Skip to content

Commit d7f3488

Browse files
committed
Removed preview tag from content
1 parent bf28852 commit d7f3488

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

articles/azure-cache-for-redis/cache-azure-active-directory-for-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ If you would like to use a custom access policy instead of Redis Data Owner, go
6666

6767
1. In the Azure portal, select the Azure Cache for Redis instance where you'd like to add to the Data Access Configuration.
6868

69-
1. Select **(PREVIEW) Data Access Configuration** from the Resource menu.
69+
1. Select **Data Access Configuration** from the Resource menu.
7070

7171
1. Select **Add** and choose **New Redis User**.
7272

articles/azure-cache-for-redis/cache-configure-role-based-access-control.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Azure Cache for Redis offers three built-in access policies: _Owner_, _Contribut
2424

2525
| **Tier** | Basic, Standard, Premium | Enterprise, Enterprise Flash |
2626
|:-----------------|:------------------------:|:----------------------------:|
27-
| **Availability** | Yes (preview) | No |
27+
| **Availability** | Yes | No |
2828

2929
## Prerequisites and limitations
3030

@@ -104,7 +104,7 @@ The following list contains some examples of permission strings for various scen
104104

105105
1. In the Azure portal, select the Azure Cache for Redis instance where you want to configure Microsoft Entra token-based authentication.
106106

107-
1. From the Resource menu, select **(PREVIEW) Data Access configuration**.
107+
1. From the Resource menu, select **Data Access configuration**.
108108

109109
:::image type="content" source="media/cache-configure-role-based-access-control/cache-data-access-configuration.png" alt-text="Screenshot showing Data Access Configuration highlighted in the Resource menu.":::
110110

@@ -118,9 +118,9 @@ The following list contains some examples of permission strings for various scen
118118

119119
1. To add a user to the access policy using Microsoft Entra ID, you must first enable Microsoft Entra ID by selecting **Authentication** from the Resource menu.
120120

121-
1. Select **(PREVIEW) Enable Microsoft Entra Authentication** as the tab in the working pane.
121+
1. Select **Enable Microsoft Entra Authentication** as the tab in the working pane.
122122

123-
1. If not checked already, check the box labeled **(PREVIEW) Enable Microsoft Entra Authentication** and select **OK**. Then, select **Save**.
123+
1. If not checked already, check the box labeled **Enable Microsoft Entra Authentication** and select **OK**. Then, select **Save**.
124124

125125
:::image type="content" source="media/cache-azure-active-directory-for-authentication/cache-enable-microsoft-entra.png" alt-text="Screenshot of Microsoft Entra ID access authorization.":::
126126

0 commit comments

Comments
 (0)