Error Message:
The portal is having issues getting an authentication token. The experience rendered may be degraded.
Additional information from the call to get a token:
Extension: Microsoft_Azure_Monitoring
Resource: loganalyticsapi
Details: The extension 'Microsoft_Azure_Monitoring' has not defined the resource access
for resource 'loganalyticsapi' in the extension's configuration, or in the portal's configuration.
When I create the resource in Azure, the access is not showing in the IAM of that resource and also getting authentication issue.
I’m the owner of my subscription.
Updated:
I’m getting the same issue – no role assignments after any resource creation in Azure Portal.
I’m the Owner of My Azure Free Subscription.
Could anyone help me!
2
Answers
I too was having this issue and found this answer from MS, dated a few mins ago:
Thank you for posting this in Microsoft Q&A. I wanted to inform you that our PG team has investigated on this issue and found that this issue is happening for multiple customers.
Our PG team is internally working on this issue and will be resolving this issue soon from backend.
Let me know if you have any further questions.
Even though the notification correlates with the timing of the resources you were creating, it does not necessarily imply that any issues you see are directly caused by what the notification is saying. Correlation doesn’t imply causation. Essentially, if you don’t see any issues with the result of the operation you are performing (besides that authentication notification showing up), then what that notification is describing isn’t actually causing an issue for that case. For example, your screenshots were showing that you were an administrator/owner of your subscription even though you thought they weren’t.
If you are having issues with creating secrets in a Key Vault these are the steps you can follow:
Determine what permission model your key vault is using by clicking on the Access configuration menu item and looking at Permission model section.
If you are using the Azure role-based access control permission model, you can give yourself one of the required RBAC roles mentioned in these instructions. If you are using the vault access policy, you can use these instructions.