@hampton123 Welcome to Microsoft Q&A Forum, Thank you for posting your query here!
I understand that you are unable to add a role assignment in your resource group's access control (IAM) blade, and you suspect that they lack the necessary permissions.
To assign Managed Identities to Azure resources, you need to have the appropriate permissions. Specifically, you need to have the "Owner" or "User Access Administrator" role assigned to your account. These roles provide full access to all resources in the subscription, including the ability to create and manage Managed Identities.
How to use Managed Identity to connect to Azure queue Storage from Azure Function?
You need to first leverage v5.0 version of Microsoft.Azure.WebJobs.Extensions.Storage.Queues
. This version introduces the ability to connect using an identity instead of a secret. For a tutorial on configuring your function apps with managed identities, see the creating a function app with identity-based connections tutorial.
dotnet add package Microsoft.Azure.WebJobs.Extensions.Storage.Queues --version 5.0.0
Once the above steps are followed, Your application may require additional permissions based on the code you write. You need to have the below RBAC permissions on Azure Storage for your Function APP.
Trigger | Storage Queue Data Reader, Storage Queue Data Message Processor |
Output binding | Storage Queue Data Contributor, Storage Queue Data Message Sender |
Below settings are also needed in your json:
"AzureWebJobsStorage__queueServiceUri": "https://mystorage.queue.core.windows.net/",
"AzureWebJobsStorage__credential": "managedidentity"
Also refer : Azure Functions - use queue trigger with managed identity
Hope this helps.
** Please do not forget to "Accept the answer” and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.