title | titleSuffix | description | author | ms.service | ms.topic | ms.date | ms.author |
---|---|---|---|---|---|---|---|
Managed identity for storage accounts |
Azure Cache for Redis |
Learn to Azure Cache for Redis |
flang-msft |
cache |
conceptual |
03/10/2022 |
franlanglois |
Managed identities are a common tool used in Azure to help developers minimize the burden of managing secrets and sign-in information. Managed identities are useful when Azure services connect to each other. Instead of managing authorization between each service, Azure Active Directory (Azure AD) can be used to provide a managed identity that makes the authentication process more streamlined and secure.
Presently, Azure Cache for Redis can use a managed identity to connect with a storage account, useful in two scenarios:
-
Data Persistence--scheduled backups of data in your cache through an RDB or AOF file.
-
Import or Export--saving snapshots of cache data or importing data from a saved file.
Managed identity lets you simplify the process of securely connecting to your chosen storage account for these tasks.
Note
This functionality does not yet support authentication for connecting to a cache instance.
Azure Cache for Redis supports both types of managed identity:
-
System-assigned identity is specific to the resource. In this case, the cache is the resource. When the cache is deleted, the identity is deleted.
-
User-assigned identity is specific to a user, not the resource. It can be assigned to any resource that supports managed identity and remains even when you delete the cache.
Each type of managed identity has advantages, but in Azure Cache for Redis, the functionality is the same.
Managed identity can be enabled either when you create a cache instance or after the cache has been created. During the creation of a cache, only a system-assigned identity can be assigned. Either identity type can be added to an existing cache.
To use managed identity, you must have a premium-tier cache.
-
Sign into the Azure portal
-
Create a new Azure Cache for Redis resource with a Cache type of any of the premium tiers. Complete Basics tab with all the required information.
[!NOTE] Managed identity functionality is only available in the Premium tier.
:::image type="content" source="media/cache-managed-identity/basics.png" alt-text="create a premium azure cache":::
-
Select the Advanced tab. Then, scroll down to (PREVIEW) System assigned managed identity and select On.
:::image type="content" source="media/cache-managed-identity/system-assigned.png" alt-text="Advanced page of the form":::
-
Complete the creation process. Once the cache has been created and deployed, open it, and select the (PREVIEW) Identity tab under the Settings section on the left.
:::image type="content" source="media/cache-managed-identity/identity-resource.png" alt-text="(Preview) Identity in the Resource menu":::
-
You see that a system-assigned object ID has been assigned to the cache Identity.
:::image type="content" source="media/cache-managed-identity/user-assigned.png" alt-text="System assigned resource settings for identity":::
-
Navigate to your Azure Cache for Redis resource from the Azure portal. Select (PREVIEW) Identity from the Resource menu on the left.
[!NOTE] Managed identity functionality is only available in the Premium tier.
-
To enable a system-assigned identity, select the System assigned (preview) tab, and select On under Status. Select Save to confirm.
:::image type="content" source="media/cache-managed-identity/identity-save.png" alt-text="System assigned identity status is on":::
-
A dialog pops up saying that your cache will be registered with Azure Active Directory and that it can be granted permissions to access resources protected by Azure AD. Select Yes.
-
You see an Object (principal) ID, indicating that the identity has been assigned.
:::image type="content" source="media/cache-managed-identity/user-assigned.png" alt-text="new Object principal ID shown for system assigned identity":::
-
Navigate to your Azure Cache for Redis resource from the Azure portal. Select (PREVIEW) Identity from the Resource menu on the left.
[!NOTE] Managed identity functionality is only available in the Premium tier.
-
To enable user assigned identity, select the User assigned (preview) tab and select Add.
:::image type="content" source="media/cache-managed-identity/identity-add.png" alt-text="User assigned identity status is on":::
-
A sidebar pops up to allow you to select any available user-assigned identity to your subscription. Choose an identity and select Add. For more information on user assigned managed identities, see manage user-assigned identity.
[!Note] You need to create a user assigned identity in advance of this step.
:::image type="content" source="media/cache-managed-identity/choose-identity.png" alt-text="new Object principal ID shown for user assigned identity":::
-
You see the user-assigned identity listed in the User assigned (preview) pane.
