Azure Arc doesn't support user-assigned managed identity?

Gowtham K 51 Reputation points MVP
2026-01-13T16:06:33.1733333+00:00

According to Microsoft documentation, we began implementing the system-assigned managed identity on Azure Arc-enabled machines. Based on new requirements, we are now looking to use a user-assigned managed identity. However, it's not working. Nowhere in the documentation mention the limitation of using a user-assigned managed identity on Azure Arc-enabled machines. Do we have any workarounds for implementing the user-assigned managed identity in Azure Arc-enabled machines?

Azure Arc
Azure Arc
A Microsoft cloud service that enables deployment of Azure services across hybrid and multicloud environments.
{count} votes

Answer accepted by question author
  1. Siva shunmugam Nadessin 5,700 Reputation points Microsoft External Staff Moderator
    2026-01-13T17:19:53.5966667+00:00

    Hello Gowtham K

    Thank you for posting your query on Microsoft Q&A portal.

    User-assigned managed identities (UAMI) are not supported on Azure Arc‑enabled servers today. Only system‑assigned managed identity (SAMI) is supported for Azure Arc–enabled machines.

    This limitation is real, even though it is not clearly stated in the public documentation. Internal sources confirm this.

    1. Azure Arc documentation explicitly states that only system-assigned MI is supported

    In Identity and access management with Azure Arc-enabled servers, the Microsoft documentation says:

    Arc-enabled servers require a system-assigned managed identity.” [Identity a...soft Learn | Learn.Microsoft.com]

    No mention of user-assigned MI support.

    2. SQL Server enabled by Azure Arc also clarifies the same

    Only system-assigned managed identities are supported.[Managed id...soft Learn | Learn.Microsoft.com]

    3. Internal Microsoft incident confirms UAMI is not supported

    In an Azure Arc / Geneva monitoring Sev‑3 incident:

    User Assigned Managed Identity is not applicable for Azure Arc servers,” and the team had to migrate to resource-type–based ACLs instead. [RE: [PROD]...d Identity | Outlook]

    These internal notes reaffirm the product limitation.

    Why UAMI Doesn’t Work on Arc Machines

    Azure Arc uses the Hybrid Instance Metadata Service (HIMDS) to issue tokens. HIMDS currently supports only the system-assigned identity created when the Arc agent is onboarded.

    Unlike Azure VMs, Arc-enabled machines cannot attach UAMIs in the resource identity blade, because:

    ✔ There is no identity blade ✔ There is no mechanism to inject multiple identities into HIMDS ✔ HIMDS has no current support for selecting a specific UAMI

    Current Workarounds / Alternatives

    Although UAMI is not supported, there are practical alternatives depending on your scenario.

    1. Use System-Assigned MI + RBAC Scoping (recommended)

    You can scope the SAMI of the Arc machine to exactly the same RBAC permissions you intended to use with a UAMI:

    • Assign roles at resource, resource group, or subscription level.
    • Use this as a least‑privilege identity.

    This is the only supported method for Arc machines today.

    2. For Geneva Monitoring / custom agents – use Resource-Type ACLs

    This was the workaround used internally:

    “Since UAMI is not applicable for Arc servers, we had to use resource-type-based ACLs (providers/Microsoft.HybridCompute/machines).” This works for Geneva monitoring and other custom workloads where the token verifier supports resource-type identities.

    3. Use Service Principal (App Registration) where technically allowed

    Not ideal, but sometimes acceptable for:

    • Legacy automation
    • Agents that cannot use SAMI

    Azure Arc's HIMDS supports token issuance only for SAMI, so apps requiring UAMI must authenticate using a service principal until support is added. 

    Hope this helps you get closer to a solution! Let me know if you have any further questions!

     

    1 person found this answer helpful.

1 additional answer

Sort by: Most helpful
  1. Q&A Assist
    2026-01-13T16:06:43.8933333+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    Azure Arc does have limitations regarding user-assigned managed identities. Currently, the documentation indicates that user-assigned managed identities are not supported for certain functionalities within Azure Arc-enabled machines. Specifically, the creation of federated identity credentials is not supported on user-assigned managed identities in certain regions. This might be the reason you are experiencing issues with implementing a user-assigned managed identity.

    As for workarounds, the documentation does not provide specific alternatives for using user-assigned managed identities on Azure Arc-enabled machines. It is advisable to continue using system-assigned managed identities, which are fully supported and can be utilized to authenticate to Azure resources without the limitations associated with user-assigned identities.


    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.