Skip to content

Commit 858cba1

Browse files
authored
Merge pull request #301540 from flang-msft/fxl---go-updates
Fxl---go quickstart update
2 parents edd15ef + cd81d70 commit 858cba1

File tree

3 files changed

+168
-147
lines changed

3 files changed

+168
-147
lines changed

articles/redis/entra-for-authentication.md

Lines changed: 19 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Azure Managed Redis offers two methods to [authenticate](configure.md#authentica
1818

1919
Although access key authentication is simple, it comes with a set of challenges around security and password management. For contrast, in this article, you learn how to use a Microsoft Entra token for cache authentication.
2020

21-
Azure Managed Redis offers a password-free authentication mechanism by integrating with [Microsoft Entra](/azure/active-directory/fundamentals/active-directory-whatis). The Entra ID configured to connect with Azure Managed Redis is assigned the same permissions as with using Access Keys.
21+
Azure Managed Redis offers a password-free authentication mechanism by integrating with [Microsoft Entra](/azure/active-directory/fundamentals/active-directory-whatis). The Entra ID configured to connect with Azure Managed Redis is assigned the same permissions as when using Access Keys.
2222

2323
In this article, you learn how to use your service principal or managed identity to connect to your Redis instance.
2424

@@ -39,36 +39,46 @@ When you disable access key authentication for a Redis instance, all existing cl
3939
Before you disable access keys:
4040

4141
- Microsoft Entra authentication must be enabled.
42-
- For geo-replicated caches, you must:
4342

43+
- For geo-replicated caches, you must:
4444
1. Unlink the caches.
4545
1. Disable access keys.
4646
1. Relink the caches.
4747

48-
If you have a cache where you use access keys, and you want to disable access keys, follow this procedure:
48+
If you have a cache where you want to disable access keys, follow this procedure:
4949

5050
1. In the Azure portal, select the Azure Managed Redis instance where you want to disable access keys.
5151

5252
1. On the **Resource** menu, select **Authentication**.
5353

5454
1. On the working pane, select **Access keys**.
5555

56-
1. Configure **Access Keys Authentication** to be disabled.
57-
58-
<!-- :::image type="content" source="media/entra-for-authentication/managed-redis-disable-access-keys.png" alt-text="Screenshot showing access keys in the working pane with the Disable Access Keys Authentication checkbox. "::: -->
56+
1. Select the **Access Keys Authentication** control to disable access keys.
5957

6058
1. Confirm that you want to update your configuration by selecting **Yes**.
6159

62-
> [!IMPORTANT]
63-
> When the **Disable Access Keys Authentication** setting is changed for a cache, all existing client connections, using access keys or Microsoft Entra, are terminated. Follow the best practices to implement proper retry mechanisms for reconnecting Microsoft Entra-based connections. For more information, see [Connection resilience](best-practices-connection.md).
60+
> [!IMPORTANT]
61+
> When the **Disable Access Keys Authentication** setting is changed for a cache, all existing client connections, using access keys or Microsoft Entra, are terminated. Follow the best practices to implement proper retry mechanisms for reconnecting Microsoft Entra-based connections. For more information, see [Connection resilience](best-practices-connection.md).
6462
6563
## Configure your Redis client to use Microsoft Entra
6664

6765
Because most Azure Managed Redis clients assume that a password and access key are used for authentication, you likely need to update your client workflow to support authentication by using Microsoft Entra. In this section, you learn how to configure your client applications to connect to Azure Managed Redis by using a Microsoft Entra token.
6866

67+
### Add users or System principal to your cache
68+
69+
1. Connect to your cache in the Azure portal
70+
71+
1. On the Resource menu, select **Authentication**.
72+
73+
1. On the **Microsoft Entra Authentication** tab, select **User or service principal** and then **+ Select member**.
74+
75+
1. Type the name of the user who you want to run the program. Select the user to add in the list and **Select**. The user is added to the list of Redis users.
76+
77+
:::image type="content" source="media/entra-for-authentication/redis-add-user.png" alt-text="Screenshot of the authentication tab in a Redis cache on the Azure portal.":::
78+
6979
### Microsoft Entra client workflow
7080

71-
1. Configure your client application to acquire a Microsoft Entra token for scope, `https://redis.azure.com/.default` or `acca5fbb-b7e4-4009-81f1-37e38fd66d78/.default`, by using the [Microsoft Authentication Library (MSAL)](/azure/active-directory/develop/msal-overview).
81+
1. Configure your client application to acquire a Microsoft Entra token for scope, `https://redis.azure.com/.default`, or `acca5fbb-b7e4-4009-81f1-37e38fd66d78/.default`, by using the [Microsoft Authentication Library (MSAL)](/azure/active-directory/develop/msal-overview).
7282

7383
1. Update your Redis connection logic to use the following `User` and `Password`:
7484

0 commit comments

Comments
 (0)