I’m using a Standard_v2 Application Gateway to serve HTTPS for a web app deployed on an Azure VM. I’ve attached a user-assigned managed identity to the Application Gateway using the Identity blade in the portal. My Key Vault is configured in Azure RBAC mode (not the legacy access policies). I’ve assigned the following roles to the gateway’s managed identity at the Key Vault resource scope:
- Key Vault Administrator (which includes both certificate and secret read permissions)
Key Vault Certificates Officer
Key Vault Secrets Officer
There are no deny assignments or resource locks, and I’ve waited several hours for all role assignments to propagate. Despite all of this, when I try to configure an HTTPS listener on the Application Gateway to “choose a certificate from Key Vault,” I receive the error:
“This key vault doesn’t allow access to the managed identity.”
What additional configuration or troubleshooting steps could resolve this issue?
I’ve verified that both the Key Vault and Application Gateway are in the same subscription and tenant.
The managed identity shown in the Application Gateway matches the one receiving the RBAC assignments in Key Vault.
Activity logs in Key Vault show no further authorization failures.
Has anyone encountered this persistent error under similar conditions? Any insights or recommendations would be greatly appreciated.I’m using a Standard_v2 Application Gateway to serve HTTPS for a web app deployed on an Azure VM. I’ve attached a user-assigned managed identity to the Application Gateway using the Identity blade in the portal. My Key Vault is configured in Azure RBAC mode (not the legacy access policies). I’ve assigned the following roles to the gateway’s managed identity at the Key Vault resource scope:
Key Vault Administrator (which includes both certificate and secret read permissions)
Key Vault Certificates Officer
Key Vault Secrets Officer
There are no deny assignments or resource locks, and I’ve waited several hours for all role assignments to propagate. Despite all of this, when I try to configure an HTTPS listener on the Application Gateway to “choose a certificate from Key Vault,” I receive the error:
“This key vault doesn’t allow access to the managed identity.”
What additional configuration or troubleshooting steps could resolve this issue?
I’ve verified that both the Key Vault and Application Gateway are in the same subscription and tenant.
The managed identity shown in the Application Gateway matches the one receiving the RBAC assignments in Key Vault.
Activity logs in Key Vault show no further authorization failures.
Has anyone encountered this persistent error under similar conditions? Any insights or recommendations would be greatly appreciated.