Skip to content

Commit d92074c

Browse files
committed
reshoot screenshots
1 parent 30e9660 commit d92074c

File tree

4 files changed

+2
-4
lines changed

4 files changed

+2
-4
lines changed

articles/azure-cache-for-redis/cache-azure-active-directory-for-authentication.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: flang-msft
77
ms.custom: references_regions
88
ms.service: cache
99
ms.topic: conceptual
10-
ms.date: 05/07/2024
10+
ms.date: 05/09/2024
1111
ms.author: franlanglois
1212

1313
---
@@ -71,7 +71,7 @@ If you would like to use a custom access policy instead of Redis Data Owner, go
7171

7272
:::image type="content" source="media/cache-azure-active-directory-for-authentication/cache-new-redis-user.png" alt-text="Screenshot showing the available Access Policies.":::
7373

74-
1. Choose either the **User or service principal** or **Managed Identity** to determine how to assign access to your Azure Cache for Redis instance. If you select **User or service principal**,and you want to add a _user_, you must first [enable Microsoft Entra Authentication](#enable-microsoft-entra-id-authentication-on-your-cache).
74+
1. Choose either the **User or service principal** or **Managed Identity** to determine how to assign access to your Azure Cache for Redis instance. If you select **User or service principal**, and you want to add a _user_, you must first [enable Microsoft Entra Authentication](#enable-microsoft-entra-id-authentication-on-your-cache).
7575

7676
1. Then, select **Select members** and select **Select**. Then, select **Next : Review + Assign**.
7777
:::image type="content" source="media/cache-azure-active-directory-for-authentication/cache-select-members.png" alt-text="Screenshot showing members to add as New Redis Users.":::
@@ -85,7 +85,6 @@ If you would like to use a custom access policy instead of Redis Data Owner, go
8585

8686
Because most Azure Cache for Redis clients assume that a password and access key are used for authentication, you likely need to update your client workflow to support authentication using Microsoft Entra ID. In this section, you learn how to configure your client applications to connect to Azure Cache for Redis using a Microsoft Entra token.
8787

88-
8988
### Microsoft Entra Client Workflow
9089

9190
1. Configure your client application to acquire a Microsoft Entra token for scope, `https://redis.azure.com/.default` or `acca5fbb-b7e4-4009-81f1-37e38fd66d78/.default`, using the [Microsoft Authentication Library (MSAL)](/azure/active-directory/develop/msal-overview).
@@ -130,4 +129,3 @@ The following table includes links to code samples, which demonstrate how to con
130129

131130
- [Configure role-based access control with Data Access Policy](cache-configure-role-based-access-control.md)
132131
- [Reference pages for identity](/cli/azure/redis/identity)
133-
Loading
129 KB
Loading
39.5 KB
Loading

0 commit comments

Comments
 (0)