Create Pull Request
| Date | Scan | Status | Result |
|---|---|---|---|
| 2026-02-20 00:00 | #402 | in_progress |
Biased
|
| 2026-02-19 00:00 | #398 | in_progress |
Biased
|
| 2026-02-18 00:00 | #394 | in_progress |
Biased
|
| 2026-02-17 00:00 | #390 | in_progress |
Biased
|
| 2026-02-16 00:00 | #386 | in_progress |
Biased
|
| 2026-02-15 00:00 | #382 | in_progress |
Biased
|
| 2026-02-14 00:00 | #378 | in_progress |
Biased
|
| 2026-01-14 00:00 | #250 | in_progress |
Biased
|
| 2026-01-13 00:00 | #246 | completed |
Biased
|
| 2026-01-12 00:00 | #243 | cancelled |
Biased
|
| 2026-01-11 00:00 | #240 | completed |
Biased
|
| 2026-01-10 00:00 | #237 | completed |
Biased
|
| 2026-01-09 00:34 | #234 | completed |
Biased
|
| 2026-01-08 00:53 | #231 | completed |
Clean
|
| 2026-01-06 18:15 | #225 | cancelled |
Clean
|
| 2025-09-16 00:00 | #113 | completed |
Biased
|
| 2025-09-15 00:00 | #112 | completed |
Biased
|
| 2025-09-14 00:00 | #111 | completed |
Clean
|
| 2025-09-13 00:00 | #110 | completed |
Clean
|
| 2025-09-12 00:00 | #109 | completed |
Clean
|
| 2025-09-11 00:00 | #108 | completed |
Clean
|
| 2025-09-10 00:00 | #107 | completed |
Clean
|
| 2025-09-09 00:00 | #106 | completed |
Clean
|
| 2025-09-08 00:00 | #105 | completed |
Biased
|
| 2025-09-07 00:00 | #104 | completed |
Biased
|
| 2025-09-06 00:00 | #103 | completed |
Biased
|
| 2025-09-05 00:00 | #102 | completed |
Biased
|
| 2025-09-04 00:00 | #101 | completed |
Biased
|
| 2025-09-03 00:00 | #100 | completed |
Clean
|
| 2025-09-02 00:00 | #99 | cancelled |
Biased
|
| 2025-08-17 00:01 | #83 | cancelled |
Biased
|
| 2025-07-13 21:37 | #48 | completed |
Biased
|
| 2025-07-09 13:09 | #3 | cancelled |
Clean
|
| 2025-07-08 04:23 | #2 | cancelled |
Biased
|
1. Run the `Update-AzFunctionApp -IdentityType UserAssigned -IdentityId` command to assign the identity in Functions:
# [Azure PowerShell](#tab/ps) #### For App Service Run the `Set-AzWebApp -AssignIdentity` command:
#### For Functions Run the `Update-AzFunctionApp -IdentityType` command:
# [Azure PowerShell](#tab/ps)
#### For App Service
Adding a user-assigned identity in App Service by using Azure PowerShell is currently not supported.