:::image type="content" source="media/cache-managed-identity/identity-list.png" alt-text="list of identity names":::
Use the Azure CLI for creating a new cache with managed identity or updating an existing cache to use managed identity. For more information, see az redis create or az redis identity.
For example, to update a cache to use system-managed identity use the following CLI command:
az redis identity assign \--mi-system-assigned \--name MyCacheName \--resource-group MyResource Group
Use Azure PowerShell for creating a new cache with managed identity or updating an existing cache to use managed identity. For more information, see New-AzRedisCache or Set-AzRedisCache.
For example, to update a cache to use system-managed identity, use the following PowerShell command:
Set-AzRedisCache -ResourceGroupName \"MyGroup\" -Name \"MyCache\" -IdentityType "SystemAssigned"
Important
Managed identity must be configured in the storage account before Azure Cache for Redis can access the account for persistence or import/export functionality. If this step is not done correctly, you see errors or no data written.
-
Create a new storage account or open an existing storage account that you would like to connect to your cache instance.
-
Open the Access control (IAM) from the Resource menu. Then, select Add, and Add role assignment.
:::image type="content" source="media/cache-managed-identity/demo-storage.png" alt-text="access control (iam) settings":::
-
Search for the Storage Blob Data Contributor on the Role pane. Select it and Next.
:::image type="content" source="media/cache-managed-identity/role-assignment.png" alt-text="add role assignment form with list of roles":::
-
Select the Members tab. Under Assign access to select Managed Identity, and select on Select members. A sidebar pops up on the right.
:::image type="content" source="media/cache-managed-identity/select-members.png" alt-text="add role assignment form with members pane":::
-
Use the drop-down under Managed Identity to choose either a User-assigned managed identity or a System-assigned managed identity. If you have many managed identities, you can search by name. Choose the managed identities you want and then Select. Then, Review + assign to confirm.
:::image type="content" source="media/cache-managed-identity/review-assign.png" alt-text="select managed identities form pop up":::
-
You can confirm if the identity has been assigned successfully by checking your storage account's role assignments under Storage Blob Data Contributor.
:::image type="content" source="media/cache-managed-identity/blob-data.png" alt-text="storag blob data contributor list":::
Note
Adding an Azure Cache for Redis instance as a storage blob data contributor through system-assigned identity conveniently adds the cache instance to the trusted services list, making firewall exceptions easier to implement. If you're not using managed identity and instead authorizing a storage account with a key, then having firewall exceptions on the storage account tends to break the persistence process and the import-export processes.
-
Open the Azure Cache for Redis instance that has been assigned the Storage Blob Data Contributor role and go to the Data persistence on the Resource menu.
-
Change the Authentication Method to (PREVIEW) Managed Identity and select the storage account you configured above. select Save.
:::image type="content" source="media/cache-managed-identity/data-persistence.png" alt-text="data persistence pane with authentication method selected":::
[!IMPORTANT] The identity defaults to the system-assigned identity if it is enabled. Otherwise, the first listed user-assigned identity is used.
-
Data persistence backups can now be saved to the storage account using managed identity authentication.
:::image type="content" source="media/cache-managed-identity/redis-persistence.png" alt-text="export data in resource menu":::
-
Open your Azure Cache for Redis instance that has been assigned the Storage Blob Data Contributor role and go to the Import or Export tab under Administration.
-
If importing data, choose the blob storage location that holds your chosen RDB file. If exporting data, type your desired blob name prefix and storage container. In both situations, you must use the storage account you've configured for managed identity access.
:::image type="content" source="media/cache-managed-identity/export-data.png" alt-text="export data from the resource menu":::
-
Under Authentication Method, choose (PREVIEW) Managed Identity and select Import or Export, respectively.
Note
It will take a few minutes to import or export the data.
Important
If you see an export or import failure, double check that your storage account has been configured with your cache's system-assigned or user-assigned identity. The identity used will default to system-assigned identity if it is enabled. Otherwise, the first listed user-assigned identity is used.
- Learn more about Azure Cache for Redis features
- What are managed identifies