-security settings." lightbox="./media/multi-user-authentication/testvault-properties-security-settings-expanded.png":::
198198

199199

200200
## Authorize critical (protected) operations using Azure AD Privileged Identity Management
@@ -222,14 +222,14 @@ Using PIM, the Security admin can create an eligible assignment for the Backup a
222222
1. Go to Select members and add the username (or email IDs) of the Backup admin
223223
1. Click Next
224224

225-
:::image type="content" source="./media/multi-user-authentication/addassignments-membership.png" alt-text="Add assignments-membership.":::
225+
:::image type="content" source="./media/multi-user-authentication/addassignments-membership.png" alt-text="Screenshot showing how to add assignments-membership.":::
226226

227227
1. In the next screen
228228
1. Under assignment type, choose **Eligible**.
229229
1. Specify the duration for which the eligible permission is valid.
230230
1. Click **Assign** to finish creating the eligible assignment.
231231

232-
:::image type="content" source="./media/multi-user-authentication/addassignments-setting.png" alt-text="Add assignments-setting.":::
232+
:::image type="content" source="./media/multi-user-authentication/addassignments-setting.png" alt-text="Screenshot showing how to add assignments-setting.":::
233233

234234
### Set up approvers for activating Contributor role
235235

@@ -240,13 +240,13 @@ Note if this is not configured, any requests will be automatically approved with
240240

241241
1. Go to **Settings** and then navigate to the **Contributor** role.
242242

243-
:::image type="content" source="./media/multi-user-authentication/addcontributor.png" alt-text="Add contributor.":::
243+
:::image type="content" source="./media/multi-user-authentication/addcontributor.png" alt-text="Screenshot showing how to add contributor.":::
244244

245245
1. If the setting named **Approvers** shows None or displays incorrect approvers, click **Edit** to add the reviewers who would need to review and approve the activation request for the Contributor role.
246246

247247
1. In the **Activation** tab, select **Require approval to activate** and add the approver(s) who need to approve each request. You can also select other security options like using MFA and mandating ticket options to activate the Contributor role. Optionally, select relevant settings in the **Assignment** and **Notification** tabs as per your requirements.
248248

249-
:::image type="content" source="./media/multi-user-authentication/edit-role-settings.png" alt-text="Edit role setting.":::
249+
:::image type="content" source="./media/multi-user-authentication/edit-role-settings.png" alt-text="Screenshot showing how to edit role setting.":::
250250

251251
1. Click **Update** once done.
252252

@@ -259,7 +259,7 @@ After the security admin creates an eligible assignment, the Backup admin needs
259259
1. The Backup admin can see an Eligible assignment for the contributor role. Click **Activate** to activate it.
260260
1. The Backup admin is informed via portal notification that the request is sent for approval.
261261

262-
:::image type="content" source="./media/multi-user-authentication/identity-management-myroles-inline.png" alt-text="Activate eligible assignments." lightbox="./media/multi-user-authentication/identity-management-myroles-expanded.png":::
262+
:::image type="content" source="./media/multi-user-authentication/identity-management-myroles-inline.png" alt-text="Screenshot showing to activate eligible assignments." lightbox="./media/multi-user-authentication/identity-management-myroles-expanded.png":::
263263

264264
### Approve activation of requests to perform critical operations
265265

@@ -280,7 +280,7 @@ Once the Backup admin’s request for the Contributor role on the Resource Guard
280280
281281
Following screenshot shows an example of disabling soft delete for an MUA-enabled vault.
282282

283-
:::image type="content" source="./media/multi-user-authentication/disable-soft-delete-inline.png" alt-text="Disable soft delete." lightbox="./media/multi-user-authentication/disable-soft-delete-expanded.png":::
283+
:::image type="content" source="./media/multi-user-authentication/disable-soft-delete-inline.png" alt-text="Screenshot showing to disable soft delete." lightbox="./media/multi-user-authentication/disable-soft-delete-expanded.png":::
284284

285285

286286
## Disable MUA on a Recovery Services vault
@@ -294,4 +294,4 @@ Disabling MUA is a protected operation, and hence, is protected using MUA. This
294294
1. Choose the Directory that contains the Resource Guard and verify access using the Authenticate button (if applicable).
295295
1. After **authentication**, click **Save**. With the right access, the request should be successfully completed.
296296

297-
:::image type="content" source="./media/multi-user-authentication/disable-mua.png" alt-text="Disable MUA.":::
297+
:::image type="content" source="./media/multi-user-authentication/disable-mua.png" alt-text="Screenshot showing to disable multi-user authentication.":::

0 commit comments

Comments
 (0)