@Ricky Bansal
Thank you for your post!
When it comes to your error message, have you tried specifying the MSI using either msiClientId or msiObjectId for the extension:
"settings": {
"secretsManagementSettings": {
"pollingIntervalInS": "14400",
"certificateStoreName": "MY",
"linkOnRenewal": true,
"certificateStoreLocation": "LocalMachine",
"requireInitialSync": true,
"observedCertificates": [
"<certificate url 1>",
"<certificate url 2>"
]
},
"authenticationSettings": {
"msiEndpoint": "http://169.254.169.254/metadata/identity",
"msiClientId": "<msi ClientId> e.g.: "c7373ae5-91c2-4165-8ab6-7381d6e75619""
}
}
For more info - KV extension for windows doesn't work well if multiple MSI assigned
Additional Links:
Key Vault virtual machine extension for Windows
How to use managed identities for Azure resources on an Azure VM to acquire an access token
Multiple user assigned identities exist, please specify the clientId / resourceId of the identity in the token request
Multiple assigned identities issue
If you have any other questions or are still running into this issue, please let me know.
Thank you for your time and patience throughout this issue.
----------
Please remember to "Accept Answer" if any answer/reply helped, so that others in the community facing similar issues can easily find the solution.