An Azure service that provides an event-driven serverless compute platform.
Hi @Pesala, Nikitha ,
Welcome to the Microsoft Q&A Platform! Thank you for asking your question here.
1. Will the preview Authentication blade affect the reliability or functionality of our Managed Identity authentication flow?
- No, the managed identity runtime (system-assigned/user-assigned), its service principal/token behavior and access model are platform features and are not changed by a portal UI being in preview.
- Portal/Blade changes affect management UX only; the runtime token issuance and SDK behavior (for example when your app calls
IMDS/DefaultAzureCredential) remain the same.
2. Any known limitations or potential issues when using preview Authentication features with system-assigned managed identity?
- There are no inherent functional limits to the managed identity itself just because an authentication blade is preview — but preview features can have limited capabilities, regional rollouts, and may change before GA. Treat preview UI features as unstable for automation.
- Practical risks: documentation may lag, support may be best-effort for preview features, and UI workflows can change — so scripts/runbooks that depend on a preview UI could break.
- Verification steps you should run (non-prod) to be safe: ensure the MI service principal exists, request a token from the MI endpoint (IMDS/SDK), and validate RBAC access — these validate the auth flow independently of the portal UI.
3. Production readiness — is this configuration production-ready, or should we use an alternative for production workloads?
Short answer: Use the managed identity feature in production, but don’t rely on preview UI features as your only path for production configuration or automation.
- Use managed identities in production, the capability itself is GA and intended for production use (recommended pattern to avoid secrets).
- Don’t rely exclusively on a Preview portal workflow for production automation or critical runbooks. For production, provision/configure/automate via GA-supported methods (ARM templates, CLI, PowerShell, REST) or the GA portal blades.
Recommended production checklist:
- Provision and assign the system-assigned managed identity (ARM/CLI/Portal GA blade).
- Grant RBAC to the MI (Storage, Key Vault, etc.) and verify access with a token request from the app.
- Use SDKs that support managed identity token acquisition (Azure.Identity / DefaultAzureCredential) and add runtime tests in staging.
- Avoid building automation that depends only on a preview portal workflow — use supported APIs/ARM/CLI for automation.