Role and Permission Requirements for Protecting Azure Resources with Commvault

For most Azure resources, Commvault provides a custom role that includes the permissions that are required to protect the resources. In non-production environments, you can use Azure built-in roles instead. For VMs encrypted with Azure Key Vault, you can use a custom role or an access policy, but access policies are less secure and are considered by Microsoft to be a legacy authorization system.

If there is no custom role for an Azure resource that you want to protect, you can create your own custom role.

For instructions to assign roles, see Assign Azure roles using the Azure portal.

Custom Roles

Important

In the JSON file, change placeholder values such as {subscription-id}.

Azure resources

Custom role for Azure Portal

Custom role for Azure CLI

  • Azure Cosmos DB for Cassandra, MongoDB, NoSQL, and Table

  • Azure Database for MariaDB, MySQL, and PostgreSQL

  • Azure SQL Database

  • Azure SQL Managed Instance

  • Azure Table Storage

AzureDBBackupRole.json

AzureDBBackupRole_CLI.json

Azure VM, encrypted and unencrypted

CVBackupRole-Encryption.json

CVBackupRole-Encryption_CLI.json

Azure VM, unencrypted

CVBackupRole.json

CVBackupRole_CLI.json

  • Azure Blob Storage

  • Azure Data Lake Storage Gen2

AzureBlobADLSGen2BackupRole.json

None

Azure File Storage

AzureFileBackupRole.json

None

Built-In Roles

Azure resources Roles to assign to the subscription Roles to assign to the storage account
  • Azure Cosmos DB for Cassandra, MongoDB, NoSQL, and Table
  • Azure Database for MariaDB, MySQL, and PostgreSQL

  • Contributor
  • Blob Storage Contributor
None
  • Azure SQL Database
  • Azure SQL Managed Instance
  • SQL Server Contributor
  • SQL Managed Instance Contributor
  • Blob Storage Contributor
None
Azure VMs, encrypted None None
Azure VMs, unencrypted
  • Contributor
  • Storage Blob Data Contributor
None
  • Azure Blob Storage
  • Azure Data Lake Storage Gen2
  • Storage Blob Data Owner
  • Reader
None
Azure File Storage Storage Account Contributor
  • Storage Blob Data Contributor
  • Storage File Data Privileged Contributor

Permissions for Azure Key Vault Access Policies

For Azure VMs that are encrypted with Key Vault, instead of using a custom role that you assign to your Azure Key Vault application, you can assign an access policy to the Azure VM or the Azure Key Vault application that functions as your service principal.

For instructions to assign an access policy, see Assign a Key Vault access policy (legacy).

When you assign the access policy, for Key permissions and Secret permissions, select the following permissions:

  • Get

  • Recover

  • Backup

  • Restore

Note

The Commvault Cloud software does not support VMs that are encrypted with Azure Key Vault for managing certificates.

Loading...