To use the Azure integration, your Azure tenant administrator may need to grant admin consent for the RedisInsight application. This is a one-time setup per Azure tenant — once done, all users in your organization can use RedisInsight with Entra ID seamlessly.
Why is this needed? See Why This Setup is Required for details on the authentication flow.
Running in Docker? See Azure Docker Setup for configuration when using custom ports or reverse proxies.
- Application (Client) ID:
61f3d82d-2bf3-432a-ba1b-c056e4cf0fd0
The RedisInsight app requires the following API permissions:
| API | Permission | Type | Purpose |
|---|---|---|---|
https://redis.azure.com |
.default |
Delegated | Connect to Azure Cache for Redis using Entra ID |
https://management.azure.com |
.default |
Delegated | Auto-discover Redis databases across subscriptions |
Run these commands in Azure Cloud Shell or your local terminal with Azure CLI installed:
# Step 1: Create the service principals in your tenant
# 61f3d82d-... = RedisInsight application
# acca5fbb-... = Azure Cache for Redis API (AzureRedisCacheAadApp)
az ad sp create --id 61f3d82d-2bf3-432a-ba1b-c056e4cf0fd0
az ad sp create --id acca5fbb-b7e4-4009-81f1-37e38fd66d78
# Step 2: Grant permissions
# Grant RedisInsight access to Azure Cache for Redis API
az ad app permission grant \
--id 61f3d82d-2bf3-432a-ba1b-c056e4cf0fd0 \
--api acca5fbb-b7e4-4009-81f1-37e38fd66d78 \
--scope user_impersonation
# Grant RedisInsight access to Azure Resource Manager API
# 797f4846-... = Azure Resource Manager (for autodiscovery)
az ad app permission grant \
--id 61f3d82d-2bf3-432a-ba1b-c056e4cf0fd0 \
--api 797f4846-ba00-4fd7-ba43-dac1f8f63013 \
--scope user_impersonation
# Step 3: Verify permissions were granted
az ad app permission list-grants \
--id 61f3d82d-2bf3-432a-ba1b-c056e4cf0fd0 \
--show-resource-nameYou should see AzureRedisCacheAadApp and Windows Azure Service Management API (or Azure Resource Manager) in the output.
If you see this error:
Invalid resource. The client has requested access to a resource which is not listed in the requested permissions in the client's application registration.
This means admin consent has not been granted for the RedisInsight application in your Azure tenant. Follow the "Granting Admin Consent (Azure CLI)" steps above.
If you see this error:
Resource 'acca5fbb-...' had no entitlements matching required permissions configured on the required resource access for client '61f3d82d-...'.
This means the Azure Cache for Redis API permissions haven't been granted. Run these commands:
# Create the service principal for Azure Cache for Redis API
az ad sp create --id acca5fbb-b7e4-4009-81f1-37e38fd66d78
# Grant permission
az ad app permission grant \
--id 61f3d82d-2bf3-432a-ba1b-c056e4cf0fd0 \
--api acca5fbb-b7e4-4009-81f1-37e38fd66d78 \
--scope user_impersonationIf you see this error:
The app is trying to access a service that your organization lacks a service principal for.
Run these commands to create the required service principals:
az ad sp create --id 61f3d82d-2bf3-432a-ba1b-c056e4cf0fd0
az ad sp create --id acca5fbb-b7e4-4009-81f1-37e38fd66d78Then grant the permissions using the CLI commands above.
RedisInsight uses PKCE (Proof Key for Code Exchange) OAuth 2.0 flow to authenticate with Azure Cache for Redis. This is a secure, public client flow recommended by Microsoft for desktop and web applications because:
- No client secrets — We don't store any secrets in the distributed application
- User-delegated access — Tokens are scoped to what you can access, not a service account
- Short-lived tokens — Access tokens expire and are refreshed automatically
Azure uses a multi-tenant security model. When you sign in through RedisInsight:
- RedisInsight redirects you to Microsoft's login page
- You authenticate with your Azure credentials
- Azure checks if RedisInsight is allowed to request tokens on behalf of users in your tenant
Because RedisInsight is a third-party application, an Azure AD administrator must grant consent before users in your organization can authenticate through it. This gives organizations control over which applications can access their resources.
RedisInsight uses delegated permissions with user_impersonation scope. This means:
- RedisInsight can only access resources you already have access to
- We cannot access anything beyond your own permissions
- All access is auditable in your Azure AD logs
| Permission | Purpose |
|---|---|
https://redis.azure.com/user_impersonation |
Authenticate to Azure Cache for Redis on your behalf |
https://management.azure.com/user_impersonation |
Auto-discover your Azure Redis instances |
offline_access |
Refresh tokens without re-prompting for login |
openid, profile |
Standard user info (name, email) |