Configure Multi-user authorization using Resource Guard in Azure Backup
This article describes how to configure Multi-user authorization (MUA) for Azure Backup to add an additional layer of protection to critical operations on your Recovery Services vaults
This document includes the following:
- Before you start
- Testing scenarios
- Create a Resource Guard
- Enable MUA on a Recovery Services vault
- Protect against unauthorized operations on a vault
- Authorize critical operations on a vault
- Disable MUA on a Recovery Services vault
Note
Multi-user authorization for Azure Backup is available in all public Azure regions.
Before you start
- Ensure the Resource Guard and the Recovery Services vault are in the same Azure region.
- Ensure the Backup admin does not have Contributor permissions on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
- Ensure that your subscriptions containing the Recovery Services vault as well as the Resource Guard (in different subscriptions or tenants) are registered to use the providers - Microsoft.RecoveryServices and Microsoft.DataProtection . For more details, see Azure resource providers and types.
Learn about various MUA usage scenarios.
Create a Resource Guard
The Security admin creates the Resource Guard. We recommend that you create it in a different subscription or a different tenant as the vault. However, it should be in the same region as the vault. The Backup admin must NOT have contributor access on the Resource Guard or the subscription that contains it.
For the following example, create the Resource Guard in a tenant different from the vault tenant.
In the Azure portal, go to the directory under which you wish to create the Resource Guard.
Search for Resource Guards in the search bar and select the corresponding item from the drop-down.
- Click Create to start creating a Resource Guard.
- In the create blade, fill in the required details for this Resource Guard.
- Make sure the Resource Guard is in the same Azure regions as the Recovery Services vault.
- Also, it is helpful to add a description of how to get or request access to perform actions on associated vaults when needed. This description would also appear in the associated vaults to guide the backup admin on getting the required permissions. You can edit the description later if needed, but having a well-defined description at all times is encouraged.
On the Protected operations tab, select the operations you need to protect using this resource guard.
You can also select the operations to be protected after creating the resource guard.
Optionally, add any tags to the Resource Guard as per the requirements
Click Review + Create.
Follow notifications for status and successful creation of the Resource Guard.
Select operations to protect using Resource Guard
Choose the operations you want to protect using the Resource Guard out of all supported critical operations. By default, all supported critical operations are enabled. However, you can exempt certain operations from falling under the purview of MUA using Resource Guard. The security admin can perform the following steps:
In the Resource Guard created above, go to Properties.
Select Disable for operations that you wish to exclude from being authorized using the Resource Guard. Note that the operations Disable soft delete and Remove MUA protection cannot be disabled.
Optionally, you can also update the description for the Resource Guard using this blade.
Click Save.
Assign permissions to the Backup admin on the Resource Guard to enable MUA
To enable MUA on a vault, the admin of the vault must have Reader role on the Resource Guard or subscription containing the Resource Guard. To assign the Reader role on the Resource Guard:
In the Resource Guard created above, go to the Access Control (IAM) blade, and then go to Add role assignment.
Select Reader from the list of built-in roles and click Next on the bottom of the screen.
Click Select members and add the Backup admin’s email ID to add them as the Reader. Since the Backup admin is in another tenant in this case, they will be added as guests to the tenant containing the Resource Guard.
Click Select and then proceed to Review + assign to complete the role assignment.
Enable MUA on a Recovery Services vault
Now that the Backup admin has the Reader role on the Resource Guard, they can easily enable multi-user authorization on vaults managed by them. The following steps are performed by the Backup admin.
Go to the Recovery Services vault. Go to Properties on the left navigation panel, then to Multi-User Authorization and click Update.
Now you are presented with the option to enable MUA and choose a Resource Guard using one of the following ways:
You can either specify the URI of the Resource Guard, make sure you specify the URI of a Resource Guard you have Reader access to and that is the same regions as the vault. You can find the URI (Resource Guard ID) of the Resource Guard in its Overview screen:
Or you can select the Resource Guard from the list of Resource Guards you have Reader access to, and those available in the region.
- Click Select Resource Guard
- Click on the dropdown and select the directory the Resource Guard is in.
- Click Authenticate to validate your identity and access.
- After authentication, choose the Resource Guard from the list displayed.
Click Save once done to enable MUA
Protect against unauthorized (protected) operations
Once you have enabled MUA, the operations in scope will be restricted on the vault, if the Backup admin tries to perform them without having the required role (i.e., Contributor role) on the Resource Guard.
Note
It is highly recommended that you test your setup after enabling MUA to ensure that protected operations are blocked as expected and to ensure that MUA is correctly configured.
Depicted below is an illustration of what happens when the Backup admin tries to perform such a protected operation (For example, disabling soft delete is depicted here. Other protected operations have a similar experience). The following steps are performed by a Backup admin without required permissions.
To disable soft delete, go to the Recovery Services Vault > Properties > Security Settings and click Update, which brings up the Security Settings.
Disable the soft delete using the slider. You are informed that this is a protected operation, and you need to verify their access to the Resource Guard.
Select the directory containing the Resource Guard and Authenticate yourself. This step may not be required if the Resource Guard is in the same directory as the vault.
Proceed to click Save. The request fails with an error informing them about not having sufficient permissions on the Resource Guard to let you perform this operation.
