외부 ID로 인증된 사용자만 외부 ID를 위한 URL에 액세스할 수 있습니다. 사용자가 로그인하지 않은 상태에서 외부 ID의 URL을 방문하면 먼저 직원 풀 공급업체 이름을 지정하는 인증 포털로 리디렉션된 후에, 그런 다음 로그인을 위해 ID 공급업체로 리디렉션되고 마지막으로 관리 콘솔로 리디렉션됩니다.
직원 ID 제휴 사용자는 Google 관리 사용자가 공유한 URL을 사용하여 관리 콘솔에 직접 액세스할 수 없습니다. 직원 ID 제휴 사용자로 관리 콘솔에 액세스하려면 링크를 직원 ID 제휴 사용자의 URL로 수동으로 업데이트합니다.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-09-04(UTC)"],[[["\u003cp\u003eThis page details the process of configuring user access to Backup and DR Service using workforce identity federation, which allows users from external identity providers to access Google Cloud services.\u003c/p\u003e\n"],["\u003cp\u003eWorkforce identity federation users can access both the Backup and DR Service within the Google Cloud console and the management console.\u003c/p\u003e\n"],["\u003cp\u003eTo enable Backup and DR Service using a workforce identity federation, you must contact Cloud Customer Care to set up this configuration.\u003c/p\u003e\n"],["\u003cp\u003eAccessing the management console differs for workforce identity federation users, who must use a specific URL designated for external identities and may need to manually update the link to correctly access it.\u003c/p\u003e\n"],["\u003cp\u003eIAM roles need to be granted to workforce identity federation users, allowing them to access the Backup and DR Service, as well as the management console, similar to how roles are granted to Google Account users.\u003c/p\u003e\n"]]],[],null,["# Access Backup and DR Service with workforce identity federation\n\nThis page describes how to configure user access for Backup and DR Service with\nworkforce identity federation. Contact Cloud Customer Care to enable\nBackup and DR Service using a workforce identity federation.\n\n[Workforce identity federation](/iam/docs/workforce-identity-federation) lets\nyou use an external identity provider (IdP) to authenticate and authorize a\nworkforce---a group of *users*, such as employees, partners, and\ncontractors---using IAM, so that the users can access Google Cloud services.\n\nIf workforce identity federation is configured in your project, users in your\nworkforce can access the following:\n\n- Backup and DR Service in [Google Cloud console](https://console.cloud.google)\n- Management console\n\nSet up access to Backup and DR Service with workforce identity federation\n-------------------------------------------------------------------------\n\nThis section describes how to configure access for workforce identity\nfederation users to Backup and DR Service.\n\n### Configure your identity provider\n\nUse the [Configure workforce identity federation](/iam/docs/configuring-workforce-identity-federation#configure_workforce_identity_federation)\nguide to configure the workforce identity federation for your identity provider.\n\n### Grant IAM roles to workforce identity federation users\n\nIn Identity and Access Management (IAM), grant IAM roles to sets of workforce identity federation\nusers, so that they can access Backup and DR Service and the management console to\nprotect workloads:\n\n- For a list of roles specific to Backup and DR Service, see [Grant roles to users](/backup-disaster-recovery/docs/access-control).\n- For instructions about assigning these roles to external users, see [Grant IAM roles to principals](/iam/docs/configuring-workforce-identity-federation#grant_roles_to_principals).\n- The formats used for representing workforce identity federation users in IAM policies, see [Represent workforce pool users in IAM policies](/iam/docs/configuring-workforce-identity-federation#representing-workforce-users).\n\nBackup and DR Service handles workforce identity federation users the same way as\nGoogle Account users--instead of an email address, a [principal identifier](/iam/docs/configuring-workforce-identity-federation#representing-workforce-users) is used.\n\nAccess the Backup and DR Service page in the Google Cloud console\n-----------------------------------------------------------------\n\nThe [Google Cloud workforce identity federation console](/iam/docs/workforce-console-learn-more)\nprovides access to the Backup and DR Service page.\n\nFrom the **Backup and DR Service** page in [Google Cloud workforce identity federation console](https://console.cloud.google), you can deploy the management console, backup/recovery appliances,\nand view Backup and DR Service logs. You can also access the management console\nto backup resources.\n\nAccess the management console\n-----------------------------\n\nWorkforce identity federation users access the management console through a\ndifferent URL than Google-managed users, as follows:\n\n- The URL for workforce identity federation users is\n\n ```\n https://bmc-PROJECT_NUMBER-GENERATED_ID-dot-REGION.backupdr.byoid.googleusercontent.com/\n ```\n- The URL for Google managed user accounts is\n\n ```\n https://bmc-PROJECT_NUMBER-GENERATED_ID-dot-REGION.backupdr.googleusercontent.com/\n ```\n\nOnly users that are authenticated with external identities can access the URL\nfor external identities. If a user visits the URL for external identities while\nnot logged in, they are first redirected to the authentication portal where they\nspecify their workforce pool provider name. Then they are redirected to their\nidentity provider to sign in, and finally they are redirected to the management console.\n\nWorkforce identity federation users cannot directly access the management\nconsole using the URL shared by Google-managed users. To access the management\nconsole as a workforce identity federation user, manually update the link to\n[URL for workforce identity federation users](#access-mc)."]]