-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] DefaultAzureCredential does not fall back to other credential types unless ManagedIdentityCredential is disabled #47733
Comments
Thank you for your feedback. Tagging and routing to the team member best able to assist. |
Hi @v-uugwuoke To see what is going on, it would be helpful to get some logging of the repro. Below are the instructions: For console output, you would just need to add the following line to your program. using AzureEventSourceListener listener = AzureEventSourceListener.CreateTraceLogger(); If you need to log the output somewhere other than the console, this can be done as described in these docs. For example: using AzureEventSourceListener listener = new AzureEventSourceListener(
(args, message) => myLogger.Log("[{0:HH:mm:ss:fff}][{1}] {2}", DateTimeOffset.Now, args.Level, message),
level: EventLevel.Verbose); |
Hi @v-uugwuoke. Thank you for opening this issue and giving us the opportunity to assist. To help our team better understand your issue and the details of your scenario please provide a response to the question asked above or the information requested above. This will help us more accurately address your issue. |
@christothes The VM is an AVD host machine. No changes were made prior to the issue being observed. I expect it to use the visual studio Credential locally These are the logs related to the app configuration failure after adding AzureEventSourceListener.
|
Hi @v-uugwuoke
And then the call to the resource endpoint failed with a 403, meaning your managed identity does not have permissions to the resource.
To resolve this, you can either remove the managed identity configuration from the VM or grant the managed identity access to the resource. |
Hi @v-uugwuoke. Thank you for opening this issue and giving us the opportunity to assist. We believe that this has been addressed. If you feel that further discussion is needed, please add a comment with the text "/unresolve" to remove the "issue-addressed" label and continue the conversation. |
Describe the bug
The DefaultAzureCredential is supposed to fall back to other credential types when ManagedIdentityCredential is failed, but it doesn't.
Details
attempting to connect to app configuration with DefaultAzureCredential fails to fall back to other credential options. It was working fine until 21st of december. I am using an Azure VM as my dev environment
This code below fails until managedIdentityCredential is disabled
Error details
The text was updated successfully, but these errors were encountered: