Hello Sriramulu, Latha,
Thank you for posting your query here!
Please note that the Azure File CSI driver currently uses a secret (the nodeStageSecretRef) to store the storage account key. This is used to mount the file share as a persistent volume. As of now, the CSI driver might not support using Managed Identities directly.
If you want to avoid storing the storage account key as a secret, can you try to use an init container in your Pod that uses the Managed Identity to retrieve the storage account key, and then dynamically create the secret required by the CSI driver. This way, the storage account key is not permanently stored in a Kubernetes secret.
Do let us know if you have any further queries. I’m happy to assist you further.