Dmitry Porotnikov / Resizing or modifying a VM with a UMI fails via Azure PowerShell/CLI but succeeds in Azure Portal

Created Mon, 17 Feb 2025 00:00:00 +0000 Modified Mon, 17 Feb 2025 00:00:00 +0000
710 Words

Resizing or modifying a VM with a UMI fails via Azure PowerShell/CLI but succeeds in Azure Portal

Overview

When performing certain operations on an Azure VM or VMSS - such as resizing or changing VMSS image reference - if you assigned a User Assigned Managed Identity to the VM/VMSS, you may encounter failures when using Azure PowerShell or Azure CLI. However, performing the same operation through the Azure portal succeeds. This blog post explains the root cause and provides guidance on how to resolve the issue.


Issue Description

Symptoms

  1. You have assigned a User Assigned Managed Identity to the Azure VM.

  2. You have limited access or use a custom RBAC role.

  3. When attempting operations such as resizing the VM or modifying the VMSS using Azure PowerShell or Azure CLI, the process fails.

  4. Typical Error Message (Azure PowerShell Example):

    Update-AzVM : The client 'username@domain' with object id '00000000-0000-0000-0000-000000000000' has permission to perform action 'Microsoft.Compute/virtualMachines/write' on scope
    '/subscriptions/<subid>/resourceGroups/<rg>/providers/Microsoft.Compute/virtualMachines/<vmname>';
    however, it does not have permission to perform action(s)
    'Microsoft.ManagedIdentity/userAssignedIdentities/assign/action' on the linked scope(s)
    '/subscriptions/<subid>/resourceGroups/<rg>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<uminame> (respectively) or the linked scope(s) are invalid.
    ErrorCode: LinkedAuthorizationFailed
    ErrorTarget:
    StatusCode: 403
    ReasonPhrase: Forbidden
    OperationID : 00000000-0000-0000-0000-000000000000
    
  5. Portal Succeeds: When performing the same operation through the Azure Portal, it completes without any issues.


Root Cause Analysis

Azure’s resource management operations - whether executed via Azure Portal, PowerShell, or CLI - ultimately translate into REST API calls. However, the type of call and the validation performed can differ based on the tool:

  • Azure Portal → PATCH Operation
    • When you resize (or modify) a VM in the Azure Portal, it typically issues a PATCH call. A PATCH call updates only the specific part of the VM schema (e.g., the hardware profile for changing VM size). Hence, only the VM size change is validated, and no validation is performed on the entire schema, including the UMI.
  • Azure PowerShell/CLI → PUT Operation
    • When performing the same operation using Azure PowerShell or CLI, a PUT call is made. A PUT call attempts to update the entire VM schema. This requires validation of all attached resources, including the UMI. If the user lacks the required permission on the UMI resource- specifically the Microsoft.ManagedIdentity/userAssignedIdentities/assign/action permission—the operation fails with a LinkedAuthorizationFailed error.

In other words, the reason the operation fails via Azure PowerShell/CLI but succeeds through the Portal is that the Portal-based PATCH approach does not re-validate every property (including the UMI), while PowerShell/CLI’s PUT approach does.

Put_vs_Patch.png


Resolution

  1. Grant Proper Permissions
  2. Use the Azure Portal
    • If adjusting permissions is not immediately feasible, an alternative short-term workaround is to perform the VM or VMSS operation through the Azure Portal, which issues a PATCH operation rather than PUT. This avoids the comprehensive re-validation that triggers the permission error.
  3. Call the Azure REST API Directly
    • In advanced scenarios, you can bypass the typical PowerShell/CLI PUT by constructing your own API calls that only apply a PATCH. This is more complex and usually not necessary if you can assign the correct permissions or use the portal.

      There are two ways to do it, one is to use Azure CLI: Use the Azure REST API with Azure CLI | Microsoft Learn

      Second one is bypassing AzureCLI and using custom Power Shell code, calling Invoke-RestMethod. Example below:

      # Get your access token via
      # az account get-access-token --query 'accessToken' -o tsv
      $headers = @{
          "Authorization" = "Bearer YOURACCESSTOKEN"
          "Content-Type" = "application/json"
      }
      
      # Replace with your subscribtion IDs and VMss
      $subscriptionId = "YOURSUBID"
      $resourceGroupName = "testvmss"
      $vmssName = "testvmss"
      
      # Replace with yours ID
      $imageReferenceId = "/subscriptions/$subscriptionId/resourceGroups/testimage/providers/Microsoft.Compute/galleries/testgallery/images/test/versions/0.0.1"
      
      # Update VMSS Image Reference - JSON payload
      $jsonBody = @"
      {
          "properties": {
              "virtualMachineProfile": {
                  "storageProfile": {
                      "imageReference": {
                          "id": "$imageReferenceId"
                      }
                  }
              }
          }
      }
      "@
      
      $uri = "https://management.azure.com/subscriptions/$subscriptionId/resourceGroups/$resourceGroupName/providers/Microsoft.Compute/virtualMachineScaleSets/$vmssName`?api-version=2022-11-01"
      Invoke-RestMethod -Uri $uri -Method Patch -Headers $headers -Body $jsonBody
      

Additional Resources