Authorize critical (protected) operations using Azure AD Privileged Identity Management
The following sub-sections discuss authorizing these requests using PIM. There are cases where you may need to perform critical operations on your backups and MUA can help you ensure that these are performed only when the right approvals or permissions exist. As discussed earlier, the Backup admin needs to have a Contributor role on the Resource Guard to perform critical operations that are in the Resource Guard scope. One of the ways to allow just-in-time for such operations is through the use of Azure Active Directory (Azure AD) Privileged Identity Management.
Note
Though using Azure AD PIM is the recommended approach, you can use manual or custom methods to manage access for the Backup admin on the Resource Guard. For managing access to the Resource Guard manually, use the ‘Access control (IAM)’ setting on the left navigation bar of the Resource Guard and grant the Contributor role to the Backup admin.
Create an eligible assignment for the Backup admin (if using Azure AD Privileged Identity Management)
The Security admin can use PIM to create an eligible assignment for the Backup admin as a Contributor to the Resource Guard. This enables the Backup admin to raise a request (for the Contributor role) when they need to perform a protected operation. To do so, the security admin performs the following:
In the security tenant (which contains the Resource Guard), go to Privileged Identity Management (search for this in the search bar in the Azure portal) and then go to Azure Resources (under Manage on the left menu).
Select the resource (the Resource Guard or the containing subscription/RG) to which you want to assign the Contributor role.
- If you don’t see the corresponding resource in the list of resources, ensure you add the containing subscription to be managed by PIM.
In the selected resource, go to Assignments (under Manage on the left menu) and go to Add assignments.
In the Add assignments
- Select the role as Contributor.
- Go to Select members and add the username (or email IDs) of the Backup admin
- Click Next
In the next screen
- Under assignment type, choose Eligible.
- Specify the duration for which the eligible permission is valid.
- Click Assign to finish creating the eligible assignment.
Set up approvers for activating Contributor role
By default, the setup above may not have an approver (and an approval flow requirement) configured in PIM. To ensure that approvers are required for allowing only authorized requests to go through, the security admin must perform the following steps. Note if this is not configured, any requests will be automatically approved without going through the security admins or a designated approver’s review. More details on this can be found here
In Azure AD PIM, select Azure Resources on the left navigation bar and select your Resource Guard.
Go to Settings and then go to the Contributor role.
If the setting named Approvers shows None or displays incorrect approvers, click Edit to add the reviewers who would need to review and approve the activation request for the Contributor role.
In the Activation tab, select Require approval to activate and add the approver(s) who need to approve each request. You can also select other security options like using MFA and mandating ticket options to activate the Contributor role. Optionally, select relevant settings in the Assignment and Notification tabs as per your requirements.
Click Update once done.
Request activation of an eligible assignment to perform critical operations
After the security admin creates an eligible assignment, the Backup admin needs to activate the assignment for the Contributor role to be able to perform protected actions. The following actions are performed by the Backup admin to activate the role assignment.
Go to Azure AD Privileged Identity Management. If the Resource Guard is in another directory, switch to that directory and then go to Azure AD Privileged Identity Management.
Go to My roles > Azure resources on the left menu.
The Backup admin can see an Eligible assignment for the contributor role. Click Activate to activate it.
The Backup admin is informed via portal notification that the request is sent for approval.
Approve activation of requests to perform critical operations
Once the Backup admin raises a request for activating the Contributor role, the request is to be reviewed and approved by the security admin.
- In the security tenant, go to Azure AD Privileged Identity Management.
- Go to Approve Requests.
- Under Azure resources, the request raised by the Backup admin requesting activation as a Contributor can be seen.
- Review the request. If genuine, select the request and click Approve to approve it.
- The Backup admin is informed by email (or other organizational alerting mechanisms) that their request is now approved.
- Once approved, the Backup admin can perform protected operations for the requested period.
Performing a protected operation after approval
Once the Backup admin’s request for the Contributor role on the Resource Guard is approved, they can perform protected operations on the associated vault. If the Resource Guard is in another directory, the Backup admin would need to authenticate themselves.
Note
If the access was assigned using a JIT mechanism, the Contributor role is retracted at the end of the approved period. Else, the Security admin manually removes the Contributor role assigned to the Backup admin to perform the critical operation.
The following screenshot shows an example of disabling soft delete for an MUA-enabled vault.
Disable MUA on a Recovery Services vault
Disabling MUA is a protected operation, and hence, is protected using MUA. This means that the Backup admin must have the required Contributor role in the Resource Guard. Details on obtaining this role are described here. Following is a summary of steps to disable MUA on a vault.
The Backup admin requests the Security admin for Contributor role on the Resource Guard. They can request this to use the methods approved by the organization such as JIT procedures, like Azure AD Privileged Identity Management, or other internal tools and procedures.
The Security admin approves the request (if they find it worthy of being approved) and informs the Backup admin. Now the Backup admin has the ‘Contributor’ role on the Resource Guard.
The Backup admin goes to the vault -> Properties -> Multi-user Authorization.
Click Update
- Uncheck the Protect with Resource Guard check box
- Choose the Directory that contains the Resource Guard and verify access using the Authenticate button (if applicable).
- After authentication, click Save. With the right access, the request should be successfully completed.
Povratne informacije
Pošalјite i prikažite povratne informacije za