Skip to content

Commit 692525f

Browse files
committed
Made updates from review
1 parent d89c871 commit 692525f

File tree

1 file changed

+6
-10
lines changed

1 file changed

+6
-10
lines changed

articles/azure-cache-for-redis/cache-azure-active-directory-for-authentication.md

Lines changed: 6 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: flang-msft
77
ms.custom: references_regions
88
ms.service: cache
99
ms.topic: conceptual
10-
ms.date: 01/29/2024
10+
ms.date: 02/07/2024
1111
ms.author: franlanglois
1212

1313
---
@@ -43,15 +43,13 @@ To use the ACL integration, your client application must assume the identity of
4343
4444
## Enable Microsoft Entra ID authentication on your cache
4545

46-
If you would like to use a custom access policy instead of Redis Data Owner, go to the **Data Access Configuration** on the Resource menu. For more information, see [Configure a custom data access policy for your application](cache-configure-role-based-access-control.md#configure-a-custom-data-access-policy-for-your-application).
47-
4846
1. In the Azure portal, select the Azure Cache for Redis instance where you'd like to configure Microsoft Entra token-based authentication.
4947

5048
1. Select **Authentication** from the Resource menu.
5149

5250
1. In the working pane, select **(PREVIEW) Enable Microsoft Entra Authorization**.
5351

54-
1. Select **Enable Microsoft Entra Authorization**, and enter the name of a valid user. Then, select **Save**. You could also enter a managed identity or service principal to connect to your cache instance.
52+
1. Select **Enable Microsoft Entra Authorization**, and enter the name of a valid user. The user you enter is automatically assigned _Data Owner Access Policy_ by default when you select **Save**. You can also enter a managed identity or service principal to connect to your cache instance.
5553

5654
:::image type="content" source="media/cache-azure-active-directory-for-authentication/cache-enable-microsoft-entra.png" alt-text="Screenshot showing authentication selected in the resource menu and the enable Microsoft Entra authentication checked.":::
5755

@@ -96,15 +94,13 @@ Because most Azure Cache for Redis clients assume that a password and access key
9694

9795
1. Update your Redis connection logic to use following `UserName` and `Password`:
9896

99-
- `UserName` = Object ID of your managed identity or service principal
100-
101-
- `Password` = Microsoft Entra token that you acquired using MSAL
97+
`UserName` = Object ID of your managed identity or service principal
98+
`Password` = Microsoft Entra token that you acquired using MSAL
10299

103100
1. Ensure that your client executes a Redis [AUTH command](https://redis.io/commands/auth/) automatically before your Microsoft Entra token expires using:
104101

105-
- `UserName` = Object ID of your managed identity or service principal
106-
107-
- `Password` = Microsoft Entra token refreshed periodically
102+
`UserName` = Object ID of your managed identity or service principal
103+
`Password` = Microsoft Entra token refreshed periodically
108104

109105
### Client library support
110106

0 commit comments

Comments
 (0)