Skip to content

Commit baf9ca9

Browse files
authored
Merge pull request #176439 from MarileeTurscak-MSFT/patch-728
Updated proxy info
2 parents 6554f72 + f258372 commit baf9ca9

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/active-directory/managed-identities-azure-resources/how-to-use-vm-token.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -365,6 +365,9 @@ This section documents the possible error responses. A "200 OK" status is a succ
365365
| | invalid_scope | The requested scope is invalid, unknown, or malformed. | |
366366
| 500 Internal server error | unknown | Failed to retrieve token from the Active directory. For details see logs in *\<file path\>* | Verify that managed identities for Azure resources has been enabled on the VM. See [Configure managed identities for Azure resources on a VM using the Azure portal](qs-configure-portal-windows-vm.md) if you need assistance with VM configuration.<br><br>Also verify that your HTTP GET request URI is formatted correctly, particularly the resource URI specified in the query string. See the "Sample request" in the preceding REST section for an example, or [Azure services that support Azure AD authentication](./services-support-managed-identities.md) for a list of services and their respective resource IDs.
367367

368+
> [!IMPORTANT]
369+
> - IMDS is not intended to be used behind a proxy and doing so is unsupported. For examples of how to bypass proxies, refer to the [Azure Instance Metadata Samples](https://github.com/microsoft/azureimds).
370+
368371
## Retry guidance
369372

370373
It is recommended to retry if you receive a 404, 429, or 5xx error code (see [Error handling](#error-handling) above).

0 commit comments

Comments
 (0)