Auditing for Azure SQL database has started supporting User Managed Identity. Auditing can be configured to Storage account using two authentication methods, managed identity and storage access keys. For managed identity you can use system managed identity or user managed identity. To know more about UMI in azure refer here
To configure writing audit logs to a storage account, select Storage when you get to the Auditing section. Select the Azure storage account where logs will be saved, you can use two storage authentication types i.e., managed identity and storage access keys.
For managed identity, we support system and user managed identity.
By default, it picks primary user identity that is assigned to the server, if there is no user identity then it will create system assigned identity and use it for authentication purpose.
select the retention period by opening Advanced properties. Then click Save. Logs older than the retention period is deleted.
The user managed identity authentication type for enabling auditing to storage behind VNet/Firewall is not currently supported.
Review the identity blade for your Azure database, you can see there is one primary identity configured
To configure Auditing using User managed Identity, follow the below steps
Only after the above-mentioned role is assigned to the user managed identity, enable auditing using the Storage Authentication Type as managed identity
If there is no user managed identity created, then by default it will use system identity. For system managed identity, when you configure auditing to storage account and select managed identity it will create system managed identity and grant required permissions to access storage account, no user action required.