Skip to content

Commit 641f8ba

Browse files
committed
fix typo on feature name
1 parent 692525f commit 641f8ba

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

articles/azure-cache-for-redis/cache-azure-active-directory-for-authentication.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,9 +47,9 @@ To use the ACL integration, your client application must assume the identity of
4747

4848
1. Select **Authentication** from the Resource menu.
4949

50-
1. In the working pane, select **(PREVIEW) Enable Microsoft Entra Authorization**.
50+
1. In the working pane, select **(PREVIEW) Enable Microsoft Entra Authentication**.
5151

52-
1. Select **Enable Microsoft Entra Authorization**, and enter the name of a valid user. The user you enter is automatically assigned _Data Owner Access Policy_ by default when you select **Save**. You can also enter a managed identity or service principal to connect to your cache instance.
52+
1. Select **Enable Microsoft Entra Authentication**, and enter the name of a valid user. The user you enter is automatically assigned _Data Owner Access Policy_ by default when you select **Save**. You can also enter a managed identity or service principal to connect to your cache instance.
5353

5454
:::image type="content" source="media/cache-azure-active-directory-for-authentication/cache-enable-microsoft-entra.png" alt-text="Screenshot showing authentication selected in the resource menu and the enable Microsoft Entra authentication checked.":::
5555

@@ -72,7 +72,7 @@ If you would like to use a custom access policy instead of Redis Data Owner, go
7272

7373
:::image type="content" source="media/cache-azure-active-directory-for-authentication/cache-new-redis-user.png" alt-text="Screenshot showing the available Access Policies.":::
7474

75-
1. Choose either the **User or service principal** or **Managed Identity** to determine how to assign access to your Azure Cache for Redis instance. If you select **User or service principal**,and you want to add a _user_, you must first [enable Microsoft Entra Authorization](#enable-microsoft-entra-id-authentication-on-your-cache).
75+
1. Choose either the **User or service principal** or **Managed Identity** to determine how to assign access to your Azure Cache for Redis instance. If you select **User or service principal**,and you want to add a _user_, you must first [enable Microsoft Entra Authentication](#enable-microsoft-entra-id-authentication-on-your-cache).
7676

7777
1. Then, select **Select members** and select **Select**. Then, select **Next : Review + Assign**.
7878
:::image type="content" source="media/cache-azure-active-directory-for-authentication/cache-select-members.png" alt-text="Screenshot showing members to add as New Redis Users.":::

articles/azure-cache-for-redis/cache-configure-role-based-access-control.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,9 +118,9 @@ The following list contains some examples of permission strings for various scen
118118

119119
1. To add a user to the access policy using Microsoft Entra ID, you must first enable Microsoft Entra ID by selecting **Authentication** from the Resource menu.
120120

121-
1. Select **(PREVIEW) Enable Microsoft Entra Authorization** as the tab in the working pane.
121+
1. Select **(PREVIEW) Enable Microsoft Entra Authentication** as the tab in the working pane.
122122

123-
1. If not checked already, check the box labeled **(PREVIEW) Enable Microsoft Entra Authorization** and select **OK**. Then, select **Save**.
123+
1. If not checked already, check the box labeled **(PREVIEW) Enable Microsoft Entra Authentication** and select **OK**. Then, select **Save**.
124124

125125
:::image type="content" source="media/cache-azure-active-directory-for-authentication/cache-enable-microsoft-entra.png" alt-text="Screenshot of Microsoft Entra ID access authorization.":::
126126

0 commit comments

Comments
 (0)