You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/cache-managed-identity.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,48 +50,48 @@ Because managed identity for storage is only used with the import/export feature
50
50
51
51
1. Create a new Azure Cache for Redis resource with a **Cache type** of any of the premium tiers. Complete **Basics** tab with all the required information.
52
52
53
-
:::image type="content" source="media/cache-managed-identity/basics.png" alt-text="create a premium azure cache":::
53
+
:::image type="content" source="media/cache-managed-identity/basics.png" alt-text="Screenshot of showing how to create a premium cache.":::
54
54
55
55
1. Select the **Advanced** tab. Then, scroll down to **System assigned managed identity** and select **On**.
56
56
57
-
:::image type="content" source="media/cache-managed-identity/system-assigned.png" alt-text="Advanced page of the form":::
57
+
:::image type="content" source="media/cache-managed-identity/system-assigned.png" alt-text="Screenshot sowing Advanced page of the form.":::
58
58
59
59
1. Complete the creation process. Once the cache has been created and deployed, open it, and select the **Identity** tab under the **Settings** section on the left. You see that a system-assigned **object ID** has been assigned to the cache **Identity**.
60
60
61
-
:::image type="content" source="media/cache-managed-identity/identity-resource.png" alt-text="Managed Identity in the Resource menu":::
61
+
:::image type="content" source="media/cache-managed-identity/identity-resource.png" alt-text="Screenshot showing Identity in the Resource menu.":::
62
62
63
63
## Add system assigned identity to an existing cache
64
64
65
65
1. Navigate to your Azure Cache for Redis resource from the Azure portal. Select **Identity** from the Resource menu on the left.
66
66
67
67
1. To enable a system-assigned identity, select the **System assigned** tab, and select **On** under **Status**. Select **Save** to confirm.
68
68
69
-
:::image type="content" source="media/cache-managed-identity/identity-save.png" alt-text="System assigned identity status is on":::
69
+
:::image type="content" source="media/cache-managed-identity/identity-save.png" alt-text="Screenshot showing System Assigned selected and Status is on.":::
70
70
71
71
1. A dialog pops up saying that your cache will be registered with Azure Active Directory and that it can be granted permissions to access resources protected by Azure AD. Select **Yes**.
72
72
:::image type="content" source="media/cache-managed-identity/identity-dialog.png" alt-text="Screenshot asking if you want to enable managed identity.":::
73
73
74
74
1. You see an **Object (principal) ID**, indicating that the identity has been assigned.
75
75
76
-
:::image type="content" source="media/cache-managed-identity/user-assigned.png" alt-text="new Object principal ID shown for system assigned identity":::
76
+
:::image type="content" source="media/cache-managed-identity/user-assigned.png" alt-text="Screenshot showing the Object (principal) ID.":::
77
77
78
78
## Add a user assigned identity to an existing cache
79
79
80
80
1. Navigate to your Azure Cache for Redis resource from the Azure portal. Select **Identity** from the Resource menu on the left.
81
81
82
82
1. To enable user assigned identity, select the **User assigned** tab and select **Add**.
83
83
84
-
:::image type="content" source="media/cache-managed-identity/identity-add.png" alt-text="User assigned identity status is on":::
84
+
:::image type="content" source="media/cache-managed-identity/identity-add.png" alt-text="User assigned identity status is on.":::
85
85
86
86
1. A sidebar pops up to allow you to select any available user-assigned identity to your subscription. Choose an identity and select **Add**. For more information on user assigned managed identities, see [manage user-assigned identity](../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md).
87
87
>[!Note]
88
88
>You need to [create a user assigned identity](../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-azp) in advance of this step.
