Skip to content

Commit dba0f52

Browse files
committed
edits
1 parent 58e7da5 commit dba0f52

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/azure-cache-for-redis/cache-configure-role-based-access-control.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Redis supports the following useful command categories. For more information and
3737

3838
|Category|Description|
3939
|--------|-----------|
40-
|`admin`|Administrative commands, such as `MONITOR` and `SHUTDOWN`. Normal applications never need to use these.|
40+
|`admin`|Administrative commands, such as `MONITOR` and `SHUTDOWN`. Normal applications never need to use these commands.|
4141
|`dangerous`|Potentially dangerous commands, including `FLUSHALL`, `RESTORE`, `SORT`, `KEYS`, `CLIENT`, `DEBUG`, `INFO`, and `CONFIG`. Consider each with care, for various reasons.|
4242
|`keyspace`|Includes `DEL`, `RESTORE`, `DUMP`, `RENAME`, `EXISTS`, `DBSIZE`, `KEYS`, `EXPIRE`, `TTL`, and `FLUSHALL`. Writing or reading from keys, databases, or their metadata in a type agnostic way. Commands that only read the keyspace, key, or metadata have the `read` category. Commands that can modify the keyspace, key, or metadata also have the `write` category.|
4343
|`pubsub`|PubSub-related commands.|
@@ -49,19 +49,19 @@ Redis supports the following useful command categories. For more information and
4949
|`write`|Writing values or metadata to keys.|
5050

5151
>[!NOTE]
52-
>Commands that are [blocked](cache-configure.md#redis-commands-not-supported-in-azure-cache-for-redis) for Azure Redis remain blocked within these categories.
52+
>Commands that are [blocked](cache-configure.md#redis-commands-not-supported-in-azure-cache-for-redis) for Azure Redis remain blocked within the categories.
5353
5454
### Commands
5555

56-
*Commands* allow you to control which specific commands can be run by a particular Redis user. In a permissions string, use `+command` to allow a command or `-command` to disallow a command.
56+
*Commands* allow you to control which specific commands a particular Redis user can run. In a permissions string, use `+command` to allow a command or `-command` to disallow a command.
5757

5858
### Keys
5959

6060
*Keys* allow you to control access to specific keys or groups of keys stored in the cache. In a permissions string, use `~<pattern>` to provide a pattern for keys. Use either `~*` or `allkeys` to indicate that the permissions apply to all keys in the cache.
6161

62-
## Configure a custom data access policy
62+
## Configure a custom data access policy for your application
6363

64-
To configure a custom data access policy, you first create a permissions string to use as your custom access policy, and then assign the policy to Azure Redis cache users.
64+
To configure a custom data access policy, you first create a permission string to use as your custom access policy, and then assign the policy to Azure Redis cache users.
6565

6666
### Specify permissions
6767

@@ -70,7 +70,7 @@ Configure the permissions string according to your requirements. The following e
7070
|Permissions string|Description|
7171
|------------------|-----------|
7272
|`+@all allkeys`|Allow application to execute all commands on all keys.|
73-
|`+@read ~*`|- Allow application to execute only `read` command category.|
73+
|`+@read ~*`|Allow application to execute only `read` command category.|
7474
|`+@read +set ~Az*`|Allow application to execute `read` command category and set command on keys with prefix `Az`.|
7575

7676
### Create the custom data access policy
@@ -93,11 +93,11 @@ The custom policy now appears on the **Access Policies** tab of the **Data Acces
9393

9494
### Enable Microsoft Entra ID authentication
9595

96-
To add a user to an access policy by using Microsoft Entra ID, you must have Microsoft Entra ID rather than Access Keys authentication enabled on your cache. To check this, select **Authentication** under **Settings** in the laft navigation menu for your cache.
96+
To add a user to an access policy by using Microsoft Entra ID, you must have Microsoft Entra ID rather than Access Keys authentication enabled on your cache. To check your authentication method, select **Authentication** under **Settings** in the left navigation menu for your cache.
9797

9898
On the **Authentication** screen, if **Disable Access Keys Authentication** is selected and no access keys appear on the screen, your cache already uses Microsoft Entra ID authentication. Otherwise, select the checkbox next to **Disable Access Keys Authentication** and then select **Save**.
9999

100-
:::image type="content" source="media/cache-azure-active-directory-for-authentication/enable-entra.png" alt-text="Screenshot of disabling access keys authentication.":::
100+
:::image type="content" source="media/cache-configure-role-based-access-control/enable-entra.png" alt-text="Screenshot of disabling access keys authentication.":::
101101

102102
Respond **Yes** to the popup dialog box asking if you want to disable access keys authentication.
103103

0 commit comments

Comments
 (0)