Enabling Manage Identity in Multiple Cotainers In Azure App Service

Ramesh 20 Reputation points
2024-04-18T03:33:41.76+00:00

We are currently leveraging a container registry for deploying code from Bitbucket to Azure app services within our infrastructure. In our pursuit to enhance our security measures, we are keen on enabling the system identity provider. However, we've encountered documentation suggesting that system identity isn't enabled for multiple containers.

Given this constraint, we are seeking alternatives to integrate system identities into our containers. Any insights or recommendations on this matter would be greatly appreciated.

Azure Container Instances
Azure Container Instances
An Azure service that provides customers with a serverless container experience.
711 questions
{count} votes

Accepted answer
  1. v-vvellanki-MSFT 4,920 Reputation points Microsoft Vendor
    2024-04-18T10:59:03.49+00:00

    Hi @Ramesh,

    Thanks for contacting Microsoft Q&A platform.

    Based on the error, it looks like the issue you are encountering is related to the credentials that are being used to authenticate with Azure. The error message suggests that the EnvironmentCredential, ManagedIdentityCredential, SharedTokenCacheCredential, AzureCliCredential, and AzurePowerShellCredential were all attempted, but none of them were able to retrieve a token.

    This error can occur if the credentials are not configured correctly or if there is an issue with the Azure environment. Here are a few things you can try to troubleshoot the issue:

    1. Verify that the environment variables are set correctly. The EnvironmentCredential requires the following environment variables to be set: AZURE_CLIENT_ID, AZURE_CLIENT_SECRET, and AZURE_TENANT_ID. Make sure that these variables are set correctly and that the values are valid.
    2. Verify that the Managed Identity is enabled for the container. You can do this by checking the "Identity" section of the container in the Azure Portal. Make sure that the "Status" is set to "On" and that the "System assigned" option is selected.
    3. Check the logs for any additional error messages. You can view the logs for the container in the Azure Portal by going to the "Logs" section of the container.
    4. Try using a different credential type. For example, you could try using the DefaultAzureCredential with the Visual Studio Code extension for Azure Account, which provides a graphical interface for managing Azure credentials.

    Hope this helps you.

    1 person found this answer helpful.
    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.