89
89
>
90
-
:::image type="content" source="media/cache-managed-identity/choose-identity.png" alt-text="new Object principal ID shown for user assigned identity":::
90
+
:::image type="content" source="media/cache-managed-identity/choose-identity.png" alt-text="Screenshot showing a User assigned managed identity.":::
91
91
92
92
1. You see the user-assigned identity listed in the **User assigned** pane.
93
93
94
-
:::image type="content" source="media/cache-managed-identity/identity-list.png" alt-text="list of identity names":::
94
+
:::image type="content" source="media/cache-managed-identity/identity-list.png" alt-text="Screenshot showing a list of names, resource groups and subscriptions.":::
2. Open the **Access control (IAM)** from the Resource menu. Then, select **Add**, and **Add role assignment**.
125
125
126
-
:::image type="content" source="media/cache-managed-identity/demo-storage.png" alt-text="access control (iam) settings":::
126
+
:::image type="content" source="media/cache-managed-identity/demo-storage.png" alt-text="Screenshot showing the Access Control (IAM) settings.":::
127
127
128
128
3. Search for the **Storage Blob Data Contributor** on the Role pane. Select it and **Next**.
129
129
130
-
:::image type="content" source="media/cache-managed-identity/role-assignment.png" alt-text="add role assignment form with list of roles":::
130
+
:::image type="content" source="media/cache-managed-identity/role-assignment.png" alt-text="Screenshot showing Add role assignment form with list of roles.":::
131
131
132
132
4. Select the **Members** tab. Under **Assign access to** select **Managed Identity**, and select on **Select members**. A sidebar pops up on the right.
133
133
134
-
:::image type="content" source="media/cache-managed-identity/select-members.png" alt-text="add role assignment form with members pane":::
134
+
:::image type="content" source="media/cache-managed-identity/select-members.png" alt-text="Screenshot showing add role assignment form with members pane.":::
135
135
136
136
5. Use the drop-down under **Managed Identity** to choose either a **User-assigned managed identity** or a **System-assigned managed identity**. If you have many managed identities, you can search by name. Choose the managed identities you want and then **Select**. Then, **Review + assign** to confirm.
137
137
138
-
:::image type="content" source="media/cache-managed-identity/review-assign.png" alt-text="select managed identities form pop up":::
138
+
:::image type="content" source="media/cache-managed-identity/review-assign.png" alt-text="Screenshot showing Managed Identity form with User-assigned managed identity indicated.":::
139
139
140
140
6. You can confirm if the identity has been assigned successfully by checking your storage account's role assignments under **Storage Blob Data Contributor**.
141
141
142
-
:::image type="content" source="media/cache-managed-identity/blob-data.png" alt-text="Screenshot of storage blob data contributor list.":::
142
+
:::image type="content" source="media/cache-managed-identity/blob-data.png" alt-text="Screenshot of Storage Blob Data Contributor list.":::
143
143
144
144
> [!NOTE]
145
145
> Adding an Azure Cache for Redis instance as a storage blob data contributor through system-assigned identity conveniently adds the cache instance to the [trusted services list](../storage/common/storage-network-security.md?tabs=azure-portal), making firewall exceptions easier to implement. If you're not using managed identity and instead authorizing a storage account with a key, then having firewall exceptions on the storage account tends to break the persistence process and the import-export processes.
2. Change the **Authentication Method** to **Managed Identity** and select the storage account you configured above. select **Save**.
154
154
155
-
:::image type="content" source="media/cache-managed-identity/data-persistence.png" alt-text="Screenshot showing data persistence pane with authentication method selected":::
155
+
:::image type="content" source="media/cache-managed-identity/data-persistence.png" alt-text="Screenshot showing data persistence pane with authentication method selected.":::
156
156
157
157
> [!IMPORTANT]
158
158
> The identity defaults to the system-assigned identity if it is enabled. Otherwise, the first listed user-assigned identity is used.
159
159
>
160
160
161
161
3. Data persistence backups can now be saved to the storage account using managed identity authentication.
162
162
163
-
:::image type="content" source="media/cache-managed-identity/redis-persistence.png" alt-text="export data in resource menu":::
163
+
:::image type="content" source="media/cache-managed-identity/redis-persistence.png" alt-text="Screenshot showing export data in Resource menu.":::
164
164
165
165
### Use managed identity to import and export cache data
166
166
167
167
1. Open your Azure Cache for Redis instance that has been assigned the Storage Blob Data Contributor role and go to the **Import** or **Export** tab under **Administration**.
168
168
169
169
2. If importing data, choose the blob storage location that holds your chosen RDB file. If exporting data, type your desired blob name prefix and storage container. In both situations, you must use the storage account you've configured for managed identity access.
170
170
171
-
:::image type="content" source="media/cache-managed-identity/export-data.png" alt-text="export data from the resource menu":::
0 commit comments