How to resolve error UserErrorBackupServiceApplicationPermissionDenied when setting up Azure Backup on Windows Server 2022 VM?

David S 0 Reputation points
2025-04-28T20:58:12.27+00:00

I have a Windows Server 2022 VM. I'm trying to set up Azure Backup with Enhanced configuration. The Backup Resource Group exists and seems fine. When I try to deploy backup for the VM using the "ConfigureProtection" deployment from the dashboard, I get the following error in the Deployment when it fails:

The backup service application does not have permission to access your subscription.
 (Code: UserErrorBackupServiceApplicationPermissionDenied)

The status is "Conflict" before I drill into the error.

This has persisted for months, I just tried again after it failed months ago, no idea why it continues to fail. There are no search results in search engines for "

UserErrorBackupServiceApplicationPermissionDenied

Nor for the error description text as a quoted string.

Microsoft apparently does not provide support for their own error messages and wizards without a $29/mo subscription but they say I can post here for free.

It takes about 2.5 minutes to fail. The VM has a single Premium SSD LRS 127GB OS disk, and no others.

I started the backup set up (this time) from Overview->Capabilities->Backup (which says Not Configured), chose the existing Backup Vault I've created, chose Enhanced policy, the single disk (and all future disks), and the EnhancedBackup policy I already created separately to define retention.

Even letting the wizard create a new Backup Vault in the same Resource Group from scratch, on a second try, results in exactly the same error.

Azure Backup
Azure Backup
An Azure backup service that provides built-in management at scale.
1,453 questions
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Vinodh247 33,001 Reputation points MVP Moderator
    2025-04-29T01:02:03.6566667+00:00

    Hi ,

    Thanks for reaching out to Microsoft Q&A.

    Why it happens:

    • Enhanced backup uses a different internal mechanism than "classic" backup.
    • Backup Vaults use managed identity for operations.
    • Your subscription or vault probably does not have the right RBAC permissions set for the Backup vault's Managed Identity.
    • Even though the wizard looks fine, the vault's identity is missing Contributor/Backup Contributor role at the resource group or subscription level.
    • This mismatch causes PermissionDenied when the backup tries to protect the VM.

    How to fix:

    Step 1: Find the Backup Vault's Managed Identity

    Go to Azure Portal.

    Open your Backup Vault.

    Go to Identity under the vault's settings (left menu).

    Check if the System-Assigned Managed Identity is ON.

    If OFF, turn it ON and Save.

    Step 2: Assign the right role to the Backup Vault’s Identity

    You need to give permission to the vault's identity.

    Go to Subscriptions or Resource Group where your VM and Backup Vault are.

    Go to Access Control (IAM).

    Click Add Role Assignment.

    Assign the role Backup Contributor.

    In "Assign access to", choose Managed identity.

    Select the Backup Vault's system-assigned identity.

    Role to assign: Backup Contributor

      Scope: Ideally at Resource Group (where VM and vault exist) or Subscription (if you prefer).
      
    

    Important: If you only assign permissions to the vault resource itself and not to the RG or Subscription, it will still fail. You must assign on the VM resource group or Subscription.

    Step 3: Retry the Protection Setup

    • Go back to the VM -> Overview -> Backup -> Try the wizard again.

    Use the existing Backup Vault.

    Use Enhanced configuration and the policy you created.

    Now it should proceed beyond the 2.5-minute failure you are seeing.

    Quick Tip:

    If you want to make sure everything is ready before trying the wizard again, you can manually run this CLI command to test access. If you get a permissions error here, it confirms identity issue.

    az backup vault backup-properties show --vault-name <your vault name> --resource-group <resource group>

    Why Microsoft does not mention it clearly?

    Because Enhanced Backup is still relatively newer for some VM OS types (including Server 2022), and they assume people understand managed identity permission management which is frankly unreasonable without clear docs.


    Note:

    If you want even tighter security:

    Assign only Backup Contributor at Resource Group scope.

    Avoid assigning at Subscription level unless you have multiple VMs across RGs needing backup.

    Please feel free to click the 'Upvote' (Thumbs-up) button and 'Accept as Answer'. This helps the community by allowing others with similar queries to easily find the solution.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.