Skip to content

Commit c162da9

Browse files
Immutable vault - Disable procedure updates
1 parent 4728c33 commit c162da9

1 file changed

Lines changed: 16 additions & 7 deletions

File tree

articles/backup/multi-user-authorization.md

Lines changed: 16 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Configure Multi-user authorization using Resource Guard
33
description: This article explains how to configure Multi-user authorization using Resource Guard.
44
ms.topic: how-to
55
zone_pivot_groups: backup-vaults-recovery-services-vault-backup-vault
6-
ms.date: 11/21/2025
6+
ms.date: 12/30/2025
77
ms.service: azure-backup
88
ms.custom: devx-track-azurepowershell, devx-track-azurecli
99
author: AbhishekMallick-MS
@@ -240,14 +240,23 @@ Once you have enabled MUA, the operations in scope will be restricted on the vau
240240
>[!NOTE]
241241
>We highly recommend that you test your setup after enabling MUA to ensure that protected operations are blocked as expected and to ensure that MUA is correctly configured.
242242
243-
Depicted below is an illustration of what happens when the Backup admin tries to perform such a protected operation (For example, disabling soft delete is depicted here. Other protected operations have a similar experience). The following steps are performed by a Backup admin without required permissions.
243+
Depicted below is an illustration of what happens when the Backup admin tries to perform such a protected operation (For example, disabling immutability is depicted here. Other protected operations have a similar experience). The following steps are performed by a Backup admin without required permissions.
244244

245-
1. To disable soft delete, go to the Recovery Services vault > **Properties** > **Security Settings** and select **Update**, which brings up the Security Settings.
246-
1. Disable the soft delete using the slider. You're informed that this is a protected operation, and you need to verify their access to the Resource Guard.
247-
1. Select the directory containing the Resource Guard and Authenticate yourself. This step may not be required if the Resource Guard is in the same directory as the vault.
248-
1. Proceed to select **Save**. The request fails with an error informing them about not having sufficient permissions on the Resource Guard to let you perform this operation.
245+
To disable immutability, follow these steps:
249246

250-
:::image type="content" source="./media/multi-user-authorization/test-vault-properties-security-settings-inline.png" alt-text="Screenshot showing the Test Vault properties security settings." lightbox="./media/multi-user-authorization/test-vault-properties-security-settings-expanded.png":::
247+
1. Go to the **Recovery Services vault** > **Properties**.
248+
1. On the **Properties** pane, under **Immutable vault**, select **Settings**.
249+
1. On the **Immutable Vault** pane, disable Immutability by clearing the **Enable vault immutability** checkbox.
250+
251+
You're informed that this is a protected operation, and you need to verify their access to the Resource Guard.
252+
1. Select the directory containing the Resource Guard and Authenticate yourself.
253+
254+
>[!Note]
255+
>This action isn't required if the Resource Guard is in the same directory as the vault.
256+
257+
1. Select **Apply**.
258+
259+
The request fails with an error you don't have sufficient permissions on the Resource Guard to perform this operation.
251260

252261
<a name='authorize-critical-protected-operations-using-azure-active-directory-privileged-identity-management'></a>
253262

0 commit comments

Comments
 (0)