#### For Functions
1. Create a user-assigned identity:
This response is the same as the [response for the Microsoft Entra service-to-service access token request](../active-directory/develop/v2-oauth2-client-creds-grant-flow.md#successful-response). To access Key Vault, add the value of `access_token` to a client connection with the vault. # [.NET](#tab/dotnet) > [!NOTE] > When you connect to Azure SQL data sources by using [Entity Framework Core](/ef/core/), consider using [Microsoft.Data.SqlClient](/sql/connect/ado-net/sql/azure-active-directory-authentication). That namespace provides special connection strings for managed identity connectivity. For an example, see [Tutorial: Secure an Azure SQL Database connection from App Service by using a managed identity](tutorial-connect-msi-sql-database.md). For .NET apps and functions, the simplest way to work with a managed identity is through the [Azure Identity client library for .NET](/dotnet/api/overview/azure/identity-readme?). For more information, see [Tutorial: Connect to Azure databases from App Service without secrets by using a managed identity](tutorial-connect-msi-azure-database.md). For more information, see the respective documentation headings of the client library: - [Add the Azure Identity client library to your project](/dotnet/api/overview/azure/identity-readme#getting-started) - [Access an Azure service by using a system-assigned identity](/dotnet/api/overview/azure/identity-readme#authenticate-with-defaultazurecredential) - [Access an Azure service by using a user-assigned identity](/dotnet/api/overview/azure/identity-readme#specify-a-user-assigned-managed-identity-with-defaultazurecredential) The linked examples use [DefaultAzureCredential](/dotnet/api/overview/azure/identity-readme#defaultazurecredential). The same pattern works in Azure with managed identities and on your local machine without managed identities. # [JavaScript](#tab/javascript) For Node.js apps and JavaScript functions, the simplest way to work with a managed identity is through the [Azure Identity client library for JavaScript](/javascript/api/overview/azure/identity-readme?). For more information, see [Tutorial: Connect to Azure databases from App Service without secrets by using a managed identity](tutorial-connect-msi-azure-database.md). For more information, see the respective documentation headings of the client library: - [Add an Azure Identity client library to your project](/javascript/api/overview/azure/identity-readme#install-the-package) - [Access an Azure service by using a system-assigned identity](/javascript/api/overview/azure/identity-readme#authenticate-with-defaultazurecredential) - [Access an Azure service by using a user-assigned identity](/javascript/api/overview/azure/identity-readme#specify-a-user-assigned-managed-identity-with-defaultazurecredential) The linked examples use [DefaultAzureCredential](/javascript/api/overview/azure/identity-readme#defaultazurecredential). The same pattern works in Azure with managed identities and on your local machine without managed identities. For more code examples of the Azure Identity client library for JavaScript, see [Azure Identity examples](https://github.com/Azure/azure-sdk-for-js/blob/%40azure/identity_2.0.1/sdk/identity/identity/samples/AzureIdentityExamples.md). # [Python](#tab/python) For Python apps and functions, the simplest way to work with a managed identity is through the [Azure Identity client library for Python](/python/api/overview/azure/identity-readme). For more information, see [Tutorial: Connect to Azure databases from App Service without secrets by using a managed identity](tutorial-connect-msi-azure-database.md). For more information, see the respective documentation headings of the client library: - [Add an Azure Identity client library to your project](/python/api/overview/azure/identity-readme#getting-started) - [Access an Azure service by using a system-assigned identity](/python/api/overview/azure/identity-readme#authenticate-with-defaultazurecredential) - [Access an Azure service by using a user-assigned identity](/python/api/overview/azure/identity-readme#authenticate-with-a-user-assigned-managed-identity) The linked examples use [DefaultAzureCredential](/python/api/overview/azure/identity-readme#defaultazurecredential). The same pattern works in Azure with managed identities and on your local machine without managed identities. # [Java](#tab/java) For Java apps and functions, the simplest way to work with a managed identity is through the [Azure Identity client library for Java](/java/api/overview/azure/identity-readme). For more information, see [Tutorial: Connect to Azure databases from App Service without secrets by using a managed identity](tutorial-connect-msi-azure-database.md). For more information, see the respective documentation headings of the client library: - [Add an Azure Identity client library to your project](/java/api/overview/azure/identity-readme#include-the-package) - [Access an Azure service by using a system-assigned identity](/java/api/overview/azure/identity-readme#authenticate-with-defaultazurecredential) - [Access an Azure service by using a user-assigned identity](/java/api/overview/azure/identity-readme#authenticate-a-user-assigned-managed-identity-with-defaultazurecredential) The linked examples use [`DefaultAzureCredential`](/azure/developer/java/sdk/identity-azure-hosted-auth#default-azure-credential). The same pattern works in Azure with managed identities and on your local machine without managed identities. For more code examples of the Azure Identity client library for Java, see [Azure Identity examples](https://github.com/Azure/azure-sdk-for-java/wiki/Azure-Identity-Examples). # [PowerShell](#tab/powershell) Use the following script to retrieve a token from the local endpoint by specifying a resource URI of an Azure service:
You can also remove the system-assigned identity by specifying `[system]` in `--identities`. # [Azure PowerShell](#tab/ps) #### For App Service To remove a system-assigned identity for App Service, run the `Set-AzWebApp -AssignIdentity` command:
#### For Functions To remove all identities in Azure PowerShell (Azure Functions only), run this command: