You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/redis/entra-for-authentication.md
+3-17Lines changed: 3 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,11 +12,11 @@ ms.custom:
12
12
13
13
# Use Microsoft Entra for cache authentication with Azure Managed Redis
14
14
15
-
Azure Managed Redisoffers two methods to [authenticate](configure.md#authentication) to your cache instance: access keys and Microsoft Entra.
15
+
Azure Managed Redis offers two methods to [authenticate](configure.md#authentication) to your cache instance: access keys and Microsoft Entra. Azure Managed Redis cache use managed identity by default. When you create a new cache, managed identity is enabled.
16
16
17
17
Although access key authentication is simple, it comes with a set of challenges around security and password management. For contrast, in this article, you learn how to use a Microsoft Entra token for cache authentication.
18
18
19
-
Azure Managed Redis offers a password-free authentication mechanism by integrating with [Microsoft Entra](/azure/active-directory/fundamentals/active-directory-whatis). The Entra ID configured to connect with Azure Managed Redis is assigned the same permissions as with using Access Keys.
19
+
Azure Managed Redis offers a password-free authentication mechanism by integrating with [Microsoft Entra](/azure/active-directory/fundamentals/active-directory-whatis). The Entra ID configured to connect with Azure Managed Redis is assigned the same permissions as with using Access Keys.
20
20
21
21
In this article, you learn how to use your service principal or managed identity to connect to your Redis instance.
22
22
@@ -28,20 +28,6 @@ In this article, you learn how to use your service principal or managed identity
28
28
> [!IMPORTANT]
29
29
> After a connection is established by using a Microsoft Entra token, client applications must periodically refresh the Microsoft Entra token before expiry. Then the apps must send an `AUTH` command to the Redis server to avoid disrupting connections. For more information, see [Configure your Redis client to use Microsoft Entra](#configure-your-redis-client-to-use-microsoft-entra).
30
30
31
-
## Enable Microsoft Entra authentication on your cache
32
-
33
-
1. In the Azure portal, select the Azure Managed Redis instance where you want to configure Microsoft Entra token-based authentication.
34
-
35
-
1. On the **Resource** menu, select **Authentication**.
36
-
37
-
1. On the working pane, select the **Microsoft Entra Authentication** tab.
38
-
39
-
1. Select **Enable Microsoft Entra Authentication** and choose "User or service principal" or "Managed Identity" buttons. The user you enter is automatically assigned same permissions as when using Access Keys when you **Select**. You can also enter a managed identity or service principal to connect to your AMR instance.
40
-
41
-
:::image type="content" source="media/entra-for-authentication/managed-redis-enable-microsoft-entra.png" alt-text="Screenshot showing authentication selected in the resource menu and the Enable Microsoft Entra authentication checkbox.":::
42
-
43
-
For information on how to use Microsoft Entra with the Azure CLI, see the [reference pages for identity](/cli/azure/redis/identity).
44
-
45
31
## Disable access key authentication on your cache
46
32
47
33
Using Microsoft Entra is the secure way to connect your cache. We recommend that you use Microsoft Entra and disable access keys.
@@ -67,7 +53,7 @@ If you have a cache where you use access keys, and you want to disable access ke
67
53
68
54
1. Configure **Access Keys Authentication** to be disabled.
69
55
70
-
:::image type="content" source="media/entra-for-authentication/managed-redis-disable-access-keys.png" alt-text="Screenshot showing access keys in the working pane with the Disable Access Keys Authentication checkbox. ":::
56
+
<!--:::image type="content" source="media/entra-for-authentication/managed-redis-disable-access-keys.png" alt-text="Screenshot showing access keys in the working pane with the Disable Access Keys Authentication checkbox. ":::-->
71
57
72
58
1. Confirm that you want to update your configuration by selecting **Yes**.
0 commit comments