I have created a proposal to implement managed identity between Azure web app hosted APIs. All APIs share one app identity. This app has defined a role. This role is assigned to all the services so every api can call every other api without configuring any passwords. Every app validates the Audience, the issuer and the authority.
services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
.AddJwtBearer(o =>
{...
Every caller acquires the access token using
azureServiceTokenProvider.GetAccessTokenAsync().
Having done that, now the challenge is how to make this work for developers. When Both the calling as well as called API or one of these is in my visual studio, there is no system defined identity for the caller and no "IDENTITY_ENDPOINT" header to get the token from.